Book Image

Learn Azure Administration

By : Kamil Mrzygłód
Book Image

Learn Azure Administration

By: Kamil Mrzygłód

Overview of this book

Microsoft Azure is one of the upcoming cloud platforms that provide cost-effective solutions and services to help businesses overcome complex infrastructure-related challenges. This book will help you scale your cloud administration skills with Microsoft Azure. Learn Azure Administration starts with an introduction to the management of Azure subscriptions, and then takes you through Azure resource management. Next, you'll configure and manage virtual networks and find out how to integrate them with a set of Azure services. You'll then handle the identity and security for users with the help of Azure Active Directory, and manage access from a single place using policies and defined roles. As you advance, you'll get to grips with receipts to manage a virtual machine. The next set of chapters will teach you how to solve advanced problems such as DDoS protection, load balancing, and networking for containers. You'll also learn how to set up file servers, along with managing and storing backups. Later, you'll review monitoring solutions and backup plans for a host of services. The last set of chapters will help you to integrate different services with Azure Event Grid, Azure Automation, and Azure Logic Apps, and teach you how to manage Azure DevOps. By the end of this Azure book, you'll be proficient enough to easily administer your Azure-based cloud environment.
Table of Contents (15 chapters)
1
Section 1: Understanding the Basics
5
Section 2: Identity and Access Management
9
Section 3: Advanced Topics

Adding an NSG rule

To add an inbound or an outbound rule, you can use either the portal, CLI, or PowerShell. In the portal, the configuration is available via the following blade:

Figure 3.26 – Inbound security rules blade

For the Azure CLI, you can use the following command (in the following example, we opened port 3389 for the RDP activities on Windows):

$ az network nsg rule create -g azureadministrator-euw-rg --nsg-name myfirstnsg-euw-nsg -n AllowRDP --priority 1000 --access Allow --direction Inbound --source-port-ranges 3389 --destination-port-ranges 3389

The preceding command creates a new rule with priority 1000, allowing inbound access on port 3389 to port 3389. For Azure PowerShell, you will have to use the New-AzureRmNetworkSecurityRuleConfig command:

Figure 3.27 – Cmdlet details shown in the PowerShell ISE

As you can see, there are many different parameters available to be set—you can prepare very detailed rules that combine different...