Book Image

Hands-On Linux Administration on Azure - Second Edition

By : Kamesh Ganesan, Rithin Skaria, Frederik Vos
Book Image

Hands-On Linux Administration on Azure - Second Edition

By: Kamesh Ganesan, Rithin Skaria, Frederik Vos

Overview of this book

Thanks to its flexibility in delivering scalable cloud solutions, Microsoft Azure is a suitable platform for managing all your workloads. You can use it to implement Linux virtual machines and containers, and to create applications in open source languages with open APIs. This Linux administration book first takes you through the fundamentals of Linux and Azure to prepare you for the more advanced Linux features in later chapters. With the help of real-world examples, you’ll learn how to deploy virtual machines (VMs) in Azure, expand their capabilities, and manage them efficiently. You will manage containers and use them to run applications reliably, and in the concluding chapter, you'll explore troubleshooting techniques using a variety of open source tools. By the end of this book, you'll be proficient in administering Linux on Azure and leveraging the tools required for deployment.
Table of Contents (14 chapters)
13
Index

Chapter 2: Getting Started with the Azure Cloud

  1. It helps with automation. Besides that, the web-based portal changes frequently, and the command-line interface is much more stable. In our opinion, it also gives you a better understanding of the underlying technology, thanks to its more or less strict workflow.
  2. It provides access for storing all your data objects. You'll need one for boot diagnostics and data for Azure Cloud Shell. More details can be found in Chapter 4, Managing Azure.
  3. The storage account must be globally unique in Azure.
  4. An offer is a group of related images offered by a publisher, such as Ubuntu Server. An image is a specific image.
  5. A stopped Azure virtual machine keeps resources allocated, such as dynamic public IP addresses, and incurs costs, whereas a deallocated virtual machine frees all resources so it stops incurring resource costs. However, both incur storage costs.
  6. Key-based authentication helps in automation as it can be used...