How to create Linux virtual machine is all about these blog. we will explore the steps in setting up a Linux virtual machine using ubuntu server. by default, SSH access to virtual machines often relies on public authentication preferably.
- Linux VMs in Azure are instances of virtual machines that run Linux distributions (such as Ubuntu) as their operating system. These VMs can be created, managed, and scaled within the Azure portal.
let me guide on how to create your Linux virtual machine .
SIGN IN TO AZURE PORTAL
First and fore most you need to create azure free account before you could be able to do anything. once you create with your subscription on then you can log in here
with your user name and password you create.
CREATE YOUR VIRTUAL MACHINE
1 Look for hide portal menu by the left side or search bar, type Virtual machine
2 From the search results, select Virtual Machine from the list shown
3 Then click on the Create button
4 Select the virtual machine highlighted
5 You will be direct to the Basics page to work with.
Project Details
In the project details category, we have the subscription and resource group;
1 subscription
An Azure subscription in simple terms means a membership or access pass to use Microsoft Azure.
Azure subscriptions and understand how they work:
Azure Free Account:
If you’re new to Azure, you can start with a free account. Here’s what you get:
$200 Azure credit: You receive $200 in Azure credits to explore various services.
12 months of free services: During the first 12 months, certain services are free
Popular services: You can use popular services without any cost for 12 months
Resources Group
A Resource Group serves as a logical container where you organize and manage your Azure resources. These resources can include items like virtual machines, storage accounts, virtual networks, web apps, databases, and more in Azure cloud.
like a room with all your stuff inside arranged well, and someone later scattered.it will be hard for you to see anything that you are looking for because is not properly arranged so Resources group, group all your resources.
Instance details
1 Give your machine a name unique name you wish to
2 In the region section, select the location you want your virtual machine to be.
A region refers to a specific geographical location where cloud service providers operate their data centers. A region represents a distinct area on the globe where cloud providers have established their data centers. These data centers are strategically distributed across different regions to ensure redundancy, availability, and efficient service deliver.
3 Next, click on the drop-down to select your availability option and zone.
In azure region, a region consist of three availability zone. Zone 1, Zone 2, Zone 3. each zone has one or more data centers that a kilometers away from each other.
Azure data centers equipped with independent power, networking and cooling infrastructure to minimize the impact of failure and disruption infrastructure within these physical buildings is meticulously designed, tested, and integrated to meet stringent quality, security, and compliance requirements. Data center together is fiber optic cable, fiber optic technology allows for high speed and data transmission over long distances while maintaining low latency and high bandwidth capabilities.
4 select your security type from drop-down
5 In the image shown, select any Ubuntu Server.
Ubuntu is a Linux Operating System. An image is an operating system. it`s like a blueprint for creating virtual machines or computer systems. it has all the instructions and settings needed to set up a computer with a specific operating system and software.
6 Select the size of your virtual machine from the drop-down or click on See all size and leave the other information in its default state.
Administrator Account
1 Select the password authentication type.
Password-based authentication involves using a username and secret password to access a system as shown below.
While SSH public key authentication relies on keys pairs and cryptographic algorithms for secure remote access. Public key authentication offers stronger security and protection against various attacks, making it a preferred choice for secure remote connections.
However, for the purpose of this demo, we will use Password.
2 Type your name and password.
Inbound Port Rules
1 In this category, select SSH (22) as your inbound port to connect to the Linux server.
2 Click " Next: Disk> " to direct you to disk page
Disk
1 On the disk page click on the Os' disk type dropdown and select Standard SSD or any disk type of your choice as shown below. and leave the other columns as default.
2 leave the networking, management, monitor and advanced pages as default. skip to the Tag page.
Tag
1 Give your tag a name
Tag is a fundamental concept used to label and organize resources. Tags serve as metadata containing user-defined data. They help describe and identify resources running across an organization’s cloud environments.
2 Next, click on Review + create
3 Review the summary or the virtual machine configuration and click on the create button to begin the deployment process.
4 Once the deployment is complete , click on Go to resource
CONNECT TO YOUR VIRTUAL MACHINE
1 Click on the connect button to SSH to your Virtual Machine
2 Once the deployment is complete , click on Go to resource
3 click on select then download the key.
4 Copy the key as path, also copy your (IP Address as well as username) to your note pad
5 Open power shell on your laptop and input the command, then follow the steps SSh space -i space key space username@IP
6 You would be asked if you want to continue connecting, type yes and press enter
7 Input your password and press enter.
8 Once you press enter, you would be logged into your virtual machine as shown below.
JOB DONE.