bb87fc2f4892fd00764182234d504f7af1dd8d47
technology/cloud/azure.md
... | ... | @@ -1,21 +1,11 @@ |
1 | 1 | # azure |
2 | -[aries](https://aries.ward.ie/x/YgFk) |
|
3 | 2 | |
4 | -## toc |
|
5 | - |
|
6 | - |
|
7 | -## ward accounts (keepass) |
|
8 | - * dudley@wardazureward.onmicrosoft.com |
|
9 | - - non-prod (uat/dev) |
|
10 | - * dburrows@warddemo.onmicrosoft.com |
|
11 | - - prod |
|
12 | - |
|
13 | -## personal accounts |
|
3 | +## accounts |
|
14 | 4 | * blahthing@icloud.com |
15 | 5 | * dudleyburrows@ward.ie |
16 | 6 | |
17 | 7 | ## az cli |
18 | -[docs](https://docs.microsoft.com/en-gb/cli/azure/get-started-with-azure-cli?view=azure-cli-latest) |
|
8 | +[docs][] |
|
19 | 9 | |
20 | 10 | ### useful cmds |
21 | 11 | - show list of resource groups |
... | ... | @@ -27,26 +17,12 @@ |
27 | 17 | az resource list -g <group_name> --output table |
28 | 18 | ``` |
29 | 19 | |
30 | - |
|
31 | -create an Ubuntu vm called PP-WRD-TEST01 in the group P-WRD-RGRP on the PP-WRD-VNET vnet with no additional network security group, using username dburrows and public key for ssh |
|
32 | -``` |
|
33 | -az vm create -g P-WRD-RGRP -n PP-WRD-TEST01 \ |
|
34 | ---vnet-name PP-WRG-VNET \ |
|
35 | ---nsg "" \ |
|
36 | ---image UbuntuLTS \ |
|
37 | ---ssh-key-value .ssh/dburrows.pub \ |
|
38 | ---admin-username dburrows |
|
39 | -``` |
|
40 | - |
|
41 | -create debian machine with no private ip and in subnet |
|
20 | +create debian machine with no public ip and in prebuilt subnet, with tags |
|
42 | 21 | ``` |
43 | -az vm create -g P-WRD-WIKI-RGRP -n P-WRD-WIKI-VM01 --vnet-name P-WRD-WIKI-VNET --nsg "" --image Debian --ssh-key-value .ssh/dburrows.pub --admin-username dburrows --tags created-by=dburrows --public-ip-address "" --subnet P-WRD-WIKI-SUBN |
|
22 | +az vm create -g my-resource-group -n my-debian-vm --vnet-name my-vnet --nsg "" --image Debian --ssh-key-value .ssh/id_rsa.pub --admin-username pyratebeard --tags created-by=pyratebeard --public-ip-address "" --subnet my-subnet |
|
44 | 23 | ``` |
45 | 24 | |
46 | - |
|
47 | - |
|
48 | - |
|
49 | -install the azure cli command `{{az}}` by running the following |
|
25 | +install the azure cli command `az` by running the following |
|
50 | 26 | ``` |
51 | 27 | curl -L https://aka.ms/InstallAzureCLI | bash |
52 | 28 | ``` |
... | ... | @@ -63,7 +39,7 @@ az logout |
63 | 39 | |
64 | 40 | then run the login command again. |
65 | 41 | |
66 | -all the following steps _can_ be run from the portal cli as well as your local machine once you have installed {{az}}. |
|
42 | +all the following steps _can_ be run from the portal cli as well as your local machine once you have installed `az`. |
|
67 | 43 | |
68 | 44 | ### changing subscriptions |
69 | 45 | |
... | ... | @@ -79,7 +55,7 @@ az account show |
79 | 55 | |
80 | 56 | then to change subscriptions run |
81 | 57 | ``` |
82 | -az account set --subscription "Ward MS Partner Account" |
|
58 | +az account set --subscription "My Other Subscription" |
|
83 | 59 | ``` |
84 | 60 | |
85 | 61 | ### show vm images |
... | ... | @@ -89,7 +65,7 @@ az image list |
89 | 65 | |
90 | 66 | ### getting started |
91 | 67 | |
92 | -here is a quick run through of spinning up a [centos](https://www.centos.org/) virtual machine |
|
68 | +here is a quick run through of spinning up a [centos][] virtual machine |
|
93 | 69 | |
94 | 70 | - create resource group |
95 | 71 | ``` |
... | ... | @@ -101,14 +77,14 @@ here is a quick run through of spinning up a [centos](https://www.centos.org/) v |
101 | 77 | ``` |
102 | 78 | - create a network rule in an existing security group |
103 | 79 | ``` |
104 | - az network nsg rule create --resource-group D-TST-RGRP --nsg-name D-TST-NSGP --name allow-ward --description "Allow all traffic from Ward public range" --access Allow --protocol Tcp --direction Inbound --priority 102 --source-address-prefix "93.94.119.240/28" --source-port-range "*" --destination-address-prefix "*" --destination-port-range "*" |
|
80 | + az network nsg rule create --resource-group D-TST-RGRP --nsg-name D-TST-NSGP --name allow-access --description "Allow all traffic from my public range" --access Allow --protocol Tcp --direction Inbound --priority 102 --source-address-prefix "97.108.19.240/28" --source-port-range "*" --destination-address-prefix "*" --destination-port-range "*" |
|
105 | 81 | ``` |
106 | 82 | - create a virtual machine |
107 | 83 | ``` |
108 | 84 | az vm create -g D-TST-RGRP -n D-TST-LAPP01 --image CentOS --generate-ssh-keys |
109 | 85 | ``` |
110 | 86 | |
111 | -once the VM is successfully created it will output some json. make note of the "publicIpAddress" value, and use this to {{ssh}} to the server. |
|
87 | +once the VM is successfully created it will output some json. make note of the "publicIpAddress" value, and use this to `ssh` to the server. |
|
112 | 88 | |
113 | 89 | ## advanced tools |
114 | 90 | |
... | ... | @@ -119,36 +95,36 @@ you can check your current role with the cli. first you need to make a note of t |
119 | 95 | az account show |
120 | 96 | { |
121 | 97 | "environmentName": "AzureCloud", |
122 | - "id": "b1447c5c-db40-4a01-9fc3-d56a740047b5", |
|
98 | + "id": "", |
|
123 | 99 | "isDefault": true, |
124 | - "name": "Ward MS Partner Account", |
|
100 | + "name": "My Subscription", |
|
125 | 101 | "state": "Enabled", |
126 | - "tenantId": "89252e5d-2862-422f-8279-7d0a49e32e6a", |
|
102 | + "tenantId": "", |
|
127 | 103 | "user": { |
128 | - "name": "dudley@wardazureward.onmicrosoft.com", |
|
104 | + "name": "dudley@onmicrosoft.com", |
|
129 | 105 | "type": "user" |
130 | 106 | } |
131 | 107 | } |
132 | 108 | ``` |
133 | -copy the value from {{"user": "name":}}, then run the following replacing {{<value>}} with the username (usually an email address) |
|
109 | +copy the value from `"user": "name":`, then run the following replacing `<value>` with the username (usually an email address) |
|
134 | 110 | ``` |
135 | 111 | az role assignment list --assignee <value> |
136 | 112 | [ |
137 | 113 | { |
138 | - "id": "/subscriptions/b1447c5c-db40-4a01-9fc3-d56a740047b5/providers/Microsoft.Authorization/roleAssignments/85f38488-d3f3-423b-afb7-77d8cadddd32", |
|
139 | - "name": "85f38488-d3f3-423b-afb7-77d8cadddd32", |
|
114 | + "id": "/subscriptions/providers/Microsoft.Authorization/roleAssignments/", |
|
115 | + "name": "", |
|
140 | 116 | "properties": { |
141 | - "principalId": "5ad99088-9605-4a83-843c-71bc51bf53f6", |
|
142 | - "principalName": "dudley@wardazureward.onmicrosoft.com", |
|
143 | - "roleDefinitionId": "/subscriptions/b1447c5c-db40-4a01-9fc3-d56a740047b5/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c", |
|
117 | + "principalId": "", |
|
118 | + "principalName": "dudley@onmicrosoft.com", |
|
119 | + "roleDefinitionId": "/subscriptions/providers/Microsoft.Authorization/roleDefinitions/", |
|
144 | 120 | "roleDefinitionName": "Contributor", |
145 | - "scope": "/subscriptions/b1447c5c-db40-4a01-9fc3-d56a740047b5" |
|
121 | + "scope": "/subscriptions/" |
|
146 | 122 | }, |
147 | 123 | "type": "Microsoft.Authorization/roleAssignments" |
148 | 124 | } |
149 | 125 | ] |
150 | 126 | ``` |
151 | -your current role is under {{"properties": "roleDefinitionName":}} |
|
127 | +your current role is under `"properties": "roleDefinitionName":` |
|
152 | 128 | |
153 | 129 | ## show all resources in your subscription |
154 | 130 | ``` |
... | ... | @@ -157,13 +133,13 @@ az group list --output table |
157 | 133 | |
158 | 134 | ## deploy a kubernetes cluster |
159 | 135 | |
160 | -we add the {{aks}} option to manage azure kubernetes services. Currently aks is only available in west europe |
|
136 | +we add the `aks` option to manage azure kubernetes services. Currently aks is only available in west europe |
|
161 | 137 | ``` |
162 | 138 | az group create --name D-K8S-RGRP --location westeurope |
163 | 139 | az aks create --name D-K8S-KCLU --resource-group D-K8S-RGRP --generate-ssh-keys |
164 | 140 | az aks get-credentials --name D-K8S-KCLU --resource-group D-K8S-RGRP |
165 | 141 | az aks browse --name D-K8S-KCLU --resource-group D-K8S-RGRP |
166 | -az aks show --resource-group dudley-container-demo-rg --name dudley-container-demo-clu --query "servicePrincipalProfile.clientId" --output tsv |
|
142 | +az aks show --resource-group pyratebeard-container-demo-rg --name pyratebeard-container-demo-clu --query "servicePrincipalProfile.clientId" --output tsv |
|
167 | 143 | ``` |
168 | 144 | |
169 | 145 | ## deploy webapp and enable for webhooks |
... | ... | @@ -177,7 +153,7 @@ az webapp deployment container show-cd-url -n D-TST-APP-SRV -g D-TST-APP-RG |
177 | 153 | |
178 | 154 | run script tool on VMs (under 'Operation') |
179 | 155 | |
180 | -## create vpn - [ref1][] |
|
156 | +## create vpn - [fortinet_cookbook][] |
|
181 | 157 | * virtual network |
182 | 158 | * virtual network gateway |
183 | 159 | * local network gateway |
... | ... | @@ -189,8 +165,9 @@ run script tool on VMs (under 'Operation') |
189 | 165 | * connect through gateway to website (using peering?) |
190 | 166 | |
191 | 167 | |
192 | -[auto tagging][] |
|
168 | +[auto_tagging][] |
|
193 | 169 | |
194 | -## ref |
|
195 | -[ref1]: https://cookbook.fortinet.com/ipsec-vpn-microsoft-azure-54/ |
|
196 | -[auto tagging]: https://gallery.technet.microsoft.com/scriptcenter/Automatically-Azure-fc5f1443 |
|
170 | +[centos]: https://www.centos.org/ |
|
171 | +[fortinet_cookbook]: https://cookbook.fortinet.com/ipsec-vpn-microsoft-azure-54/ |
|
172 | +[auto_tagging]: https://gallery.technet.microsoft.com/scriptcenter/Automatically-Azure-fc5f1443 |
|
173 | +[docs]: https://docs.microsoft.com/en-gb/cli/azure/get-started-with-azure-cli?view=azure-cli-latest |