Skip to main content

Create a custom virtual machine…



A custom virtual machine simply means a virtual machine you create using the From Gallery option because it gives you more configuration choices than the Quick Create option. These choices include:
  • Connecting the VM to a virtual network
  • Installing the VM Agent and extensions, such as for antimalware
  • Adding the VM to an existing cloud service
  • Adding the VM to an availability set
Important: If you want your virtual machine to use a virtual network so you can connect to it directly by hostname or set up cross-premises connections, make sure you specify the virtual network when you create the virtual machine. A virtual machine can be configured to join a virtual network only when you create the virtual machine. For details on virtual networks, see Azure Virtual Network Overview.
  1. Sign in to the Azure Management Portal. Check out the Free Trial offer if you don’t have a subscription yet.
  2. On the command bar at the bottom of the window, click New.
  3. Under Compute, click Virtual Machine, and then click From Gallery.Navigate to From Gallery in the Command Bar
  4. The first screen lets you Choose an Image for your virtual machine from one of the lists in the Image Gallery. (The available images may differ depending on the subscription you’re using.) Click the arrow to continue.Choose an image
  5. The second screen lets you pick a computer name, size, and administrative user name and password. If you just want to try out Azure Virtual Machines, fill in the fields as shown in the image below. Otherwise, chose the tier and size required to run your app or workload. Here are some details to help you fill this out:
    • New User Name refers to the administrative account that you use to manage the server. Create a unique password for this account and make sure to remember it. You’ll need the user name and password to log on to the virtual machine.
    • A virtual machine’s size affects the cost of using it, as well as configuration options such as the number of data disks you can attach. For details, see Virtual Machine and Cloud Service Sizes for Azure.
    Configure the properties of the virtual machine
  6. The third screen lets you configure resources for networking, storage, and availability. Here are some details to help you fill this out:
    • The Cloud Service DNS Name is the global DNS name that becomes part of the URI that’s used to contact the virtual machine. You’ll need to come up with your own cloud service name because it must be unique in Azure. Cloud services are important for scenarios using multiple virtual machines.
    • For Region/Affinity Group/Virtual Network, use a region that’s appropriate to your location. You can also choose to specify a virtual network instead.
    Configure the connected resources of the virtual machine
  7. The fourth configuration screen lets you configure the VM Agent and some of the available extensions. Click the check mark to create the virtual machine.Configure VM Agent and extensions for the virtual machine
  8. After the virtual machine is created, the Management Portal lists the new virtual machine under Virtual Machines. The corresponding cloud service and storage account also are created and are listed in those sections. Both the virtual machine and cloud service are started automatically and the Management Portal shows their status as Running.Configure VM Agent and the endpoints of the virtual machine

Comments

Popular posts from this blog

Now you can breathe liquid!

DIVE DEEP The recommended absolute limit for recreational SCUBA divers is just 130 feet, and technical dives using Trimix bottom out at 330. Even then, you’ve got less than five minutes at depth before requiring monitored decompression to avoid getting the bends (the not-scary word for when nitrogen dissolves into your tissue under the massive pressure of the water column, is ejected into the bloodstream during ascent, and you die of a brain embolism). Interestingly though, once your body hits its nitrogen saturation limit, it doesn’t matter if you stay down for an hour or a month; your decompression time effectively maxes out. This technique, known as saturation diving, is how recovery divers working on the K-141 Kursk were able to spend hours 300 feet below sea level (amidst 10 atmospheres of pressure) and how the crew in The Abyss were able to do their jobs. LIQUID AIR Perhaps the best-remembered scene from the 1989 Sci-Fi classic The Abyss is when Ed Harris’ chara...

Don’t like people to know you’ve read their Whatsapp messages? Here’s how to get around it.

The honor of having one of the most misinterpreted features in the world of tech startups goes to Whatsapp – specifically, the check marks that appear next to any message sent. Many initially guessed that two check marks meant that the recipient has already read the message, but that turned out to be incorrect Here’s what those check marks really mean: one tick to show that the message has reached Whatsapp’s servers, another to inform the user that it has reached the recipient’s phone. Now, there’s a third layer of information in the form of blue check marks, indicating that the recipient has indeed read the message. In the interest of privacy, Whatsapp had not so long ago introduced the option to hide the ‘last seen’ notification that informs the other party when that person was last on the messaging platform. The introduction of the blue check marks is strange, given that this brings back the social pressure to reply – what many users consider an intrusion of privacy. ...

Can I determine if my computer has a key logger installed? – YES!!!

Detecting keyloggers is as simple as looking in the right place (which may or may not be simple depending on your viewpoint). The problem is knowing what to look for and where. What follows is a non-exhaustive few things you could do to check for keylogging modules. Firstly, the obvious easy way to build a keylogger is to use DLL Injection which can be achieved a number of ways. Most of these will result in a DLL showing up as mapped to the process’s address space. Take a look at this picture: What is the topmost entry in that list? It’s a pyd , or python extension, file. I’ve been messing with python-implemented COM servers and as a result, the DLL is loaded into Windows Explorer’s address space. DLL Injection of the keylogging variety will load its DLL into all of the target address spaces – can’t capture everything if you don’t. So one thing to look out for would be strange DLLs you cannot attribute to products whose purpose you know. They’ll show up in this list for...