Merge pull request #358 from zainHaseeb/master

az104
This commit is contained in:
staleycyn 2021-09-30 09:44:00 -07:00 committed by GitHub
commit 9aac9e80dc
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
11 changed files with 26 additions and 26 deletions

View File

@ -230,7 +230,7 @@ In this task, you will create Azure AD guest users and grant them access to reso
1. Navigate back to the **Users - All users** blade, and then click **+ New guest user**.
1. Create a new guest user with the following settings (leave others with their defaults):
1. Invite a new guest user with the following settings (leave others with their defaults):
| Setting | Value |
| --- | --- |

View File

@ -60,7 +60,7 @@ In this task, you will create and configure management groups.
1. Navigate back to the **Management groups** blade, and select **Refresh**.
1. On the **Management groups** blade, click **+ Add**.
1. On the **Management groups** blade, click **+ Create**.
>**Note**: If you have not previously created Management Groups, select **Start using management groups**
@ -75,7 +75,7 @@ In this task, you will create and configure management groups.
1. On the **az104-02-mg1** blade, click **Subscriptions**.
1. On the **az104-02-mg1 \| Subscriptions** blade, click **+ Add**, on the **Add subscription** blade, in the **Subscription** drop-down list, seletc the subscription you are using in this lab and click **Save**.
1. On the **az104-02-mg1 \| Subscriptions** blade, click **+ Add**, on the **Add subscription** blade, in the **Subscription** drop-down list, select the subscription you are using in this lab and click **Save**.
>**Note**: On the **az104-02-mg1 \| Subscriptions** blade, copy the ID of your Azure subscription into Clipboard. You will need it in the next task.
@ -150,9 +150,9 @@ In this task, you will create an Azure Active Directory user, assign the RBAC ro
1. In the **InPrivate** browser window, in the Azure portal, search and select **All resources** to verify that the az104-02-aaduser1 user cannot see any resources.
1. In the **InPrivate** browser window, in the Azure portal, search and select **Help + support** and then click **+ New support request**.
1. In the **InPrivate** browser window, in the Azure portal, search and select **Help + support** and then click **+ Create a support request**.
1. In the **InPrivate** browser window, on the **Problem Description** tab of the **Help + support - New support request** blade, type **Service and subscription limits** in the Summary field and select the **Service and subscription limits (quotas)** issue type. Note that the subscription you are using in this lab is listed in the **Subscription** drop-down list.
1. In the **InPrivate** browser window, on the **Problem Desription/Summary** tab of the **Help + support - New support request** blade, type **Service and subscription limits** in the Summary field and select the **Service and subscription limits (quotas)** issue type. Note that the subscription you are using in this lab is listed in the **Subscription** drop-down list.
>**Note**: The presence of the subscription you are using in this lab in the **Subscription** drop-down list indicates that the account you are using has the permissions required to create the subscription-specific support request.

View File

@ -39,7 +39,7 @@ In this task, you will create a virtual network with multiple subnets by using t
1. Sign in to the [Azure portal](https://portal.azure.com).
1. In the Azure portal, search for and select **Virtual networks**, and, on the **Virtual networks** blade, click **+ Add**.
1. In the Azure portal, search for and select **Virtual networks**, and, on the **Virtual networks** blade, click **+ Create**.
1. Create a virtual network with the following settings (leave others with their default values):
@ -179,7 +179,7 @@ In this task, you will configure network security groups in order to allow for r
>**Note**: This is expected, because public IP addresses of the Standard SKU, by default, require that the network interfaces to which they are assigned are protected by a network security group. In order to allow Remote Desktop connections, you will create a network security group explicitly allowing inbound RDP traffic from Internet and assign it to network interfaces of both virtual machines.
1. In the Azure portal, search for and select **Network security groups**, and, on the **Network security groups** blade, click **+ Add**.
1. In the Azure portal, search for and select **Network security groups**, and, on the **Network security groups** blade, click **+ Create**.
1. Create a network security group with the following settings (leave others with their default values):
@ -234,7 +234,7 @@ In this task, you will configure network security groups in order to allow for r
In this task, you will configure DNS name resolution within a virtual network by using Azure private DNS zones.
1. In the Azure portal, search for and select **Private DNS zones** and, on the **Private DNS zones** blade, click **+ Add**.
1. In the Azure portal, search for and select **Private DNS zones** and, on the **Private DNS zones** blade, click **+ Create**.
1. Create a private DNS zone with the following settings (leave others with their default values):

View File

@ -278,7 +278,7 @@ In this task, you will configure and test routing between the two spoke virtual
> **Note**: Now you need to create and configure user defined routes on the spoke virtual networks.
1. In the Azure portal, search and select **Route tables** and, on the **Route tables** blade, click **+ Add**.
1. In the Azure portal, search and select **Route tables** and, on the **Route tables** blade, click **+ Create**.
1. Create a route table with the following settings (leave others with their default values):
@ -320,7 +320,7 @@ In this task, you will configure and test routing between the two spoke virtual
1. Click **OK**
1. Navigate back to **Route tables** blade and click **+ Add**.
1. Navigate back to **Route tables** blade and click **+ Create**.
1. Create a route table with the following settings (leave others with their default values):
@ -387,7 +387,7 @@ In this task, you will configure and test routing between the two spoke virtual
In this task, you will implement an Azure Load Balancer in front of the two Azure virtual machines in the hub virtual network
1. In the Azure portal, search and select **Load balancers** and, on the **Load balancers** blade, click **+ Add**.
1. In the Azure portal, search and select **Load balancers** and, on the **Load balancers** blade, click **+ Create**.
1. Create a load balancer with the following settings (leave others with their default values):
@ -492,7 +492,7 @@ In this task, you will implement an Azure Application Gateway in front of the tw
> **Note**: This subnet will be used by the Azure Application Gateway instances, which you will deploy later in this task. The Application Gateway requires a dedicated subnet of /27 or larger size.
1. In the Azure portal, search and select **Application Gateways** and, on the **Application Gateways** blade, click **+ Add**.
1. In the Azure portal, search and select **Application Gateways** and, on the **Application Gateways** blade, click **+ Create**.
1. On the **Basics** tab of the **Create an application gateway** blade, specify the following settings (leave others with their default values):
@ -549,11 +549,11 @@ In this task, you will implement an Azure Application Gateway in front of the tw
| Target type | **Backend pool** |
| Backend target | **az104-06-appgw5-be1** |
1. Click **Add new** under to the **HTTP setting** text box, and, on the **Add an HTTP setting** blade, specify the following settings (leave others with their default values):
1. Click **Add new** under to the **HTTP settings** text box, and, on the **Add an HTTP setting** blade, specify the following settings (leave others with their default values):
| Setting | Value |
| --- | --- |
| HTTP setting | **az104-06-appgw5-http1** |
| HTTP settings Name | **az104-06-appgw5-http1** |
| Backend protocol | **HTTP** |
| Backend port | **80** |
| Cookie-based affinity | **Disable** |

View File

@ -76,7 +76,7 @@ In this task, you will deploy an Azure virtual machine that you will use later i
In this task, you will create and configure an Azure Storage account.
1. In the Azure portal, search for and select **Storage accounts**, and then click **+ New**.
1. In the Azure portal, search for and select **Storage accounts**, and then click **+ Create**.
1. On the **Basics** tab of the **Create storage account** blade, specify the following settings (leave others with their default values):

View File

@ -40,7 +40,7 @@ In this task, you will deploy Azure virtual machines into different availability
1. Sign in to the [Azure portal](http://portal.azure.com).
1. In the Azure portal, search for and select **Virtual machines** and, on the **Virtual machines** blade, click **+ Add**.
1. In the Azure portal, search for and select **Virtual machines** and, on the **Virtual machines** blade, click **+ Create**.
1. On the **Basics** tab of the **Create a virtual machine** blade, specify the following settings (leave others with their default values):
@ -52,7 +52,7 @@ In this task, you will deploy Azure virtual machines into different availability
| Region | select one of the regions that support availability zones and where you can provision Azure virtual machines |
| Availability options | **Availability zone** |
| Availability zone | **1** |
| Image | **Windows Server 2019 Datacenter - Gen1** |
| Image | **Windows Server 2019 Datacenter - Gen1/Gen2** |
| Azure Spot instance | **No** |
| Size | **Standard D2s v3** |
| Username | **Student** |

View File

@ -38,7 +38,7 @@ In this task, you will create an Azure web app.
1. Sign in to the [**Azure portal**](http://portal.azure.com).
1. In the Azure portal, search for and select **App services**, and, on the **App Services** blade, click **+ Add**.
1. In the Azure portal, search for and select **App services**, and, on the **App Services** blade, click **+ Create**.
1. On the **Basics** tab of the **Web App** blade, specify the following settings (leave others with their default values):
@ -65,7 +65,7 @@ In this task, you will create a staging deployment slot.
1. On the blade of the newly deployed web app, click the **URL** link to display the default web page in a new browser tab.
1. Close the new browser tab and, back in the Azure portal, in the **Deployment** section of the web app blade, click **Deployment slots**.
1. Close the new browser tab and, back in the Azure portal, in the **Deployment** section of the web app blade, click **Add a Deployment slot**.
>**Note**: The web app, at this point, has a single deployment slot labeled **PRODUCTION**.

View File

@ -34,7 +34,7 @@ In this task, you will create a new container instance for the web application.
1. Sign in to the [Azure portal](https://portal.azure.com).
1. In the Azure portal, search for locate **Container instances** and then, on the **Container instances** blade, click **+ New**.
1. In the Azure portal, search for locate **Container instances** and then, on the **Container instances** blade, click **+ Create**.
1. On the **Basics** tab of the **Create container instance** blade, specify the following settings (leave others with their default values):

View File

@ -56,7 +56,7 @@ In this task, you will register resource providers necessary to deploy an Azure
In this task, you will deploy an Azure Kubernetes Services cluster by using the Azure portal.
1. In the Azure portal, search for locate **Kubernetes services** and then, on the **Kubernetes services** blade, click **+ Add**, and then click **+ Add Kubernetes cluster**.
1. In the Azure portal, search for locate **Kubernetes services** and then, on the **Kubernetes services** blade, click **+ Create**, and then click **+ Create a Kubernetes cluster**.
1. On the **Basics** tab of the **Create Kubernetes cluster** blade, specify the following settings (leave others with their default values):
@ -92,7 +92,7 @@ In this task, you will deploy an Azure Kubernetes Services cluster by using the
| Network configuration | **kubenet** |
| DNS name prefix | any valid, globally unique DNS host name |
1. Click **Next: Integration >**, on the **Integration** tab of the **Create Kubernetes cluster** blade, set **Container monitoring** to **Disabled**, click **Review + create**, ensure that the validation passed and click Create.
1. Click **Next: Integrations >**, on the **Integrations** tab of the **Create Kubernetes cluster** blade, set **Container monitoring** to **Disabled**, click **Review + create**, ensure that the validation passed and click Create.
>**Note**: In production scenarios, you would want to enable monitoring. Monitoring is disabled in this case since it is not covered in the lab.

View File

@ -71,7 +71,7 @@ In this task, you will deploy two virtual machines that will be used to test dif
In this task, you will create a recovery services vault.
1. In the Azure portal, search for and select **Recovery Services vaults** and, on the **Recovery Services vaults** blade, click **+ New**.
1. In the Azure portal, search for and select **Recovery Services vaults** and, on the **Recovery Services vaults** blade, click **+ Create**.
1. On the **Create Recovery Services vault** blade, specify the following settings:
@ -79,7 +79,7 @@ In this task, you will create a recovery services vault.
| --- | --- |
| Subscription | the name of the Azure subscription you are using in this lab |
| Resource group | the name of a new resource group **az104-10-rg1** |
| Name | **az104-10-rsv1** |
| Vault Name | **az104-10-rsv1** |
| Region | the name of a region where you deployed the two virtual machines in the previous task |
>**Note**: Make sure that you specify the same region into which you deployed virtual machines in the previous task.

View File

@ -82,7 +82,7 @@ In this task, you will deploy a virtual machine that will be used to test monito
In this task, you will create and configure an Azure Log Analytics workspace and Azure Automation-based solutions
1. In the Azure portal, search for and select **Log Analytics workspaces** and, on the **Log Analytics workspaces** blade, click **+ Add**.
1. In the Azure portal, search for and select **Log Analytics workspaces** and, on the **Log Analytics workspaces** blade, click **+ Create**.
1. On the **Basics** tab of the **Create Log Analytics workspace** blade, enter the following settings, click **Review + Create** and then click **Create**:
@ -97,7 +97,7 @@ In this task, you will create and configure an Azure Log Analytics workspace and
>**Note**: Wait for the deployment to complete. The deployment should take about 1 minute.
1. In the Azure portal, search for and select **Automation Accounts**, and on the **Automation Accounts** blade, click **+ Add**.
1. In the Azure portal, search for and select **Automation Accounts**, and on the **Automation Accounts** blade, click **+ Create**.
1. On the **Add Automation Account** blade, specify the following settings, and click **Create**: