Skill 3.3 Configure VMs Flashcards
What are the ways to create a VM in Azure
Azure Portal
Azure Powershell and CLI
Azure REsource Manager
What is Azure Key Vault
Used to encrypt Azure VMs
If you want to create a disk using a customer managed key (cmk) what do you need to do
create a disk encryption set first
What are the three Server Side Encryption Models
1.service-managed key
2. customer-managed key
3. service-managed keys in customer controlled hardware
What is the Service managed key server side encryption model
Provides a combination of control and convenience with low overhead
Describe Customer-Managed Keys Server-side encryption model
Gives you control over your keys, including bringing your own key(BYOK) support or allows you to generate new ones
Describe Service-Managed keys in customer-controlled hardware
Enables you to manage keys in your own proprietary respository outside of MSFT control. This is called host your own key (HYOK). It’s complex and not supported by most services
Where can VMs be moved to
a different resource group, subscription, availability zone, and another region.
What is a risk of moving a VM
any existing scripts that target this resource will quit working until they are updated
How can you retrieve a resource ID
By using Azure Portal, Powershell or CLI
General Purpose VM
Small to medium scale development environments. Has a balanced CPU-to-Memory ratio
Compute Optimized VM
Used for CPU intensive workloads in medium-scale environments. Ideal for networking appliances or batch process in a small environment
Memory optimized CPU
This size type provides higher memory compared to CPU and is ideal for medium-scale database servers. With high memory, these sizes can be used for caches, or it can be used in memory analytics.
Storage Optimized
Offers high disk throughput and IO, good for large transactional databases like Cassandra, MongoDB, and so on. It can be used for Big Data and data warehousing.
GPU Optimized
Provides VMs with one or many NVIDIA GPUs. It provides high compute and graphics, which are ideal for visualization workloads.
High Performance Compute
Capable of handling batch processing, molecular modeling, and fluid dynamics. This type offers substantial CPU power and diverse options for low-latency RDMA networking using FDR InfiniBand and several memory configurations to support memory-intensive computational requirements.
What are primary considerations when changing a VM size
you must ensure that the region your VM is deployed to supports the instance size that is desired,
new size must be supported in teh current hardware cluster
What must be done before changing a hardware cluster
All the VMs in the availability set must be restarted
What are the sources for creating a new managed disk
Snapshot – If selected, you can browse for snapshots in the current subscription and location
storage blob – allows you to browse storage accounts in all subscriptions that you have access to
none – new VM is created
What options can be set in the networking blade when provisioning a new virtual machien
Virtual network, subnet, and public IP
Network security group for the NIC
public inbound ports that should be open
if accellerated networking should be enabled
If the VM should be included in an exisitng load balancer
Networking Security Group
networking filter containing a list of security rules which control network traffic when applied
Application Security Group (ASG)
Enables you to define network security policies based on workloads with rules focused on applications instead of IP and network addresses
What is accelerated Networking
enables single root I/O virtualization to a virtual machine which improves networking performance
What are the requirements for accelerated networkign
VM must be a supported size
VM must use a supported Azure Gallery Image
All VMs in an availability set or VMSS must be stopped/deallocated before activate
VM size requirements for accelerated networking
supported on most general-purpose and compute-optimized vms with two or more vCPUs.
If hyperthreading is supported then it needs four or more CPU
what Windows based images support accelerated networking
Server 2019 datacenter
Server 2016 datacenter
Server 2012 R2 Datacenter
What are common use cases for having multiple NIC
Network and Security function s
Network Isolation
Bandwidth Isolation
What is the maximum length for usernames when connecting to a windows machine
20 characters
What are the minimum and maximum lengths that a password can be in Windows-Based Azure virtual machines
12 -123
What are the authentication options for Linux-based virtual machines
You can specify an existing SSH public key or a password when creating a Linux VM, Linux usernames must be between 1 and 32 characters in length
What happens when you redeploy a VM
It moves the VM to a new host within Azure
What is the cmdlet to redeploy a VM using powershell
Set-AzVM
What is the command to redeploy Azure resources using Azure CLI
AZ vm redeploy