You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/create-cli-complete.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,8 +6,9 @@ ms.service: virtual-machines
6
6
ms.custom: devx-track-azurecli
7
7
ms.collection: linux
8
8
ms.topic: how-to
9
-
ms.date: 12/14/2017
9
+
ms.date: 3/29/2023
10
10
ms.author: cynthn
11
+
ms.reviewer: mattmcinnes
11
12
---
12
13
# Create a complete Linux virtual machine with the Azure CLI
13
14
@@ -132,15 +133,15 @@ Output:
132
133
133
134
134
135
## Create a network security group
135
-
To control the flow of traffic in and out of your VMs, you apply a network security group to a virtual NIC or subnet. The following example uses [az network nsg create](/cli/azure/network/nsg) to create a network security group named *myNetworkSecurityGroup*:
136
+
To control the flow of traffic in and out of your VMs, apply a network security group to a virtual NIC or subnet. The following example uses [az network nsg create](/cli/azure/network/nsg) to create a network security group named *myNetworkSecurityGroup*:
136
137
137
138
```azurecli
138
139
az network nsg create \
139
140
--resource-group myResourceGroup \
140
141
--name myNetworkSecurityGroup
141
142
```
142
143
143
-
You define rules that allow or deny specific traffic. To allow inbound connections on port 22 (to enable SSH access), create an inbound rule with [az network nsg rule create](/cli/azure/network/nsg/rule). The following example creates a rule named *myNetworkSecurityGroupRuleSSH*:
144
+
You define rules that allow or deny specific traffic. To allow inbound connections on port 22 (to enable [SSH access](/azure/virtual-machines/linux-vm-connect), create an inbound rule with [az network nsg rule create](/cli/azure/network/nsg/rule). The following example creates a rule named *myNetworkSecurityGroupRuleSSH*:
144
145
145
146
```azurecli
146
147
az network nsg rule create \
@@ -468,7 +469,7 @@ The output notes fault domains and update domains:
468
469
469
470
470
471
## Create a VM
471
-
You've created the network resources to support Internet-accessible VMs. Now create a VM and secure it with an SSH key. In this example, let's create an Ubuntu VM based on the most recent LTS. You can find additional images with [az vm image list](/cli/azure/vm/image), as described in [finding Azure VM images](cli-ps-findimage.md).
472
+
You've created the network resources to support Internet-accessible VMs. Now create a VM and secure it with an [SSH key](/azure/virtual-machines/linux/create-ssh-keys-detailed). In this example, let's create an Ubuntu VM based on the most recent LTS. You can find additional images with [az vm image list](/cli/azure/vm/image), as described in [finding Azure VM images](cli-ps-findimage.md).
472
473
473
474
Specify an SSH key to use for authentication. If you do not have an SSH public key pair, you can [create them](mac-create-ssh-keys.md) or use the `--generate-ssh-keys` parameter to create them for you. If you already have a key pair, this parameter uses existing keys in `~/.ssh`.
474
475
@@ -538,7 +539,7 @@ See "man sudo_root" for details.
538
539
azureuser@myVM:~$
539
540
```
540
541
541
-
You can install NGINX and see the traffic flow to the VM. Install NGINX as follows:
542
+
You can install [NGINX](https://nginx.org/en/) and see the traffic flow to the VM. Install NGINX as follows:
0 commit comments