Implementing Custom domain to Azure App Service
Sign in to Azure Open the Azure portal and sign in with your Azure account. Navigate to the app in the Azure portal From the left menu, select App Services, and then select the name […]
Sign in to Azure Open the Azure portal and sign in with your Azure account. Navigate to the app in the Azure portal From the left menu, select App Services, and then select the name […]
When you try to create resourse in Azure CLI and you get this error message: You does not have authorization to perform action. ‘Microsoft.Storage/register/action’ over scope. This error happened because your account is not set […]
By deploying an application, service, or component, you distribute it for installation on other computers, devices, servers, or in the cloud. You choose the appropriate method in Visual Studio for the type of deployment that […]
This blog post shows how to create web Apps and App Service plans in Azure Azure App Service plan overview In App Service, an app runs in an App Service plan. An App Service plan […]
An Availability Set is a logical grouping capability that you can use in Azure to ensure that the VM resources you place within it are isolated from each other when they are deployed within an […]
A virtual machine scale set allows you to deploy and manage a set of identical, auto-scaling virtual machines. You can scale the number of VMs in the scale set manually, or define rules to autoscale […]
Azure virtual machines (VMs) can be created through the Azure portal. The Azure portal is a browser-based user interface to create VMs and their associated resources. In this post I’ll show you how to use […]
Enable Azure VM boot diagnostics with Azure Portal to capture logs that can help you troubleshoot boot failures and obtain screenshots to see the VM’s current state. In the Management tab, under Monitoring, make sure […]
An Azure storage account contains all of your Azure Storage data objects: blobs, files, queues, tables, and disks. Data in your Azure storage account is durable and highly available, secure, massively scalable, and accessible from […]
Security rules in network security groups enable you to filter the type of network traffic that can flow in and out of virtual network subnets and network interfaces. In this post, you will learn how […]