Question : You are managing a virtual macine on Azure Cloud Service, name of the VM is QuickVM. You have created an application which help user to quickly upload the files (Similar to Google Drive). You need to ensure that the VM sends notification in the event that avaerage response time for the web service exceeds 10 mins (Pre-defined). Select the steps from below which you need to accomplish in sequence.
A. From the Configuration page, add a monitoring endpoint for the virtual machine B. From the Monitor page add a Metric for response time for endpoint C. From monitoring page, add a rule for the response time of the end point D. From the Dashboard page, add a rule for the endpoint status. E. From the Configuration page, add a rule for the response time of the endpoint. 1. A,B,C 2. B,C,D 3. Access Mostly Uused Products by 50000+ Subscribers 4. A,D,E 5. A,C,E
Correct Answer : Get Lastest Questions and Answer : Exp: You have to ping the site from different places to check if your website is returning "200" as its status code. You have a series of option from free to paid service. System Center Global Service Monitor in System Center 2012 Operations Manager is another good option to monitor availability, performance and reliability of your website.
But If you are using azure then you are lucky to have everything right at home. All the features that you might need are probably already in Azure. Website endpoint monitoring is one of them. Endpoint monitoring lets you monitor the availability of HTTP or HTTPS endpoints from geo-distributed locations.
The monitoring section allows you to add up to two URLs for monitoring. Add a friendly name for each URL and select the locations around the world from where you wish to monitor your sites availability. Each of the provided URL can be ping from up to 3 test locations. After you have saved the configuration, the Web Site's URL will be tested periodically (in every 5 minutes) from each of the configured locations.
To see the results of the tests select your website from the new portal and you will see a nice visualization on the dashboard.
Availability is monitored using HTTP response codes, and response time. A monitoring test fails if the HTTP response code is greater than or equal to 400 or if the response takes more than 30 seconds. An endpoint is considered available if its monitoring tests succeed from all the specified locations.
The dashboard will periodically update the status of monitoring result that you can drill into for further investigation. This is indeed good to have some live status of your ping result but this is not feasible to monitor this dashboard 24x7. One thing that you are probably saying is "What good it could be if it can't notify in extreme failure?"
Well, in the world of azure you are blessed with enormous feature. You can certainly create a rule to send you notification if certain threshold meets the bar. For example you can add rule to send you mail if the uptime is greater than a value % you expected, or when your visitor getting a certain HTTP status code as response.
To do so, click the Add alert option from the Metric blade.
Clicking the Add alert option will open up a new blade from where you can set the limits (with condition) and the email address where you expecting to get alert notification.
End point monitoring is one of the cool feature that you should implement in order to make sure you site is accessible from around the world and even if its get down for any particular reason, you get the alert notification on your email asap so that you can take steps to fix it for the production site.
Question : You are managing a virtual machine on Azure Cloud Service, name of the VM is QuickVM inside QuickCloudService. By looking at the logs you found unauthorized traffic to QuickVM. You need to Create a rule to limit access to QuickVM, Also make sure that the new rule has the highest precedence. Which Azure Power Shell cmdlets and values should you use?
Correct Answer : Get Lastest Questions and Answer : Exp: To retrieve a complete list of the ACL PowerShell cmdlets, you can use either of the following:
get-help *-AzureACL*
get-command -module azure -name *ACL*
Here we will look at how we create a new ACL that contains rules. This ACL will be applied to a virtual machine endpoint (in our case endpoint on our AZR-DC2 virtual machine).
he ACL rules will allow access from our on premise subnet only. To create a new Network ACL with permit rules for a remote subnet, open a Windows Azure PowerShell ISE and use the following command to build your script and once completed, execute it.
first line we will create the new network ACL object.
$acl1 = New-AzureAclConfig
Set a rule that permits access from our on premise network. you set rule 100 (which has priority over rule 200 and higher) to allow the remote subnet 192.168.11.0/24 access to the virtual machine endpoint. Replace the values with your own configuration requirements. The name "Remote Desktop ACL Config" can be replaced with any friendly name that you want to call this rule.
For additional rules, repeat the cmdlet, replacing the values with your own configuration requirements. Be sure to change the rule number Order to reflect the order in which you want the rules to be applied. The lower rule number takes precedence over the higher number.
Next, you can either create a new endpoint (Add) or set the ACL for an existing endpoint (Set). for us, we will set an existing endpoint called "RDP" and update the virtual machine endpoint with the ACL settings.
Set-AzureAclConfig Sets an access control list (ACL) configuration. This cmdlets sets the ACL configuration object for an existing virtual machine configuration.
-ACL Specifies the ACL object that you want to modify.
-Action Specifies whether the rule will permit or deny incoming network traffic from the specified remote subnet. The value must be either Permit or Deny.
-AddRule Updates the ACL object by adding a rule.
-Description Provides a description of the rule.
-Order Specifies the relative order in which this rule should be processed compared to the other rules applied to the ACL object. The lowest order takes precedence.
-RemoteSubnet Specifies the remote subnet address to which this rule applies. The address must be a valid Classless Inter-Domain Routing (CIDR) address. For example, 10.0.0.0/8.
-RemoveRule Updates the ACL object by removing a rule.
-RuleId Provides an ID number for the rule.
-SetRule Updates the ACL object by modifying an existing ACL rule.
Example 1 This example uses two commands: The first command creates a new ACL object and stores it in a variable named $acl1. The second command updates the ACL object with a rule that permits incoming network traffic only from remote subnet 10.0.0.0/8.
Windows PowerShell PS C:\> $acl1 = New-AzureAclConfigC:\PS> Set-AzureAclConfig -AddRule -ACL $acl1 -Order 100 -Action permit -RemoteSubnet "10.0.0.0/8" -Description "Sharepoint ACL config" Example 2 This example uses three commands: The first command get an object for a virtual machine named MyVM, passes it through the pipeline to get the ACL configuration for one of the endpoints of the virtual machine, and stores this in a variable named $acl. The second command updates the ACL object by modifying an existing rule with an ID, order, and description. The third command updates the virtual machine.
Windows PowerShell PS C:\> $acl = Get-AzureVM -ServiceName "MyService" -Name "MyVM" | Get-AzureAclConfig -EndpointName "Web"C:\PS> Set-AzureAclConfig -SetRule -ID 0 -ACL $acl -Order 102 -Description "New Description"C:\PS> Get-AzureVM -ServiceName "MyService" -Name "MyVM" | Set-AzureEndpoint -ACL $acl -Name "Web" | Update-AzureVM Example 3 This example uses three commands: The first command get an object for a virtual machine named MyVM, passes it through the pipeline to get the ACL configuration for one of the endpoints of the virtual machine, and stores this in a variable named $acl. The second command updates the ACL object by removing a rule. The third command updates the virtual machine.
Acmeshell Inc. (Mumbai) QuickTechie Inc. (Banglore)
Both have their virtual machine hosted in Azure cloud. You have been given to maintain virtual networks as well azure environment. Now you are done with network merge and related stuff. Now some of the employees do work from remote location as well as from public locations. All users required from both companies require to access virtual networks. Select which secure cross premise connectivity option is needed for each type of user.
1. Backoffice User : Site to Site, Remote Users : Point to Site
2. Backoffice User : Multi Site, Remote Users : Point to Site
4. Backoffice User : Multi Site, Remote Users : Multi Site
Correct Answer : Get Lastest Questions and Answer : Exp: Site-to-Site connections can be used for cross-premises and hybrid configurations. Site-to-site VPNs connect entire networks to each other -- for example, connecting a branch office network to a company headquarters network. In a site-to-site VPN, hosts do not have VPN client software; they send and receive normal TCP/IP traffic through a VPN gateway.
A Point-to-Site (P2S) configuration lets you create a secure connection from an individual client computer to a virtual network. A P2S connection is useful when you want to connect to your VNet from a remote location, such as from home or a conference, or when you only have a few clients that need to connect to a virtual network.