Creating a Windows Virtual Machine and Availability Set at the same time using the Azure Portal
In this article, you are creating a new Windows virtual machine and Availability set at the same time using the Azure portal. An Availability sets provide redundancy to your application during downtime, such as during maintenance. We need at least two or more similarly configured virtual machines in an availability set. The primary purpose of an availability set is to provide resiliency to failure of a single virtual machine. This will meet the 99.95% Azure SLA. Virtual machines must be created in the same resource group as the availability set. For example, when you add two virtual machines into an availability set, Azure automatically assigns different fault and update domain to each virtual machine. Fault domain define the group of virtual machines that share a common power source and network switch. Update domains define the group of virtual machines that can share the same hardware host. You have the option of creating a new availability set while deploying a new virtual machine, or creating a new availability set first and then adding virtual machine to it. Perform the following steps: 1. Sign in to the Azure portal at https://portal.azure.com. 2. On the Hub menu, click New, click Compute, and then click Windows Server 2016 Datacenter. 3. On the Windows Server 2016 Datacenter page, under Select a deployment model, select Resource Manager, and then click Create. 4. On the Create virtual machine blade, click Basics. Enter Unique VM Name, VM disk type, User name and Password, Subscription, Azure Resource Group (New or Existing), Azure DataCenter Location (Region) and click OK. 5. On Choose a size, to see more sizes, click View all and then select an appropriate virtual-machine size for your needs. Defines VM characteristics like CPU, Memory and Disk. Click Select. 6. On the Configuration features Settings, default Storage account is created if you have not, default Network is created, default Subnet mask and IP address is assigned. In the Network security group (firewall) settings, default inbound rule RDP (TCP/3389) is created.