As part of supporting an Azure Admin in managing cloud resources, I assist with specific tasks rather than maintaining the entire infrastructure. Currently, one Linux virtual machine (VM) is under-utilised, and there’s a requirement to deploy a new Linux VM to act as an FTP server. To ensure effective monitoring of network traffic and resource utilization for the FTP server, the Azure Admin has requested the creation of a dedicated subnet. The existing subnet will remain unchanged to accommodate future VM deployments. Here is a simple guide to provisioning a subnet for a Linux FTP Server. To achieve this goal, you need to follow a step-by-step guide as stated bellow
Create a new subnet on an existing virtual network (vNet)
- Login to Microsoft Azure at (Azure Portal)[https://portal.azure.com]
- From the Azure portal home page, in the search box, enter virtual networks.
- Select virtual networks under services.
- Select the guided-project-vnet virtual network.
- From the guided-project-vnet blade, under settings, select Subnets.
- To add a subnet, select + Subnet.
- For Subnet purpose leave it as Default.
- For Name enter: ftpSubnet.
- Leave the rest of the settings alone and select Add.
- Select Home to return to the Azure portal home page.
Create a network security group
- From the Azure portal home page, in the search box, enter virtual networks.
- Select virtual networks under services.
- Select Network security groups.
- Select + Create.
- Verify the subscription is correct.
- Select the guided-project-rg resource group.
- Enter ftpNSG for the network security group name.
- Select Review + create.
- Once the validation is complete, select Create.
- Wait for the screen to refresh and display Your deployment is complete.
- Select Go to resource.
Create an inbound security rule
- Under settings, select Inbound security rules.
- Select + Add.
- Change the Destination port ranges from 8080 to 22.
- Select TCP for the protocol.
- Set the name to ftpInbound.
- Select Add.
- Select Home to return to the Azure portal home page.
Associate a network security group to a subnet
- From the Azure portal home page, in the search box, enter virtual networks.
- Select virtual networks under services.
- Select the guided-project-vnet virtual network.
- Under settings, select Subnets.
- Select the ftpSubnet you created.
- On the Edit subnet page, under the Security section heading,
update the Network security group field to ftpNSG.
- Select Save.
Conclusion
In Azure, planning network segmentation and resource allocation is essential for performance, monitoring, and security. By provisioning a new subnet for an FTP server, the infrastructure becomes more organised, maintainable, and transparent for administrators tracking usage metrics. This approach exemplifies proactive cloud governance and prepares the environment for future scaling needs.
Top comments (1)
Nice