Azure Quickstart Templates
Deploy Azure resources through the Azure Resource Manager with community contributed templates to get more done. Deploy, learn, fork and contribute back.
What is Azure Resource Manager
Azure Resource Manager allows you to provision your applications using a declarative template. In a single template, you can deploy multiple services along with their dependencies. You use the same template to repeatedly deploy your application during every stage of the application lifecycle.
33 templates match your filter.
The SAS Viya Quickstart Template for Azure deploys these products on the cloud: SAS Visual Analytics 8.3.1 on Linux. SAS Visual Statistics 8.3.1 on Linux and SAS Visual Data Mining and Machine Learning 8.3.1 on Linux. This Quickstart is a reference architecture for users who want to deploy the SAS Viya platform, using microservices and other cloud-friendly technologies. By deploying the SAS platform on Azure, you get SAS analytics, data visualization, and machine learning capabilities in an Azure-validated environment. SAS Viya is a cloud-enabled, in-memory analytics engine. It uses elastic, scalable, and fault-tolerant processing to address complex analytical challenges. SAS Viya provides faster processing for analytics by using a standardized code base that supports programming in SAS, Python, R, Java, and Lua. It also supports cloud, on-premises, or hybrid environments and deploys seamlessly to any infrastructure or application ecosystem.
This template allows deploying a linux VM using new or existing resources for the Virtual Network, Storage and Public IP Address. It also allows for choosing between SSH and Password authenticate. The templates uses conditions and logic functions to remove the need for nested deployments.
This template creates an Azure Web App with Access Restriction for an Application Gateway v2. The Application Gateway is deployed in a vNet (subnet) which has a 'Microsoft.Web' Service Endpoint enabled. The Web App restricts access to traffic from the subnet.
This template creates an Application Gateway v2 with Web Application Firewall v2. This template is used by the Azure Application Gateway documentation Samples.
This template creates an application gateway with Web Application Firewall functionality in a virtual network and sets up load balancing rules for any number of virtual machines
This template allows you to deploy a simple Ubuntu VM Scale Set integrated with Azure Application Gateway, and supports up to 1000 VMs
This template uses the Azure Linux CustomScript extension to deploy an Azure Application Gateway Log Analyzer using GoAccess. The deployment template creates an Ubuntu VM, installs Application Gateway Log Processor, GoAccess, Apache WebServer and configures it to analyze Azure Application Gateway access logs.
This template creates an application gateway with Rewrite functionalities in a virtual network and sets up load balancing, rewrite rules
This template creates an application gateway v2 in a virtual network and sets up auto scaling properties and an HTTP load-balancing rule with public frontend
This template creates a WordPress site on Container Instance in a virtual network. And output a public site FQDN which could access WordPress site.
This template creates a new Active Directory forest, with an optional subdomain. You can choose to have either one or two DCs per domain. The network configuration is highly configurable, making it suitable to fit into an existing environment. The VMs use managed disks and have no dependency on storage accounts. As an operating system you can choose between Windows Server 2012, Windows Server 2012 R2, and Windows 2016. This template illustrates the use of nested templates, Powershell DSC, and other advanced concepts.
This template deploys a Virtual Network, segregates the network through subnets, deploys VMs and configures load balancing
This template deploys IOMAD as a LAMP application on Ubuntu. It creates a one or more Ubuntu VM for the front end and a single VM for the backend. It does a silent install of Apache and PHP on the front end VM's and MySQL on the backend VM. Then it deploys IOMAD on the cluster. It configures a load balancer for directing requests to the front end VM's. It also configures NAT rules to allow admin access to each of the VM's. It also sets up a moodledata data directory using file storage shared among the VM's. After the deployment is successful, you can go to /iomad on each frontend VM (using web admin access) to start configuring IOMAD.
An App Service Environment is a Premium service plan option of Azure App Service that provides a fully isolated and dedicated environment for securely running Azure App Service apps at high scale, including Web Apps, Mobile Apps, and API Apps.
This template allows you to quickly deploy Azure Traffic Manager on top of Application Gateways demo to test traffic distribution between different regions.
This template creates a redundant haproxy setup with 2 Ubuntu VMs configured behind Azure load balancer with floating IP enabled. Each of the Ubuntu VMs run haproxy to load balance requests to other application VMs (running Apache in this case). Keepalived enables redundancy for the haproxy VMs by assigning the floating IP to the MASTER and blocking the load-balancer probe on the BACKUP. This template also deploys a Storage Account, Virtual Network, Public IP address, Network Interfaces.
This template creates an application gateway in front of an Azure Web App with IP restriction enabled on the Web App.
This template deploys an Application Gateway with enhanced probe functionality.
This template deploys an Application Gateway and shows usage of the path override feature for a backend address pool.
This template creates an application gateway in front of two Azure Web Apps with a custom probe enabled.
This template demonstrates deploying a simple scale set with load balancer, inbound NAT rules, and public IP per VM.
This template deploys an Application Gateway configured with a custom ssl policy.
This template deploys an Application Gateway configured with a predefined ssl policy.