Modelos de Início Rápido do Azure
Implemente recursos do Azure através do Gestor de Recursos do Azure com modelos fornecidos pela comunidade para produzir mais. Implemente, aprenda, distribua e contribua de volta.
O que é o Gestor de Recursos do Azure
O Gestor de Recursos do Azure permite utilizar modelos declarativos para aprovisionar as suas aplicações. Num único modelo, pode implementar vários serviços, bem como as respetivas dependências. Pode utilizar o mesmo modelo para implementar repetidamente a sua aplicação durante cada fase do ciclo de vida da aplicação.
A mostrar todos os 24 modelos. Refinar os resultados com a pesquisa.
This example deploys an Azure Function app and an HTTP-triggered function inline in the template. It also deploys a Key Vault and populates a secret with the function app's host key.
This sample shows how to a deploy a private AKS cluster with a Public DNS Zone.
This template enables encryption on a running windows vm.
This template creates a Key Vault and a list of secrets within the key vault as passed along with the parameters
This sample shows how to deploy an AKS cluster with Application Gateway, Application Gateway Ingress Controller, Azure Container Registry, Log Analytics and Key Vault
The SAS® 9.4 and Viya QuickStart Template for Azure deploy these products on the cloud: SAS® Enterprise BI Server 9.4, SAS® Enterprise Miner 15.1, and SAS® Visual Analytics 8.5 on Linux, and SAS® Visual Data Mining and Machine Learning 8.5 on Linux for Viya. This QuickStart is a reference architecture for users who wants to deploy the combination of SAS® 9.4 and Viya on Azure using cloud-friendly technologies. By deploying the SAS® platform on Azure, you get an integrated environment of SAS® 9.4 and Viya environments so you can take advantage of both worlds. SAS® Viya is a cloud-enabled, in-memory analytics engine. It uses elastic, scalable, and fault-tolerant processing to address complex analytical challenges. SAS® Viya provides faster processing for analytics by using a standardized code base that supports programming in SAS®, Python, R, Java, and Lua. It also supports cloud, on-premises, or hybrid environments and deploys seamlessly to any infrastructure or application ecosystem.
This template creates a new encrypted managed disks windows vm using the server 2k12 gallery image.
This template allows you to deploy a simple VM Scale Set of Windows VMs using the lastest patched version of serveral Windows versions. This template also deploys a jumpbox with a public IP address in the same virtual network. You can connect to the jumpbox via this public IP address, then connect from there to VMs in the scale set via private IP addresses.This template enables encryption on the VM Scale Set of Windows VMs.
This template enables encryption on a running Windows VM Scale Set
This template creates a new encrypted windows vm using the server 2k12 gallery image.
This template creates an AKS compute target in given Azure Machine Learning service workspace with a private IP address.
This template deploys an API Management service configured with User Assigned Identity. It uses this identity to fetch SSL certificate from KeyVault and keeps it updated by checking every 4 hours.
This template creates an Azure Firewall Premium and Firewall Policy with premium features such as Intrusion Inspection Detection (IDPS), TLS inspection and Web Category filtering
This template creates an App Service Environment with an Azure SQL backend along with private endpoints along with associated resources typically used in an private/isolated environment.
This template creates an Azure Machine Learning service workspace.
This template creates Azure Machine Learning workspace with multiple datasets & datastores.
This template creates an Azure Key Vault and an Azure Storage account that is used for logging. It optionally creates resource locks to protect your Key Vault and storage resources.
This sample shows how to use configure a virtual network and private DNS zone to access Key Vault via private endpoint.
A template that creates Azure Machine Learning workspace with private endpoints and resources behind VNET
Add an access policy to an existing KeyVault without removing existing policies.
This template deploys an Application Gateway V2 in a Virtual Network, a user defined identity, Key Vault, a secret (cert data), and access policy on Key Vault and Application Gateway.