Use Bicep to deploy an Ubuntu Linux virtual machine in Azure
This article describes how to use a Bicep file to deploy an Azure virtual network, network security group, and an Ubuntu Linux virtual machine. Bicep syntax improves the authoring experience for Azure resource deployments compared to traditional Azure Resource Manager templates written in JSON. When a Bicep file is deployed, the code is converted to JSON to create Azure resources.
Prerequisites
- Azure subscription. If you don’t have an Azure subscription you can create a free account.
- Visual Studio Code and the Bicep extension.
- PowerShell and the Azure PowerShell module.
- Bicep CLI.
Review the Bicep file
The Bicep file deploys all the resources needed to create a virtual machine (VM). The file uses defaults for the VM size and operating system version, but there are other allowed values. The Bicep file includes a newOrExisting
parameter so that it’s reusable to create more VMs in the same virtual network (VNet) and subnet.
The following resources are deployed:
- Network security group that allows internal VNet connections and blocks external connections.
- Virtual network that includes a subnet for the virtual machine.
- Public IP address that’s used for SSH connections and uses just-in-time (JIT) connections.
- Network interface that’s associated with the VM’s IP addresses.
- An Ubuntu Linux virtual machine.
Open a new file in Visual Studio Code. Then, copy and paste the following Bicep file and save it as linux-vm.bicep on your computer.
@description('Enter a location. Defaults to the resource group location.')
param location string = resourceGroup().location
@description('Enter a Linux virtual machine name with a maximum of 61 characters. During deployment the suffix -vm is added to the name (64 characters total).')
@maxLength(61)
param vmName string
@description('Enter the admin user account name with a maximum of 20 characters.')
@maxLength(20)
param adminUsername string
@description('Enter the virtual machine size. Default is Standard_B1s. Other allowed values are Standard_A1_v2, Standard_A2_v2, and Standard_B1ms.')
@allowed([
'Standard_A1_v2'
'Standard_A2_v2'
'Standard_B1ms'
'Standard_B1s'
])
param vmSize string = 'Standard_B1s'
@description('Select a Linux version. Default is Ubuntu Focal 20-04 LTS Gen2.')
@allowed([
'Ubuntu-Focal-20-04'
'Ubuntu-Jammy-22-04'
'Ubuntu-Lunar-23-04'
])
param osVersion string = 'Ubuntu-Focal-20-04'
@description('Enter the name of an exising SSH public key in Azure.')
param publicSSHKeyName string
@description('Name of resource group where public SSH keys are stored.')
param sskKeyRG string
@description('New or existing VNet, Subnet, and NSG')
@allowed([
'new'
'existing'
])
param newOrExisting string
var vnetNsgName = 'netsecgroup'
var computerName = '${vmName}-vm'
var nicName = '${vmName}-nic'
var osDiskName = '${vmName}-osdisk'
var publicIpName = '${vmName}-publicip'
var vnetName = 'vnet01'
var vnetPrefix = '10.0.0.0/16'
var subnetName = 'vmSubnet01'
var subnetPrefix = '10.0.0.0/24'
// Linux versions
var linuxVersion = {
'Ubuntu-Focal-20-04': {
publisher: 'canonical'
offer: '0001-com-ubuntu-server-focal'
sku: '20_04-lts-gen2'
version: 'latest'
}
'Ubuntu-Jammy-22-04': {
publisher: 'canonical'
offer: '0001-com-ubuntu-server-jammy'
sku: '22_04-lts-gen2'
version: 'latest'
}
'Ubuntu-Lunar-23-04': {
publisher: 'canonical'
offer: '0001-com-ubuntu-server-lunar'
sku: '23_04-gen2'
version: 'latest'
}
}
// Create new network security group
// VNet network security group with no port rules
// Use Defender JIT to protect port 22
resource vnetNsgNew 'Microsoft.Network/networkSecurityGroups@2023-09-01' =
if (newOrExisting == 'new') {
name: vnetNsgName
location: location
}
// Use existing network security group
resource vnetNsgExisting 'Microsoft.Network/networkSecurityGroups@2023-09-01' existing =
if (newOrExisting == 'existing') {
name: vnetNsgName
}
// Create new virtual network
resource vnetNew 'Microsoft.Network/virtualNetworks@2023-09-01' =
if (newOrExisting == 'new') {
name: vnetName
location: location
properties: {
addressSpace: {
addressPrefixes: [
vnetPrefix
]
}
subnets: [
{
name: subnetName
properties: {
addressPrefix: subnetPrefix
networkSecurityGroup: {
id: vnetNsgNew.id
}
}
}
]
}
}
// Use existing virtual network
resource vnetExisting 'Microsoft.Network/virtualNetworks@2023-09-01' existing =
if (newOrExisting == 'existing') {
name: vnetName
}
resource vmPublicIp 'Microsoft.Network/publicIPAddresses@2023-09-01' = {
name: publicIpName
location: location
sku: {
name: 'Basic'
}
properties: {
publicIPAllocationMethod: 'Dynamic'
}
}
resource nic 'Microsoft.Network/networkInterfaces@2023-09-01' = {
name: nicName
location: location
properties: {
ipConfigurations: [
{
name: 'ipConfig1'
properties: {
privateIPAllocationMethod: 'Dynamic'
publicIPAddress: {
id: vmPublicIp.id
}
subnet: {
id: ((newOrExisting == 'new')
? '${vnetNew.id}/subnets/${subnetName}'
: '${vnetExisting.id}/subnets/${subnetName}')
}
}
}
]
networkSecurityGroup: {
id: ((newOrExisting == 'new') ? '${vnetNsgNew.id}' : '${vnetNsgExisting.id}')
}
}
}
// Use existing SSH key
resource sshkey 'Microsoft.Compute/sshPublicKeys@2023-09-01' existing = {
name: publicSSHKeyName
scope: resourceGroup(sskKeyRG)
}
resource linuxVM 'Microsoft.Compute/virtualMachines@2023-09-01' = {
name: computerName
location: location
properties: {
hardwareProfile: {
vmSize: vmSize
}
networkProfile: {
networkInterfaces: [
{
id: nic.id
properties: {
deleteOption: 'Detach'
primary: true
}
}
]
}
osProfile: {
adminUsername: adminUsername
computerName: computerName
linuxConfiguration: {
disablePasswordAuthentication: true
ssh: {
publicKeys: [
{
keyData: sshkey.properties.publicKey
path: '/home/${adminUsername}/.ssh/authorized_keys'
}
]
}
provisionVMAgent: true
}
}
storageProfile: {
imageReference: linuxVersion[osVersion]
osDisk: {
name: osDiskName
createOption: 'FromImage'
osType: 'Linux'
managedDisk: {
storageAccountType: 'Standard_LRS'
}
deleteOption: 'Delete'
}
}
}
}
output computerName string = linuxVM.properties.osProfile.computerName
output vmPrivateIpAddress string = nic.properties.ipConfigurations[0].properties.privateIPAddress
output vmResourceId string = linuxVM.id
For more information about each resource type’s API versions:
- Microsoft.Network/networkSecurityGroups
- Microsoft.Network/virtualNetworks
- Microsoft.Network/publicIPAddresses
- Microsoft.Network/networkInterfaces
- Microsoft.Compute/sshPublicKeys
- Microsoft.Compute/virtualMachines
Review the parameters file
Use a parmeters file to provide parameter values. With a parameter file you don’t need to respond to prompts for parameter values during the deployment.
The following values are examples and you can choose to use different values.
- The
using
value specifies the path and name of the Bicep file to deploy. - The
newOrExisting
parameter is important.- The first time deployment uses
new
so that a new VNet, subnet, and network security group are created. - For subsequent deployments, use
existing
so that you don’t redeploy the resources.
- The first time deployment uses
- Replace all the placeholder values with values for your your deployment.
Copy and paste the following code into a file named linux-vm.bicepparam on your computer.
using './linux-vm.bicep'
param vmName = 'vmName placeholder'
param adminUsername = 'vmAdministratorName placeholder'
param vmSize = 'Standard_B1s'
param osVersion = 'Ubuntu-Lunar-23-04'
param sskKeyRG = 'SSH key resource group name placeholder'
param publicSSHKeyName = 'public SSH key name placeholder'
param newOrExisting = 'new'
For more information, go to the parameters file documentation.
Create a public key
As shown in the Bicep file and parameters file you need a public/private key pair to login to the Linux VM. For this example the SSH key is in a resource group that’s separate from the VM and it’s resources. In the Bicep file, scope
is used to reference the SSH key’s resource group.
- Sign in to the Azure portal.
- Enter SSH keys into the search and select it from the list.
- Select Create.
- Create a new resource group named demoSshKeyGroup.
- Enter demo-public-ssh-key as the Key pair name.
- Select Generate new key pair in SSH public key source.
- Select Review + create, then Create.
- Select Download the private key and create resource.
You can go to SSH keys in the portal to view the public key. The Bicep file uses the name and resource group to get the value and add the public key to the VM. The private key’s location is used in a later step when you use SSH and connect to the VM.
Deploy the resources
To deploy the infrastructure and virtual machine use Azure PowerShell. For this example, create a new resource group named demoVmDeployGroup.
Connect to Azure
To run Azure PowerShell commands to deploy resources with your Bicep file, connect to your Azure subscription. Azure PowerShell version 12 updated the sign in process. For more information, go to interactive authentication.
Replace 11111111-1111-1111-1111-111111111111
with your Azure tenant ID. You can get your tenant ID from the portal by doing a search for Microsoft Entra ID and going to the Overview page.
- From Visual Studio Code, open a PowerShell terminal: Terminal > New Terminal.
- Run
Connect-AzAccount -Tenant 11111111-1111-1111-1111-111111111111
. - A browser window opens and prompts you to choose an account for Azure authentication.
After you connect, your subscription information is displayed in the terminal.
If you have multiple Azure subscriptions, use Set-AzContext to change the subscription.
Deployment commands
To deploy the resources, run the following commands:
New-AzResourceGroup -Name demoVmDeployGroup -Location westus
$deployparms = @{
ResourceGroupName = "demoVmDeployGroup"
TemplateFile = "linux-vm.bicep"
TemplateParameterFile = "linux-vm.bicepparam"
Name = "deployLinuxVM01"
}
New-AzResourceGroupDeployment @deployparms
- New-AzResourceGroup creates the resource group.
$deployparms
uses splatting for readaility and to create parameter values for the deployment command.ResourceGroupName
parameter specifies where to deploy the resources.TemplateFile
is the Bicep file name in the current directory.TemplateParameterFile
is the Bicep parameters file name in the current directory.Name
is the deployment name. If you run subsequent deployments and want to preserve each deployments history, increment the number in the deployment name, like deployLinuxVM02.
- New-AzResourceGroupDeployment deploys the resources.
When the deployment is complete, the results are shown in the terminal.
Deployment results
You can use the deployment name to view details about a deployment:
- From the portal, go to the resource group demoVmDeployGroup.
- From the Overview page you can view the deployed resources.
- Select Settings > Deployments.
- Select the deployment name, in this example, deployLinuxVM01.
- Expand Deployment details to see the list of resources that were deployed. You can also view the deployments inputs, outputs, template, and operation details.
Configure remote access
Configure the virtual machine’s just-in-time policy to allow connections on SSH port 22. The public IP address is shown on this page.
- In the portal, go to the demoVmDeployGroup resource group and select the VM.
- Select Connect > Connect
- Verify Connecting using shows the public IP address or select it from the drop down.
- Select Configure for this port which should specify Port 22.
- Select Configure and for Source IP select your Local machine IP.
- Select Request access.
Port 22 is now configured for your computer’s IP address to SSH into the virtual machine. The configuration creates two rules in your Network Security Group. The first is a deny
on Port 22 for any protocol from any source to your VM subnet address. The deny
rule is persistent. The second rule is an allow
for your local computer’s IP address to access Port 22. By default, the allow
rule is active for three hours. When the rule expires, it’s removed from the network security group and SSH access from your computer’s IP address is denied.
From Just-in-time policy you can select Conigure to edit settings or delete the request. You can also view the Microsoft Defender just-in-time policy from the Network Security Group. For more information, go to Enable just-in-time access on VMs.
Connect to VM
- Open a PowerShell session on your computer.
-
Enter the following command and replace
<vmAdministratorName>
,<vmIpAddress>
, and<path to private key>
with your values. The path to your private key is the location where you downloaded the file.ssh <vmAdministratorName>@<vmIpAddress> -i <path to private key>
- On the first login with a new SSH key, you’re prompted about the fingerprint, type
yes
to continue. -
SSH connects to your Ubuntu Linux VM and opens a command prompt. The placeholder values for
<vmAdministratorName>@<VmName>
are replaced by your VM administrator name and VM name.<vmAdministratorName>@<VmName>:~$
- Type
exit
to disconnect from the VM.
Clean up the resources
When you’re finished with the VM and want to remove all the resources, delete the resource groups.
Remove-AzResourceGroup -Name demoVmDeployGroup
Remove-AzResourceGroup -Name demoSshKeyGroup
Delete the the private key that was downloaded when you created your public/priavte key pair.
Sign out of Azure from your terminal session.
Disconnect-AzAccount
More information
For learn more about resources in this article, see the following articles: