alphaspirit - Fotolia
Microsoft Azure VM Scale Sets are collections of virtual machines that can be managed as a single unit. They are especially useful for stateless applications with varying workloads, such as customer-facing Web and mobile applications, and for big data analytics applications that require distributed processing across multiple virtual machines.
Virtual machines in a scale set are all configured in the same way. Cloud administrators define the configuration of a scale set using a JSON configuration file, and can also use templates. The configuration file specifies parameters such as the number of instances to include in the scale set, administrator username and password, and account name.
In addition to defining the virtual machine configurations, administrators must also specify network configurations, such as subnets, and other components, such as load balancers and storage. Public IP addresses can be specified, as well.
Although virtual machines are deployed as a group, administrators can still directly connect to individual virtual machines as needed. This is enabled through a port-mapping specification in the configuration file.
When scale sets are integrated with Azure Insights Autoscale, resources can scale up and down as workloads change.
Azure VM Scale Sets are similar to AWS Elastic Beanstalk, which enables the deployment of a complete stack of resources -- such as Web servers, network address translation servers, application servers and database servers -- as a unit. The Elastic Beanstalk service also manages the provisioning process and monitors the health of components in the stack.
An end-to-end guide to the Microsoft Azure cloud
Test your Azure knowledge with this quiz
A look back at the biggest Azure updates in 2015
Dig Deeper on Managing cloud infrastructure
Related Q&A from Dan Sullivan
Docker's recent upgrade introduced support for hardware signing and in the future, automated security analysis on Docker images. Expert Dan Sullivan ... Continue Reading
Cisco's new project Contiv automates operational policies for containerized applications in the cloud. Expert Dan Sullivan explains the benefits of ... Continue Reading
Dropbox API abused by attackers posing as legitimate users in a huge spear phishing campaign. Expert Dan Sullivan explains how to mitigate the risks ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.