# Install on Microsoft Azure

This page describes how to install Aerospike on a Microsoft Azure VM instance.

::: note
Aerospike’s Community Edition transmits anonymous usage statistics. We ask your help in making Aerospike better by leaving this feature enabled. Use the following link to learn about our goals, how we use the data, and how to [disable the feature](https://aerospike.com/aerospike-telemetry/).
:::

## Prepare an Azure VM

1.  If you have not already created an Azure account, sign up for one [here](https://azure.microsoft.com).
    
2.  In the Azure portal, go to Virtual Machines and add a new VM.
    
3.  Configure the new VM with the following properties:
    
    #### Basic
    
    | Property | Value |
    | --- | --- |
    | Name | aerospike-server |
    | VM disk type | SSD |
    | User name | Give it a username. |
    | Authentication type | Aerospike recommends “SSH public key” |
    | SSH Public key | The contents of your public key. |
    | Resource group | Choose to deploy into an existing group or create a new one. |
    | Location | Choose a location geographically close to you. Azure locations also limit VM type availability. |
    | Image | Choose the base OS for the VM. |
    
    #### Size
    
    We recommend GS or LS instances. DSv2 is supported.
    
    #### Settings
    
    | Property | Value |
    | --- | --- |
    | Storage | Choose whether you’d like to use managed disks. |
    | Storage account | If you did not choose managed disks, choose the storage account you’d like to use. |
    | Network | Leave as defaults. |
    | Extension | Add any extensions you’d like. |
    | High availability | Aerospike recommends creating an availability zone with the maximum number of update domains and fault domains available for your selected zone. |
    | Monitoring | Leave as defaults. |
    
4.  On the summary page, confirm the values you entered and click **Create**.
    
5.  Create a new Network Security Group (NSG) in the same Resource Group and add the following inbound rules:
    
    #### Allow rule
    
    | Property | Value |
    | --- | --- |
    | Name | Aerospike Server |
    | Priority | 100 |
    | Source | Any |
    | Service | Custom |
    | Protocol and Ports | tcp:3000-3003 |
    | Action | Allow |
    
    #### Deny rule
    
    | Property | Value |
    | --- | --- |
    | Name | Default Deny |
    | Priority | 900 |
    | Source | Any |
    | Service | Custom |
    | Protocol | Any |
    | Port range | 1024-65535 |
    | Action | Deny |
    
6.  Attach this NSG to the network interface of your VM.
    

## Install Aerospike Database

1.  Select your new VM, then click **Connect**.
    
    A connection string to use, like the following, is displayed: azureuser@<Public\_IP>
    
2.  After you are connected, run the following command:
    
    Terminal window
    
    ```bash
    sudo su -
    
    apt-get update
    ```
    
3.  Follow the steps to [install Aerospike Database on Ubuntu](https://aerospike.com/docs/database/8.1.0/install/linux), then return and continue with the next step.
    
4.  Start Aerospike.
    
    Terminal window
    
    ```bash
    sudo service aerospike start
    ```
    

## Configure network and storage

To learn about getting the cluster up, see [Network configuration](https://aerospike.com/docs/database/8.1.0/manage/network). To configure storage to persist data, check out [Configure namespace storage](https://aerospike.com/docs/database/8.1.0/manage/namespace/storage/config).