Skip to content

Commit 72784be

Browse files
committed
updates for UDR, virtual appliance firewalls, and some improvements for right-nav
1 parent 05f6e2b commit 72784be

File tree

2 files changed

+38
-5
lines changed

2 files changed

+38
-5
lines changed

articles/hdinsight/hdinsight-extend-hadoop-virtual-network.md

+38-5
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: article
1515
ms.tgt_pltfrm: na
1616
ms.workload: big-data
17-
ms.date: 05/22/2017
17+
ms.date: 06/21/2017
1818
ms.author: larryfr
1919

2020
---
@@ -58,7 +58,15 @@ The following are a list of considerations when using HDInsight in a virtual net
5858

5959
* __Forced tunneling__: HDInsight does not support the forced tunneling configuration of Azure Virtual Network.
6060

61-
* __Restricting network traffic__: HDInsight does support using Network Security Groups to restrict network traffic, but requires unrestricted access to several Azure IPs. For more information, see the [Secured virtual networks](#secured-virtual-networks) section.
61+
* __Restricting network traffic__:
62+
63+
* __Network Security Groups__: You must allow unrestricted access to several Azure IPs. For the list of IPs, see the [required IP addresses](#hdinsight-ip) section.
64+
65+
For more information, see the [Network Security Groups](#using-network-security-groups) section.
66+
67+
* __User-defined routes__: You must define routes to several Azure IPs. For the list of IPs, see the [required IP addresses](#hdinsight-ip) section.
68+
69+
For more information, see the [User-defined routes](#user-defined-routes) section.
6270

6371
### Connect cloud resources together in a private network (cloud-only)
6472

@@ -93,7 +101,7 @@ For more information on Virtual Network features, benefits, and capabilities, se
93101
> [!NOTE]
94102
> Create the Azure Virtual Network before provisioning an HDInsight cluster, then specify the network when creating the cluster. For more information, see [Virtual Network configuration tasks](https://azure.microsoft.com/documentation/services/virtual-network/).
95103
96-
## Secured virtual networks
104+
##<a id="hdinsight-ip"></a> Required IP Addresses
97105

98106
The HDInsight service is a managed service, and requires access to Azure management services during provisioning and while running. Azure management performs the following services:
99107

@@ -135,9 +143,9 @@ __If your region is not listed in the table__, allow traffic to port __443__ on
135143
> [!NOTE]
136144
> If you use a custom DNS server with your virtual network, you must also allow access from __168.63.129.16__. This is the address of Azure's recursive resolver. For more information, see the [Name resolution for VMs and Role instances](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md) document.
137145
138-
### Working with HDInsight in secured virtual networks
146+
## Network Security Groups
139147

140-
If you block internet access, you cannot use HDInsight services that are normally exposed through the public gateway for a cluster. These include Ambari and SSH. Instead, you must access services using the internal IP address of the cluster head nodes.
148+
If you block internet access using Network Security Groups (NSG), you cannot use HDInsight services that are normally exposed through the public gateway for a cluster. These include Ambari and SSH. Instead, you must access services using the internal IP address of the cluster head nodes.
141149

142150
To find the internal IP address of the head nodes, use the scripts in the [Internal IPs and FQDNs](#internal-ips-and-fqdns) section.
143151

@@ -294,6 +302,31 @@ Set-AzureRmVirtualNetworkSubnetConfig `
294302
295303
For more information on Network Security Groups, see [Network Security Groups overview](../virtual-network/virtual-networks-nsg.md). For information on controlling routing in an Azure Virtual Network, see [User-defined Routes and IP forwarding](../virtual-network/virtual-networks-udr-overview.md).
296304
305+
## User-defined routes
306+
307+
If you use user-defined routes (UDR) to secure the virtual network, you must add routes for the IP addresses in the [Required IP Addresses](#hdinsight-ip) section.
308+
309+
The routes to the required IP addresses must set the __Next Hop__ type to __Internet__. The following image is an example of how the routes appear in the Azure portal:
310+
311+
![user-defined routes for IP addresses required by HDInsight](./media/hdinsight-extend-hadoop-virtual-network/user-defined-routes-portal.png)
312+
313+
For more information on user-defined routes, see the [user-defined routes and IP forwarding](../virtual-network/virtual-networks-udr-overview.md) document.
314+
315+
## Virtual appliance firewall
316+
317+
If you are using a virtual appliance firewall to secure the virtual network, you must allow outbound traffic on the following ports:
318+
319+
* 443
320+
* 1433
321+
* 11000-11999
322+
* 14000-14999
323+
324+
For more information on firewall rules for virtual appliances, see the [virtual appliance scenario](../virtual-network/virtual-network-scenario-udr-gw-nva.md) document.
325+
326+
## Forced tunneling
327+
328+
Forced tunneling is not supported with HDInsight.
329+
297330
## Retrieve internal IPs and FQDNs
298331
299332
When connecting to HDInsight using a virtual network, you can connect directly to the nodes in the cluster. Use the following scripts to determine the internal IP address and fully qualified domain names (FQDN) for the nodes in the cluster:

0 commit comments

Comments
 (0)