You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: articles/hdinsight/hdinsight-extend-hadoop-virtual-network.md
+38-5
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.devlang: na
14
14
ms.topic: article
15
15
ms.tgt_pltfrm: na
16
16
ms.workload: big-data
17
-
ms.date: 05/22/2017
17
+
ms.date: 06/21/2017
18
18
ms.author: larryfr
19
19
20
20
---
@@ -58,7 +58,15 @@ The following are a list of considerations when using HDInsight in a virtual net
58
58
59
59
*__Forced tunneling__: HDInsight does not support the forced tunneling configuration of Azure Virtual Network.
60
60
61
-
*__Restricting network traffic__: HDInsight does support using Network Security Groups to restrict network traffic, but requires unrestricted access to several Azure IPs. For more information, see the [Secured virtual networks](#secured-virtual-networks) section.
61
+
*__Restricting network traffic__:
62
+
63
+
*__Network Security Groups__: You must allow unrestricted access to several Azure IPs. For the list of IPs, see the [required IP addresses](#hdinsight-ip) section.
64
+
65
+
For more information, see the [Network Security Groups](#using-network-security-groups) section.
66
+
67
+
*__User-defined routes__: You must define routes to several Azure IPs. For the list of IPs, see the [required IP addresses](#hdinsight-ip) section.
68
+
69
+
For more information, see the [User-defined routes](#user-defined-routes) section.
62
70
63
71
### Connect cloud resources together in a private network (cloud-only)
64
72
@@ -93,7 +101,7 @@ For more information on Virtual Network features, benefits, and capabilities, se
93
101
> [!NOTE]
94
102
> Create the Azure Virtual Network before provisioning an HDInsight cluster, then specify the network when creating the cluster. For more information, see [Virtual Network configuration tasks](https://azure.microsoft.com/documentation/services/virtual-network/).
95
103
96
-
##Secured virtual networks
104
+
##<aid="hdinsight-ip"></a> Required IP Addresses
97
105
98
106
The HDInsight service is a managed service, and requires access to Azure management services during provisioning and while running. Azure management performs the following services:
99
107
@@ -135,9 +143,9 @@ __If your region is not listed in the table__, allow traffic to port __443__ on
135
143
> [!NOTE]
136
144
> If you use a custom DNS server with your virtual network, you must also allow access from __168.63.129.16__. This is the address of Azure's recursive resolver. For more information, see the [Name resolution for VMs and Role instances](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md) document.
137
145
138
-
### Working with HDInsight in secured virtual networks
146
+
##Network Security Groups
139
147
140
-
If you block internet access, you cannot use HDInsight services that are normally exposed through the public gateway for a cluster. These include Ambari and SSH. Instead, you must access services using the internal IP address of the cluster head nodes.
148
+
If you block internet access using Network Security Groups (NSG), you cannot use HDInsight services that are normally exposed through the public gateway for a cluster. These include Ambari and SSH. Instead, you must access services using the internal IP address of the cluster head nodes.
141
149
142
150
To find the internal IP address of the head nodes, use the scripts in the [Internal IPs and FQDNs](#internal-ips-and-fqdns) section.
For more information on Network Security Groups, see [Network Security Groups overview](../virtual-network/virtual-networks-nsg.md). For information on controlling routing in an Azure Virtual Network, see [User-defined Routes and IP forwarding](../virtual-network/virtual-networks-udr-overview.md).
296
304
305
+
## User-defined routes
306
+
307
+
If you use user-defined routes (UDR) to secure the virtual network, you must add routes for the IP addresses in the [Required IP Addresses](#hdinsight-ip) section.
308
+
309
+
The routes to the required IP addresses must set the __Next Hop__ type to __Internet__. The following image is an example of how the routes appear in the Azure portal:
310
+
311
+

312
+
313
+
For more information on user-defined routes, see the [user-defined routes and IP forwarding](../virtual-network/virtual-networks-udr-overview.md) document.
314
+
315
+
## Virtual appliance firewall
316
+
317
+
If you are using a virtual appliance firewall to secure the virtual network, you must allow outbound traffic on the following ports:
318
+
319
+
* 443
320
+
* 1433
321
+
* 11000-11999
322
+
* 14000-14999
323
+
324
+
For more information on firewall rules for virtual appliances, see the [virtual appliance scenario](../virtual-network/virtual-network-scenario-udr-gw-nva.md) document.
325
+
326
+
## Forced tunneling
327
+
328
+
Forced tunneling is not supported with HDInsight.
329
+
297
330
## Retrieve internal IPs and FQDNs
298
331
299
332
When connecting to HDInsight using a virtual network, you can connect directly to the nodes in the cluster. Use the following scripts to determine the internal IP address and fully qualified domain names (FQDN) for the nodes in the cluster:
0 commit comments