Skip to content

Commit 012436b

Browse files
authored
Improved correctness score
Improved correctness score
1 parent 026d7c2 commit 012436b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/hdinsight/hdinsight-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ To start, deploy the following resources if you haven't created them already. Yo
4242
## <a name="DisableNetworkPolicy"></a>Step 2: Configure HDInsight subnet
4343

4444
- **Disable privateLinkServiceNetworkPolicies on subnet.** In order to choose a source IP address for your Private Link service, an explicit disable setting ```privateLinkServiceNetworkPolicies``` is required on the subnet. Follow the instructions here to [disable network policies for Private Link services](../private-link/disable-private-link-service-network-policy.md).
45-
- **Enable Service Endpoints on subnet.** For successful deployment of a Private Link HDInsight cluster, we recommend that you add the *Microsoft.SQL*, *Microsoft.Storage*, and *Microsoft.KeyVault* service endpoint(s) to your subnet prior to cluster deployment. [Service endpoints](../virtual-network/virtual-network-service-endpoints-overview.md) route traffic directly from your virtual network to the service on the Microsoft Azure backbone network. Keeping traffic on the Azure backbone network allows you to continue auditing and monitoring outbound Internet traffic from your virtual networks, through forced-tunneling, without impacting service traffic.
45+
- **Enable Service Endpoints on subnet.** For successful deployment of a Private Link HDInsight cluster, we recommend that you add the `Microsoft.SQL`, `Microsoft.Storage`, and `Microsoft.KeyVault` service endpoint(s) to your subnet prior to cluster deployment. [Service endpoints](../virtual-network/virtual-network-service-endpoints-overview.md) route traffic directly from your virtual network to the service on the Microsoft Azure backbone network. Keeping traffic on the Azure backbone network allows you to continue auditing and monitoring outbound Internet traffic from your virtual networks, through forced-tunneling, without impacting service traffic.
4646

4747

4848
## <a name="NATorFirewall"></a>Step 3: Deploy NAT gateway *or* firewall

0 commit comments

Comments
 (0)