Skip to content

Commit 19b983d

Browse files
Merge pull request #297120 from abhishjain002/patch-4
Updated note with NAT Gateway metric evaluation for slowness
2 parents 163c60d + 488d4e9 commit 19b983d

File tree

2 files changed

+11
-7
lines changed

2 files changed

+11
-7
lines changed

articles/hdinsight/load-balancer-migration-guidelines.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.topic: how-to
66
author: abhishjain002
77
ms.author: abhishjain
88
ms.reviewer: sairamyeturi
9-
ms.date: 03/03/2025
9+
ms.date: 03/31/2025
1010
---
1111

1212
# Basic Load balancer deprecation: Guidelines for Azure HDInsight
@@ -132,7 +132,12 @@ NAT gateway provides outbound network connectivity for the cluster. NSG controls
132132

133133
134134
* **Method 2:** Create a new subnet and then create the cluster with the new subnet.
135-
135+
136+
> [!IMPORTANT]
137+
> * If you experience job slowness or network issues after cluster recreation with a standard load balancer, check the "Total SNAT Connection Count" and "Dropped Packets" on your NAT Gateway. High values may indicate SNAT port exhaustion. To address this, consider implementing one of the following methods:
138+
> * Bind additional IP addresses or IP prefixes to your NAT Gateway. For more information, see [Troubleshoot Azure NAT Gateway connectivity](/azure/nat-gateway/troubleshoot-nat-connectivity) and [Metrics and alerts for Azure NAT Gateway](/azure/nat-gateway/nat-metrics#total-snat-connection-count).
139+
> * Enable private link to storage accounts which could reduce SNAT port dependency. For more information, see [Use private endpoints for Azure Storage](/azure/storage/common/storage-private-endpoints).
140+
136141
> [!NOTE]
137142
> If you are using an ESP cluster with MFA disabled, ensure to check the MFA status once cluster is recreated using a NAT gateway.
138143

articles/hdinsight/use-managed-identity-for-sql-database-authentication-in-azure-hdinsight.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@ title: Use Managed Identity for SQL Database authentication in Azure HDInsight
33
description: Learn how to use managed identity for SQL Database authentication in Azure HDInsight.
44
ms.service: azure-hdinsight
55
ms.topic: how-to
6-
author: hareshg
7-
ms.author: hgowrisankar
6+
author: abhishjain002
7+
ms.author: abhishjain
88
ms.reviewer: nijelsf
9-
ms.date: 01/09/2025
9+
ms.date: 03/31/2025
1010
---
1111

1212
# Use Managed Identity for SQL Database authentication in Azure HDInsight
@@ -33,7 +33,6 @@ The Managed Identity (MI) option is available for the following Databases:
3333
> * It's recommended not to update the Managed Identity after cluster recreation as it can disrupt cluster operation.
3434
> * When you recreate an MSI with the same name, you must recreate the contained user and reassign roles, as the new MSI will have different object and client IDs even if the name remains unchanged.
3535
36-
3736
## Steps to Use Managed Identity during cluster creation in Azure portal
3837

3938
1. During cluster creation, navigate to the Storage section and select the SQL database for Ambari/Hive/Oozie. Choose Managed Identity as the Authentication method.
@@ -56,7 +55,7 @@ Object ID of managed identity can be obtained from portal on the managed identit
5655
> For example:
5756
> * MSI Name: contosoMSI
5857
> * Object ID: `aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb`
59-
> * user_name could be `contosoMSI-2ba6c`
58+
> * user_name could be `contosoMSI_aaaaaaaa`
6059
6160

6261
```

0 commit comments

Comments
 (0)