Skip to content

Commit 19e141a

Browse files
authored
Merge pull request #207063 from MikeRayMSFT/20220508-connectivity-proxy
Add link to Kubernetes quickstart meet network requirements
2 parents 25ffd2f + 9251955 commit 19e141a

File tree

1 file changed

+41
-16
lines changed

1 file changed

+41
-16
lines changed

articles/azure-arc/data/connectivity.md

Lines changed: 41 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818

1919
There are multiple options for the degree of connectivity from your Azure Arc-enabled data services environment to Azure. As your requirements vary based on business policy, government regulation, or the availability of network connectivity to Azure, you can choose from the following connectivity modes.
2020

21-
Azure Arc-enabled data services provides you the option to connect to Azure in two different *connectivity modes*:
21+
Azure Arc-enabled data services provide you the option to connect to Azure in two different *connectivity modes*:
2222

2323
- Directly connected
2424
- Indirectly connected
@@ -43,7 +43,7 @@ Some Azure-attached services are only available when they can be directly reache
4343
|**Feature**|**Indirectly connected**|**Directly connected**|
4444
|---|---|---|
4545
|**Automatic high availability**|Supported|Supported|
46-
|**Self-service provisioning**|Supported<br/>Creation can be done through Azure Data Studio, the appropriate CLI, or Kubernetes native tools (helm, kubectl, oc, etc.), or using Azure Arc-enabled Kubernetes GitOps provisioning.|Supported<br/>In addition to the indirectly connected mode creation options, you can also create through the Azure portal, Azure Resource Manager APIs, the Azure CLI, or ARM templates.
46+
|**Self-service provisioning**|Supported<br/>Use Azure Data Studio, the appropriate CLI, or Kubernetes native tools like Helm, `kubectl`, or `oc`, or use Azure Arc-enabled Kubernetes GitOps provisioning.|Supported<br/>In addition to the indirectly connected mode creation options, you can also create through the Azure portal, Azure Resource Manager APIs, the Azure CLI, or ARM templates.
4747
|**Elastic scalability**|Supported|Supported<br/>|
4848
|**Billing**|Supported<br/>Billing data is periodically exported out and sent to Azure.|Supported<br/>Billing data is automatically and continuously sent to Azure and reflected in near real time. |
4949
|**Inventory management**|Supported<br/>Inventory data is periodically exported out and sent to Azure.<br/><br/>Use client tools like Azure Data Studio, Azure Data CLI, or `kubectl` to view and manage inventory locally.|Supported<br/>Inventory data is automatically and continuously sent to Azure and reflected in near real time. As such, you can manage inventory directly from the Azure portal.|
@@ -76,8 +76,10 @@ Some Azure-attached services are only available when they can be directly reache
7676
There are three connections required to services available on the Internet. These connections include:
7777

7878
- [Microsoft Container Registry (MCR)](#microsoft-container-registry-mcr)
79+
- [Helm chart (direct connected mode)](#helm-chart-direct-connected-mode)
7980
- [Azure Resource Manager APIs](#azure-resource-manager-apis)
8081
- [Azure monitor APIs](#azure-monitor-apis)
82+
- [Azure Arc data processing service](#azure-arc-data-processing-service)
8183

8284
All HTTPS connections to Azure and the Microsoft Container Registry are encrypted using SSL/TLS using officially signed and verifiable certificates.
8385

@@ -111,9 +113,9 @@ Yes
111113

112114
None
113115

114-
### Helm chart used to create data controller in direct connected mode
116+
### Helm chart (direct connected mode)
115117

116-
The helm chart used to provision the Azure Arc data controller bootstrapper and cluster level objects, such as custom resource definitions, cluster roles, and cluster role bindings, is pulled from an Azure Container Registry.
118+
The Helm chart used to provision the Azure Arc data controller bootstrapper and cluster level objects, such as custom resource definitions, cluster roles, and cluster role bindings, is pulled from an Azure Container Registry.
117119

118120
#### Connection source
119121

@@ -150,18 +152,6 @@ A computer running Azure Data Studio, or Azure CLI that is connecting to Azure.
150152

151153
- `login.microsoftonline.com`
152154
- `management.azure.com`
153-
- `san-af-eastus-prod.azurewebsites.net`
154-
- `san-af-eastus2-prod.azurewebsites.net`
155-
- `san-af-australiaeast-prod.azurewebsites.net`
156-
- `san-af-centralus-prod.azurewebsites.net`
157-
- `san-af-westus2-prod.azurewebsites.net`
158-
- `san-af-westeurope-prod.azurewebsites.net`
159-
- `san-af-southeastasia-prod.azurewebsites.net`
160-
- `san-af-koreacentral-prod.azurewebsites.net`
161-
- `san-af-northeurope-prod.azurewebsites.net`
162-
- `san-af-westeurope-prod.azurewebsites.net`
163-
- `san-af-uksouth-prod.azurewebsites.net`
164-
- `san-af-francecentral-prod.azurewebsites.net`
165155

166156
#### Protocol
167157

@@ -175,6 +165,8 @@ HTTPS
175165

176166
Yes
177167

168+
To use proxy, verify that the agents meet the network requirements. See [Meet network requirements](../kubernetes/quickstart-connect-cluster.md#meet-network-requirements).
169+
178170
#### Authentication
179171

180172
Azure Active Directory
@@ -219,3 +211,36 @@ Azure Active Directory
219211
> For now, all browser HTTPS/443 connections to the data controller for running the command `az arcdata dc export` and Grafana and Kibana dashboards are SSL encrypted using self-signed certificates. A feature will be available in the future that will allow you to provide your own certificates for encryption of these SSL connections.
220212
221213
Connectivity from Azure Data Studio to the Kubernetes API server uses the Kubernetes authentication and encryption that you have established. Each user that is using Azure Data Studio or CLI must have an authenticated connection to the Kubernetes API to perform many of the actions related to Azure Arc-enabled data services.
214+
215+
### Azure Arc data processing service
216+
217+
Points to the data processing service endpoint in connection
218+
219+
#### Connection target
220+
221+
- `san-af-eastus-prod.azurewebsites.net`
222+
- `san-af-eastus2-prod.azurewebsites.net`
223+
- `san-af-australiaeast-prod.azurewebsites.net`
224+
- `san-af-centralus-prod.azurewebsites.net`
225+
- `san-af-westus2-prod.azurewebsites.net`
226+
- `san-af-westeurope-prod.azurewebsites.net`
227+
- `san-af-southeastasia-prod.azurewebsites.net`
228+
- `san-af-koreacentral-prod.azurewebsites.net`
229+
- `san-af-northeurope-prod.azurewebsites.net`
230+
- `san-af-westeurope-prod.azurewebsites.net`
231+
- `san-af-uksouth-prod.azurewebsites.net`
232+
- `san-af-francecentral-prod.azurewebsites.net`
233+
234+
#### Protocol
235+
236+
HTTPS
237+
238+
#### Can use proxy
239+
240+
Yes
241+
242+
To use proxy, verify that the agents meet the network requirements. See [Meet network requirements](../kubernetes/quickstart-connect-cluster.md#meet-network-requirements).
243+
244+
#### Authentication
245+
246+
None

0 commit comments

Comments
 (0)