Skip to content

Commit 21af5f6

Browse files
Update use-managed-identity-for-sql-database-authentication-in-azure-hdinsight.md
Updated with NAT Gateway metrics note
1 parent 512d045 commit 21af5f6

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/hdinsight/use-managed-identity-for-sql-database-authentication-in-azure-hdinsight.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.topic: how-to
66
author: hareshg
77
ms.author: hgowrisankar
88
ms.reviewer: nijelsf
9-
ms.date: 01/09/2025
9+
ms.date: 03/27/2025
1010
---
1111

1212
# Use Managed Identity for SQL Database authentication in Azure HDInsight
@@ -32,6 +32,9 @@ The Managed Identity (MI) option is available for the following Databases:
3232
> [!IMPORTANT]
3333
> * It's recommended not to update the Managed Identity after cluster recreation as it can disrupt cluster operation.
3434
> * When you recreate an MSI with the same name, you must recreate the contained user and reassign roles, as the new MSI will have different object and client IDs even if the name remains unchanged.
35+
> * Following the migration to a standard load balancer, if you experience job slowness or network connectivity issues within your cluster, please examine the "Total SNAT Connection Count" and "Dropped Packets" metrics of your NAT Gateway. The hiigh values in these metrics may indicate that job slowness is due to SNAT port exhaustion. It is advisable to bind additional IP addresses or IP prefixes to your NAT Gateway.
36+
For further information, please refer to [Troubleshoot Azure NAT Gateway connectivity - Azure NAT Gateway](/azure/nat-gateway/troubleshoot-nat-connectivity.md) and [Metrics and alerts for Azure NAT Gateway - Azure NAT Gateway](/azure/nat-gateway/nat-metrics#total-snat-connection-count).
37+
3538

3639

3740
## Steps to Use Managed Identity during cluster creation in Azure portal

0 commit comments

Comments
 (0)