Skip to content

Commit 2319024

Browse files
authored
Merge pull request #106314 from dagiro/freshness13
freshness13
2 parents f218854 + d32c48a commit 2319024

File tree

1 file changed

+11
-10
lines changed

1 file changed

+11
-10
lines changed

articles/hdinsight/hdinsight-management-ip-addresses.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,31 @@
11
---
22
title: Azure HDInsight management IP addresses
3-
description: Learn which IP addresses you must allow inbound traffic from, in order to properly configure network security groups and user defined routes for virtual networking with Azure HDInsight.
4-
author: hol82
5-
ms.author: hol
6-
ms.reviewer: hrasheed
3+
description: Learn which IP addresses you must allow inbound traffic from, in order to properly configure network security groups and user-defined routes for virtual networking with Azure HDInsight.
4+
author: hrasheed-msft
5+
ms.author: hrasheed
6+
ms.reviewer: jasonh
77
ms.service: hdinsight
8-
ms.custom: hdinsightactive
98
ms.topic: conceptual
10-
ms.date: 12/16/2019
9+
ms.custom: hdinsightactive
10+
ms.date: 03/03/2020
1111
---
1212

1313
# HDInsight management IP addresses
1414

1515
> [!Important]
1616
> In most cases, you can now use the [service tag](hdinsight-service-tags.md) feature for network security groups, instead of manually adding IP addresses. New regions will only be added for service tags and the static IP addresses will eventually be deprecated.
1717
18-
If you use network security groups (NSGs) or user defined routes (UDRs) to control inbound traffic to your HDInsight cluster, you must ensure that your cluster can communicate with critical Azure health and management services. Some of the IP addresses for these services are region specific, and some of them apply to all Azure regions. You may also need to allow traffic from the Azure DNS service if you aren't using custom DNS.
18+
If you use network security groups (NSGs) or user-defined routes (UDRs) to control inbound traffic to your HDInsight cluster, you must ensure that your cluster can communicate with critical Azure health and management services. Some of the IP addresses for these services are region-specific, and some of them apply to all Azure regions. You may also need to allow traffic from the Azure DNS service if you aren't using custom DNS.
1919

2020
The following sections discuss the specific IP addresses that must be allowed.
2121

2222
## Azure DNS service
2323

24-
If you are using the Azure-provided DNS service, allow access from __168.63.129.16__ on port 53. For more information, see the [Name resolution for VMs and Role instances](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md) document. If you are using custom DNS, skip this step.
24+
If you're using the Azure-provided DNS service, allow access from __168.63.129.16__ on port 53. For more information, see the [Name resolution for VMs and Role instances](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md) document. If you're using custom DNS, skip this step.
2525

2626
## Health and management services: All regions
2727

28-
Allow traffic from the following IP addresses for Azure HDInsight health and management services which apply to all Azure regions:
28+
Allow traffic from the following IP addresses for Azure HDInsight health and management services, which apply to all Azure regions:
2929

3030
| Source IP address | Destination | Direction |
3131
| ---- | ----- | ----- |
@@ -79,8 +79,9 @@ For information on the IP addresses to use for Azure Government, see the [Azure
7979

8080
For more information, see the [Controlling network traffic](hdinsight-plan-virtual-network-deployment.md#networktraffic) section.
8181

82-
If you are using user-defined routes (UDRs), you should specify a route and allow outbound traffic from the VNET to the above IPs with the next hop set to "Internet".
82+
If you're using user-defined routes (UDRs), you should specify a route and allow outbound traffic from the virtual network to the above IPs with the next hop set to "Internet".
8383

8484
## Next steps
8585

8686
* [Create virtual networks for Azure HDInsight clusters](hdinsight-create-virtual-network.md)
87+
* [Network security group (NSG) service tags for Azure HDInsight](hdinsight-service-tags.md)

0 commit comments

Comments
 (0)