You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight/hdinsight-management-ip-addresses.md
+6-42Lines changed: 6 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,11 +4,11 @@ description: Learn which IP addresses you must allow inbound traffic from, in or
4
4
ms.service: hdinsight
5
5
ms.topic: conceptual
6
6
ms.custom: hdinsightactive
7
-
ms.date: 07/10/2023
7
+
ms.date: 07/12/2023
8
8
---
9
9
# HDInsight management IP addresses
10
10
11
-
This article lists the IP addresses used by Azure HDInsight health and management services. If you use network security groups (NSGs) or user-defined routes (UDRs) you may need to add some of these IP addresses to the allowlist for inbound network traffic.
11
+
This article lists the IP addresses used by Azure HDInsight health and management services. If you use network security groups (NSGs) or user-defined routes (UDRs), you may need to add some of these IP addresses to the allowlist for inbound network traffic.
12
12
13
13
## Introduction
14
14
@@ -17,7 +17,7 @@ This article lists the IP addresses used by Azure HDInsight health and managemen
17
17
18
18
If you use network security groups (NSGs) or user-defined routes (UDRs) to control inbound traffic to your HDInsight cluster, you must ensure that your cluster can communicate with critical Azure health and management services. Some of the IP addresses for these services are region-specific, and some of them apply to all Azure regions. You may also need to allow traffic from the Azure DNS service if you aren't using custom DNS.
19
19
20
-
If you need IP addresses for a region not listed here, you can use the [Service Tag Discovery API](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) to find IP addresses for your region. If you are unable to use the API, download the [service tag JSON file](../virtual-network/service-tags-overview.md#discover-service-tags-by-using-downloadable-json-files) and search for your desired region.
20
+
If you need IP addresses for a region not listed here, you can use the [Service Tag Discovery API](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) to find IP addresses for your region. If you're unable to use the API, download the [service tag JSON file](../virtual-network/service-tags-overview.md#discover-service-tags-by-using-downloadable-json-files) and search for your desired region.
21
21
22
22
HDInsight does validation for these rules with cluster creation and scaling to prevent further errors. If validation doesn't pass, creation and scaling fail.
23
23
@@ -40,52 +40,16 @@ Allow traffic from the following IP addresses for Azure HDInsight health and man
40
40
41
41
## Health and management services: Specific regions
42
42
43
-
Allow traffic from the IP addresses listed for the Azure HDInsight health and management services in the specific Azure region where your resources are located:
43
+
Allow traffic from the IP addresses listed for the Azure HDInsight health and management services in the specific Azure region where your resources are located, refer the following note:
44
44
45
45
> [!IMPORTANT]
46
-
> If the Azure region you are using is not listed, then use the [service tag](hdinsight-service-tags.md) feature for network security groups.
47
-
48
-
| Country | Region | Allowed Source IP addresses | Allowed Destination | Direction |
49
-
| ---- | ---- | ---- | ---- | ----- |
50
-
| Asia | East Asia | 23.102.235.122<br>52.175.38.134 |\*:443 | Inbound |
51
-
| | Southeast Asia | 13.76.245.160<br>13.76.136.249 |\*:443 | Inbound |
52
-
| Australia | Australia East | 104.210.84.115<br>13.75.152.195 |\*:443 | Inbound |
53
-
| | Australia Southeast | 13.77.2.56<br>13.77.2.94 |\*:443 | Inbound |
54
-
| Brazil | Brazil South | 191.235.84.104<br>191.235.87.113 |\*:443 | Inbound |
| India | Central India | 52.172.153.209<br>52.172.152.49 |\*:443 | Inbound |
67
-
| | South India | 104.211.223.67<br>104.211.216.210 |\*:443 | Inbound |
68
-
| Japan | Japan East | 13.78.125.90<br>13.78.89.60 |\*:443 | Inbound |
69
-
| | Japan West | 40.74.125.69<br>138.91.29.150 |\*:443 | Inbound |
70
-
| Korea | Korea Central | 52.231.39.142<br>52.231.36.209 |\*:443 | Inbound |
71
-
| | Korea South | 52.231.203.16<br>52.231.205.214 | \*:443 | Inbound
72
-
| United Kingdom | UK West | 51.141.13.110<br>51.141.7.20 |\*:443 | Inbound |
73
-
| | UK South | 51.140.47.39<br>51.140.52.16 |\*:443 | Inbound |
74
-
| United States | Central US | 13.89.171.122<br>13.89.171.124 |\*:443 | Inbound |
75
-
| | East US | 13.82.225.233<br>40.71.175.99 |\*:443 | Inbound |
76
-
| | East US2 | 20.44.16.8/29<br>20.49.102.48/29 |\*:443 | Inbound |
77
-
| | North Central US | 157.56.8.38<br>157.55.213.99 |\*:443 | Inbound |
78
-
| | West Central US | 52.161.23.15<br>52.161.10.167 |\*:443 | Inbound |
79
-
| | West US | 13.64.254.98<br>23.101.196.19 |\*:443 | Inbound |
80
-
| | West US 2 | 52.175.211.210<br>52.175.222.222 |\*:443 | Inbound |
81
-
| United Arab Emirates | UAE North | 65.52.252.96<br>65.52.252.97 |\*:443 | Inbound |
82
-
| | UAE Central | 20.37.76.96<br>20.37.76.99 |\*:443 | Inbound |
46
+
> We recommend to use [service tag](hdinsight-service-tags.md) feature for network security groups. If you require region specific service tags, please refer the [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/confirmation.aspx?id=56519)
83
47
84
48
For information on the IP addresses to use for Azure Government, see the [Azure Government Intelligence + Analytics](../azure-government/compare-azure-government-global-azure.md) document.
85
49
86
50
For more information, see [Control network traffic](./control-network-traffic.md).
87
51
88
-
If you're using user-defined routes (UDRs), you should specify a route and allow outbound traffic from the virtual network to the above IPs with the next hop set to "Internet".
52
+
If you're using user-defined routes (UDRs), you should specify a route and allow outbound traffic from the virtual network to the above IPs with the next hop set to "Internet."
0 commit comments