Skip to content

Commit 24c5401

Browse files
Merge pull request #272095 from abhishjain002/abhishjain002-ingress-egree-page
Update control-egress-traffic-from-hdinsight-on-aks-clusters.md
2 parents 1410e9c + 7caff39 commit 24c5401

File tree

1 file changed

+23
-24
lines changed

1 file changed

+23
-24
lines changed

articles/hdinsight-aks/control-egress-traffic-from-hdinsight-on-aks-clusters.md

Lines changed: 23 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Control network traffic from HDInsight on AKS Cluster pools and cluster
33
description: A guide to configure and manage inbound and outbound network connections from HDInsight on AKS.
44
ms.service: hdinsight-aks
55
ms.topic: how-to
6-
ms.date: 04/02/2024
6+
ms.date: 04/12/2024
77
---
88

99
# Control network traffic from HDInsight on AKS Cluster pools and clusters
@@ -73,7 +73,7 @@ HDInsight on AKS doesn't configure outbound public IP address or outbound rules,
7373
For inbound traffic, you are required to choose based on the requirements to choose a private cluster (for securing traffic on AKS control plane / API server) and select the private ingress option available on each of the cluster shape to use public or internal load balancer based traffic.
7474

7575

76-
### Cluster pool creation for outbound with `userDefinedRouting `
76+
### Cluster pool creation for outbound with `userDefinedRouting`
7777

7878
When you use HDInsight on AKS cluster pools and choose userDefinedRouting (UDR) as the egress path, there is no standard load balancer provisioned. You need to set up the firewall rules for the Outbound resources before `userDefinedRouting` can function.
7979

@@ -90,9 +90,9 @@ Following is an example of setting up firewall rules, and testing your outbound
9090

9191
Here is an example of how to configure firewall rules, and check your outbound connections.
9292

93-
1. Create the required firewall subnet:
93+
1. Create the required firewall subnet
9494

95-
To deploy a firewall into the integrated virtual network, you need a subnet called **AzureFirewallSubnet or Name of your choice**.
95+
To deploy a firewall into the integrated virtual network, you need a subnet called **AzureFirewallSubnet or Name of your choice**.
9696

9797
1. In the Azure portal, navigate to the virtual network integrated with your app.
9898

@@ -139,7 +139,7 @@ Here is an example of how to configure firewall rules, and check your outbound c
139139

140140
1. Route all traffic to the firewall
141141

142-
When you create a virtual network, Azure automatically creates a default route table for each of its subnets and adds system [default routes to the table](/azure/virtual-network/virtual-networks-udr-overview#default). In this step, you create a user-defined route table that routes all traffic to the firewall, and then associate it with the App Service subnet in the integrated virtual network.
142+
When you create a virtual network, Azure automatically creates a default route table for each of its subnets and adds system [default routes to the table](/azure/virtual-network/virtual-networks-udr-overview#default). In this step, you create a user-defined route table that routes all traffic to the firewall, and then associate it with the App Service subnet in the integrated virtual network.
143143

144144
1. On the [Azure portal](https://portal.azure.com/) menu, select **All services** or search for and select **All services** from any page.
145145

@@ -163,38 +163,35 @@ Here is an example of how to configure firewall rules, and check your outbound c
163163

164164
1. Configure the new route as shown in the following table:
165165

166-
|Setting |Value |
167-
|-|-
168-
|Address prefix |0.0.0.0/0 |
169-
|Next hop type |Virtual appliance |
170-
|Next hop address |The private IP address for the firewall that you copied |
166+
|Setting |Value |
167+
|-|-|
168+
|Destination Type| IP Addresses|
169+
|Destination IP addresses/CIDR ranges |0.0.0.0/0 |
170+
|Next hop type |Virtual appliance |
171+
|Next hop address |The private IP address for the firewall that you copied |
171172

172173
1. From the left navigation, select **Subnets > Associate**.
173174
1. In **Virtual network**, select your integrated virtual network.
174175
1. In **Subnet**, select the HDInsight on AKS subnet you wish to use.
175-
176-
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/associate-subnet.png" alt-text="Screenshot showing how to associate subnet." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/associate-subnet.png":::
176+
177+
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/associate-subnet.png" alt-text="Screenshot showing how to associate subnet." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/associate-subnet.png":::
177178

178179
1. Select **OK**.
179180

180181
1. Configure firewall policies
181182

182-
Outbound traffic from your HDInsight on AKS subnet is now routed through the integrated virtual network to the firewall.
183-
184-
To control the outbound traffic, add an application rule to firewall policy.
183+
Outbound traffic from your HDInsight on AKS subnet is now routed through the integrated virtual network to the firewall.
184+
To control the outbound traffic, add an application rule to firewall policy.
185185

186186
1. Navigate to the firewall's overview page and select its firewall policy.
187187

188-
1. In the firewall policy page, from the left navigation, select **Application Rules and Network Rules > Add a rule collection.**
189-
190-
1. In **Rules**, add a network rule with the subnet as the source address, and specify an FQDN destination.
191-
192-
1. You need to add [AKS](/azure/aks/outbound-rules-control-egress#required-outbound-network-rules-and-fqdns-for-aks-clusters) and [HDInsight on AKS](./secure-traffic-by-firewall-azure-portal.md#add-network-and-application-rules-to-the-firewall) rules for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
188+
1. In the firewall policy page, from the left navigation, add network and application rules. For example, select **Network Rules > Add a rule collection**.
193189

194-
1. You can also add the [private endpoints](/azure/hdinsight-aks/secure-traffic-by-firewall-azure-portal#add-network-and-application-rules-to-the-firewall) for any dependent resources in the same subnet for cluster to access them (example – storage).
195-
196-
1. Select **Add**.
190+
1. In **Rules**, add a network rule with the subnet as the source address, and specify an FQDN destination. Similarly, add the application rules.
191+
1. You need to add the [outbound traffic rules given here](./required-outbound-traffic.md). Refer [this doc for adding application and network rules](./secure-traffic-by-firewall-azure-portal.md#add-network-and-application-rules-to-the-firewall) for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
192+
1. You can also add the [private endpoints](/azure/hdinsight-aks/secure-traffic-by-firewall-azure-portal#add-network-and-application-rules-to-the-firewall) for any dependent resources in the same subnet for cluster to access them (example – storage).
197193

194+
1. Select **Add**.
198195

199196
1. Verify if public IP is created
200197

@@ -206,10 +203,12 @@ Once the cluster pool is created, you can observe in the MC Group that there's n
206203

207204
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/list-view.png" alt-text="Screenshot showing network list." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/list-view.png":::
208205

206+
> [!IMPORTANT]
207+
> Before you create the cluster in the cluster pool setup with `Outbound with userDefinedRouting` egress path, you need to give the AKS cluster - that matches the cluster pool - the `Network Contributor` role on your network resources that are used for defining the routing, such as Virtual Network, Route table, and NSG (if used). Learn more about how to assign the role [here](/azure/role-based-access-control/role-assignments-portal?tabs=delegate-condition#step-1-identify-the-needed-scope)
208+
209209
> [!NOTE]
210210
> When you deploy a cluster pool with UDR egress path and a private ingress cluster, HDInsight on AKS will automatically create a private DNS zone and map the entries to resolve the FQDN for accessing the cluster.
211211
212-
213212

214213
### Cluster pool creation with private AKS
215214

0 commit comments

Comments
 (0)