You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight-aks/control-egress-traffic-from-hdinsight-on-aks-clusters.md
+23-24Lines changed: 23 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Control network traffic from HDInsight on AKS Cluster pools and cluster
3
3
description: A guide to configure and manage inbound and outbound network connections from HDInsight on AKS.
4
4
ms.service: hdinsight-aks
5
5
ms.topic: how-to
6
-
ms.date: 04/02/2024
6
+
ms.date: 04/12/2024
7
7
---
8
8
9
9
# Control network traffic from HDInsight on AKS Cluster pools and clusters
@@ -73,7 +73,7 @@ HDInsight on AKS doesn't configure outbound public IP address or outbound rules,
73
73
For inbound traffic, you are required to choose based on the requirements to choose a private cluster (for securing traffic on AKS control plane / API server) and select the private ingress option available on each of the cluster shape to use public or internal load balancer based traffic.
74
74
75
75
76
-
### Cluster pool creation for outbound with `userDefinedRouting`
76
+
### Cluster pool creation for outbound with `userDefinedRouting`
77
77
78
78
When you use HDInsight on AKS cluster pools and choose userDefinedRouting (UDR) as the egress path, there is no standard load balancer provisioned. You need to set up the firewall rules for the Outbound resources before `userDefinedRouting` can function.
79
79
@@ -90,9 +90,9 @@ Following is an example of setting up firewall rules, and testing your outbound
90
90
91
91
Here is an example of how to configure firewall rules, and check your outbound connections.
92
92
93
-
1. Create the required firewall subnet:
93
+
1. Create the required firewall subnet
94
94
95
-
To deploy a firewall into the integrated virtual network, you need a subnet called **AzureFirewallSubnet or Name of your choice**.
95
+
To deploy a firewall into the integrated virtual network, you need a subnet called **AzureFirewallSubnet or Name of your choice**.
96
96
97
97
1. In the Azure portal, navigate to the virtual network integrated with your app.
98
98
@@ -139,7 +139,7 @@ Here is an example of how to configure firewall rules, and check your outbound c
139
139
140
140
1. Route all traffic to the firewall
141
141
142
-
When you create a virtual network, Azure automatically creates a default route table for each of its subnets and adds system [default routes to the table](/azure/virtual-network/virtual-networks-udr-overview#default). In this step, you create a user-defined route table that routes all traffic to the firewall, and then associate it with the App Service subnet in the integrated virtual network.
142
+
When you create a virtual network, Azure automatically creates a default route table for each of its subnets and adds system [default routes to the table](/azure/virtual-network/virtual-networks-udr-overview#default). In this step, you create a user-defined route table that routes all traffic to the firewall, and then associate it with the App Service subnet in the integrated virtual network.
143
143
144
144
1. On the [Azure portal](https://portal.azure.com/) menu, select **All services** or search for and select **All services** from any page.
145
145
@@ -163,38 +163,35 @@ Here is an example of how to configure firewall rules, and check your outbound c
163
163
164
164
1. Configure the new route as shown in the following table:
165
165
166
-
|Setting |Value |
167
-
|-|-
168
-
|Address prefix |0.0.0.0/0 |
169
-
|Next hop type |Virtual appliance |
170
-
|Next hop address |The private IP address for the firewall that you copied |
166
+
|Setting |Value |
167
+
|-|-|
168
+
|Destination Type| IP Addresses|
169
+
|Destination IP addresses/CIDR ranges |0.0.0.0/0 |
170
+
|Next hop type |Virtual appliance |
171
+
|Next hop address |The private IP address for the firewall that you copied |
171
172
172
173
1. From the left navigation, select **Subnets > Associate**.
173
174
1. In **Virtual network**, select your integrated virtual network.
174
175
1. In **Subnet**, select the HDInsight on AKS subnet you wish to use.
175
-
176
-
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/associate-subnet.png" alt-text="Screenshot showing how to associate subnet." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/associate-subnet.png":::
176
+
177
+
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/associate-subnet.png" alt-text="Screenshot showing how to associate subnet." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/associate-subnet.png":::
177
178
178
179
1. Select **OK**.
179
180
180
181
1. Configure firewall policies
181
182
182
-
Outbound traffic from your HDInsight on AKS subnet is now routed through the integrated virtual network to the firewall.
183
-
184
-
To control the outbound traffic, add an application rule to firewall policy.
183
+
Outbound traffic from your HDInsight on AKS subnet is now routed through the integrated virtual network to the firewall.
184
+
To control the outbound traffic, add an application rule to firewall policy.
185
185
186
186
1. Navigate to the firewall's overview page and select its firewall policy.
187
187
188
-
1. In the firewall policy page, from the left navigation, select **Application Rules and Network Rules > Add a rule collection.**
189
-
190
-
1. In **Rules**, add a network rule with the subnet as the source address, and specify an FQDN destination.
191
-
192
-
1. You need to add [AKS](/azure/aks/outbound-rules-control-egress#required-outbound-network-rules-and-fqdns-for-aks-clusters) and [HDInsight on AKS](./secure-traffic-by-firewall-azure-portal.md#add-network-and-application-rules-to-the-firewall) rules for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
188
+
1. In the firewall policy page, from the left navigation, add network and application rules. For example, select **Network Rules > Add a rule collection**.
193
189
194
-
1.You can also add the [private endpoints](/azure/hdinsight-aks/secure-traffic-by-firewall-azure-portal#add-network-and-application-rules-to-the-firewall) for any dependent resources in the same subnet for cluster to access them (example – storage).
195
-
196
-
1.Select **Add**.
190
+
1.In **Rules**, add a network rule with the subnet as the source address, and specify an FQDN destination. Similarly, add the application rules.
191
+
1. You need to add the [outbound traffic rules given here](./required-outbound-traffic.md). Refer [this doc for adding application and network rules](./secure-traffic-by-firewall-azure-portal.md#add-network-and-application-rules-to-the-firewall) for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
192
+
1.You can also add the [private endpoints](/azure/hdinsight-aks/secure-traffic-by-firewall-azure-portal#add-network-and-application-rules-to-the-firewall) for any dependent resources in the same subnet for cluster to access them (example – storage).
197
193
194
+
1. Select **Add**.
198
195
199
196
1. Verify if public IP is created
200
197
@@ -206,10 +203,12 @@ Once the cluster pool is created, you can observe in the MC Group that there's n
> Before you create the cluster in the cluster pool setup with `Outbound with userDefinedRouting` egress path, you need to give the AKS cluster - that matches the cluster pool - the `Network Contributor` role on your network resources that are used for defining the routing, such as Virtual Network, Route table, and NSG (if used). Learn more about how to assign the role [here](/azure/role-based-access-control/role-assignments-portal?tabs=delegate-condition#step-1-identify-the-needed-scope)
208
+
209
209
> [!NOTE]
210
210
> When you deploy a cluster pool with UDR egress path and a private ingress cluster, HDInsight on AKS will automatically create a private DNS zone and map the entries to resolve the FQDN for accessing the cluster.
0 commit comments