Skip to content

Commit 351cb55

Browse files
committed
713935
1 parent cd3e122 commit 351cb55

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/hdinsight/hdinsight-use-external-metadata-stores.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: jasonh
77
ms.service: hdinsight
88
ms.topic: conceptual
99
ms.custom: hdinsightactive
10-
ms.date: 04/03/2020
10+
ms.date: 04/30/2020
1111
---
1212

1313
# Use external metadata stores in Azure HDInsight
@@ -60,6 +60,8 @@ Create or have an existing Azure SQL Database before setting up a custom Hive me
6060

6161
While creating the cluster, HDInsight service needs to connect to the external metastore and verify your credentials. Configure Azure SQL Database firewall rules to allow Azure services and resources to access the server. Enable this option in the Azure portal by selecting **Set server firewall**. Then select **No** underneath **Deny public network access**, and **Yes** underneath **Allow Azure services and resources to access this server** for the Azure SQL Database server or database. For more information, see [Create and manage IP firewall rules](https://docs.microsoft.com/azure/sql-database/sql-database-firewall-configure#use-the-azure-portal-to-manage-server-level-ip-firewall-rules)
6262

63+
Private endpoints for SQL stores are not supported.
64+
6365
![set server firewall button](./media/hdinsight-use-external-metadata-stores/configure-azure-sql-database-firewall1.png)
6466

6567
![allow azure services access](./media/hdinsight-use-external-metadata-stores/configure-azure-sql-database-firewall2.png)

0 commit comments

Comments
 (0)