You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/managed-instance-apache-cassandra/network-rules.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Required outbound network rules for Azure Managed Instance for Apache Cassandra
3
-
description: Learn what are the required outbound network rules and FQDNs for Azure Managed Instance for Apache Cassandra
3
+
description: Learn what are the required outbound network rules and FQDNs for Azure Managed Instance for Apache Cassandra.
4
4
author: rothja
5
5
ms.service: managed-instance-apache-cassandra
6
6
ms.topic: how-to
@@ -20,7 +20,7 @@ The Azure Managed Instance for Apache Cassandra service requires certain network
20
20
> [!TIP]
21
21
> If you use [VPN](use-vpn.md) then you don't need to open any other connection.
22
22
23
-
If you're using Azure Firewall to restrict outbound access, we highly recommend using [virtual network service tags](../virtual-network/service-tags-overview.md). Below are the tags required to make Azure SQL Managed Instance for Apache Cassandra function properly.
23
+
If you're using Azure Firewall to restrict outbound access, we highly recommend using [virtual network service tags](../virtual-network/service-tags-overview.md). The tags in the table are required to make Azure SQL Managed Instance for Apache Cassandra function properly.
24
24
25
25
| Destination Service Tag | Protocol | Port | Use |
@@ -35,14 +35,14 @@ If you're using Azure Firewall to restrict outbound access, we highly recommend
35
35
| ApiManagement | HTTPS | 443 | Required to gather information about and manage Cassandra nodes (for example, reboot) |
36
36
37
37
> [!NOTE]
38
-
> In addition to the above, you will also need to add the following address prefixes, as a service tag does not exist for the relevant service:
38
+
> In addition to the tags table, you will also need to add the following address prefixes, as a service tag does not exist for the relevant service:
39
39
> 104.40.0.0/13
40
40
> 13.104.0.0/14
41
41
> 40.64.0.0/10
42
42
43
43
## User-defined routes
44
44
45
-
If you're using a third-party Firewall to restrict outbound access, we highly recommend configuring [user-defined routes (UDRs)](../virtual-network/virtual-networks-udr-overview.md#user-defined) for Microsoft address prefixes, rather than attempting to allow connectivity through your own Firewall. See sample [bash script](https://github.com/Azure-Samples/cassandra-managed-instance-tools/blob/main/configureUDR.sh) to add the required address prefixes in user-defined routes.
45
+
If you're using a non-Microsoft Firewall to restrict outbound access, we highly recommend configuring [user-defined routes (UDRs)](../virtual-network/virtual-networks-udr-overview.md#user-defined) for Microsoft address prefixes, rather than attempting to allow connectivity through your own Firewall. See sample [bash script](https://github.com/Azure-Samples/cassandra-managed-instance-tools/blob/main/configureUDR.sh) to add the required address prefixes in user-defined routes.
46
46
47
47
## Azure Global required network rules
48
48
@@ -52,7 +52,7 @@ The required network rules and IP address dependencies are:
|snovap\<region\>.blob.core.windows.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure Storage | HTTPS | 443 | Required for secure communication between the nodes and Azure Storage for Control Plane communication and configuration.|
54
54
|\*.store.core.windows.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure Storage | HTTPS | 443 | Required for secure communication between the nodes and Azure Storage for Control Plane communication and configuration.|
55
-
|\*.blob.core.windows.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure Storage | HTTPS | 443 | Required for secure communication between the nodes and Azure Storage to store backups. *Backup feature is being revised and storage name will follow a pattern by GA*|
55
+
|\*.blob.core.windows.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure Storage | HTTPS | 443 | Required for secure communication between the nodes and Azure Storage to store backups. *Backup feature is being revised and a pattern for storage name follows by GA*|
56
56
|vmc-p-\<region\>.vault.azure.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure KeyVault | HTTPS | 443 | Required for secure communication between the nodes and Azure Key Vault. Certificates and keys are used to secure communication inside the cluster.|
57
57
|management.azure.com:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure Virtual Machine Scale Sets/Azure Management API | HTTPS | 443 | Required to gather information about and manage Cassandra nodes (for example, reboot)|
58
58
|\*.servicebus.windows.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure EventHub | HTTPS | 443 | Required to forward logs to Azure|
@@ -73,7 +73,7 @@ The system uses DNS names to reach the Azure services described in this article
73
73
74
74
## Internal port usage
75
75
76
-
The following ports are only accessible within the VNET (or peered vnets./express routes). SQL Managed Instance for Apache Cassandra instances do not have a public IP and should not be made accessible on the Internet.
76
+
The following ports are only accessible within the virtual network (or peered vnets./express routes). Azure Managed Instances for Apache Cassandra don't have a public IP and shouldn't be made accessible on the Internet.
77
77
78
78
| Port | Use |
79
79
| ---- | --- |
@@ -87,6 +87,6 @@ The following ports are only accessible within the VNET (or peered vnets./expres
87
87
88
88
In this article, you learned about network rules to properly manage the service. Learn more about Azure SQL Managed Instance for Apache Cassandra with the following articles:
89
89
90
-
*[Overview of Azure SQL Managed Instance for Apache Cassandra](introduction.md)
91
-
*[Manage Azure SQL Managed Instance for Apache Cassandra resources using Azure CLI](manage-resources-cli.md)
90
+
*[Overview of Azure Managed Instance for Apache Cassandra](introduction.md)
91
+
*[Manage Azure Managed Instance for Apache Cassandra resources using Azure CLI](manage-resources-cli.md)
92
92
*[Use a VPN with Azure Managed Instance for Apache Cassandra](use-vpn.md)
0 commit comments