Skip to content

Commit 36245dd

Browse files
committed
unrelated change to address acrolinx score
1 parent bffc6fa commit 36245dd

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/managed-instance-apache-cassandra/network-rules.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Required outbound network rules for Azure Managed Instance for Apache Cassandra
3-
description: Learn what are the required outbound network rules and FQDNs for Azure Managed Instance for Apache Cassandra
3+
description: Learn what are the required outbound network rules and FQDNs for Azure Managed Instance for Apache Cassandra.
44
author: rothja
55
ms.service: managed-instance-apache-cassandra
66
ms.topic: how-to
@@ -20,7 +20,7 @@ The Azure Managed Instance for Apache Cassandra service requires certain network
2020
> [!TIP]
2121
> If you use [VPN](use-vpn.md) then you don't need to open any other connection.
2222
23-
If you're using Azure Firewall to restrict outbound access, we highly recommend using [virtual network service tags](../virtual-network/service-tags-overview.md). Below are the tags required to make Azure SQL Managed Instance for Apache Cassandra function properly.
23+
If you're using Azure Firewall to restrict outbound access, we highly recommend using [virtual network service tags](../virtual-network/service-tags-overview.md). The tags in the table are required to make Azure SQL Managed Instance for Apache Cassandra function properly.
2424

2525
| Destination Service Tag | Protocol | Port | Use |
2626
|----------------------------------------------------------------------------------|----------|---------|------|
@@ -35,14 +35,14 @@ If you're using Azure Firewall to restrict outbound access, we highly recommend
3535
| ApiManagement | HTTPS | 443 | Required to gather information about and manage Cassandra nodes (for example, reboot) |
3636

3737
> [!NOTE]
38-
> In addition to the above, you will also need to add the following address prefixes, as a service tag does not exist for the relevant service:
38+
> In addition to the tags table, you will also need to add the following address prefixes, as a service tag does not exist for the relevant service:
3939
> 104.40.0.0/13
4040
> 13.104.0.0/14
4141
> 40.64.0.0/10
4242
4343
## User-defined routes
4444

45-
If you're using a third-party Firewall to restrict outbound access, we highly recommend configuring [user-defined routes (UDRs)](../virtual-network/virtual-networks-udr-overview.md#user-defined) for Microsoft address prefixes, rather than attempting to allow connectivity through your own Firewall. See sample [bash script](https://github.com/Azure-Samples/cassandra-managed-instance-tools/blob/main/configureUDR.sh) to add the required address prefixes in user-defined routes.
45+
If you're using a non-Microsoft Firewall to restrict outbound access, we highly recommend configuring [user-defined routes (UDRs)](../virtual-network/virtual-networks-udr-overview.md#user-defined) for Microsoft address prefixes, rather than attempting to allow connectivity through your own Firewall. See sample [bash script](https://github.com/Azure-Samples/cassandra-managed-instance-tools/blob/main/configureUDR.sh) to add the required address prefixes in user-defined routes.
4646

4747
## Azure Global required network rules
4848

@@ -52,7 +52,7 @@ The required network rules and IP address dependencies are:
5252
|----------------------------------------------------------------------------------|----------|---------|------|
5353
|snovap\<region\>.blob.core.windows.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure Storage | HTTPS | 443 | Required for secure communication between the nodes and Azure Storage for Control Plane communication and configuration.|
5454
|\*.store.core.windows.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure Storage | HTTPS | 443 | Required for secure communication between the nodes and Azure Storage for Control Plane communication and configuration.|
55-
|\*.blob.core.windows.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure Storage | HTTPS | 443 | Required for secure communication between the nodes and Azure Storage to store backups. *Backup feature is being revised and storage name will follow a pattern by GA*|
55+
|\*.blob.core.windows.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure Storage | HTTPS | 443 | Required for secure communication between the nodes and Azure Storage to store backups. *Backup feature is being revised and a pattern for storage name follows by GA*|
5656
|vmc-p-\<region\>.vault.azure.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure KeyVault | HTTPS | 443 | Required for secure communication between the nodes and Azure Key Vault. Certificates and keys are used to secure communication inside the cluster.|
5757
|management.azure.com:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure Virtual Machine Scale Sets/Azure Management API | HTTPS | 443 | Required to gather information about and manage Cassandra nodes (for example, reboot)|
5858
|\*.servicebus.windows.net:443</br> Or</br> [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Azure EventHub | HTTPS | 443 | Required to forward logs to Azure|
@@ -73,7 +73,7 @@ The system uses DNS names to reach the Azure services described in this article
7373

7474
## Internal port usage
7575

76-
The following ports are only accessible within the VNET (or peered vnets./express routes). SQL Managed Instance for Apache Cassandra instances do not have a public IP and should not be made accessible on the Internet.
76+
The following ports are only accessible within the virtual network (or peered vnets./express routes). Azure Managed Instances for Apache Cassandra don't have a public IP and shouldn't be made accessible on the Internet.
7777

7878
| Port | Use |
7979
| ---- | --- |
@@ -87,6 +87,6 @@ The following ports are only accessible within the VNET (or peered vnets./expres
8787

8888
In this article, you learned about network rules to properly manage the service. Learn more about Azure SQL Managed Instance for Apache Cassandra with the following articles:
8989

90-
* [Overview of Azure SQL Managed Instance for Apache Cassandra](introduction.md)
91-
* [Manage Azure SQL Managed Instance for Apache Cassandra resources using Azure CLI](manage-resources-cli.md)
90+
* [Overview of Azure Managed Instance for Apache Cassandra](introduction.md)
91+
* [Manage Azure Managed Instance for Apache Cassandra resources using Azure CLI](manage-resources-cli.md)
9292
* [Use a VPN with Azure Managed Instance for Apache Cassandra](use-vpn.md)

0 commit comments

Comments
 (0)