Skip to content

Commit 4619fd1

Browse files
authored
Modified a screenshot and few texts
Modified a screenshot and few texts
1 parent 9bce9c1 commit 4619fd1

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/hdinsight-aks/control-egress-traffic-from-hdinsight-on-aks-clusters.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Control egress traffic from HDInsight on AKS Clusters
33
description: A guide to configure and manage outbound network connections from HDInsight on AKS.
44
ms.service: hdinsight-aks
55
ms.topic: how-to
6-
ms.date: 03/18/2024
6+
ms.date: 03/19/2024
77
---
88

99
# Control egress traffic from HDInsight on AKS Clusters
@@ -125,7 +125,7 @@ Following is an example of setting up firewall rules, and testing your outbound
125125
|Virtual network |Select the integrated virtual network. |
126126
|Public IP address |Select an existing address or create one by selecting Add new. |
127127

128-
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/outbound-user-defined.png" alt-text="Screenshot showing outbound user defined." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/outbound-user-defined.png":::
128+
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/create-firewall-page.png" alt-text="Screenshot showing create a firewall basic tab." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/create-firewall-page.png":::
129129

130130
1. Click Review + create.
131131

@@ -185,7 +185,7 @@ Following is an example of setting up firewall rules, and testing your outbound
185185

186186
1. In Rules, add a network rule with the subnet as the source address, and specify an FQDN destination.
187187

188-
1. You're required to add AKS & HDInsight on AKS rules for allowing traffic for the cluster to function.
188+
1. You need to add AKS and HDInsight on AKS rules for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
189189

190190
1. You can also add the private endpoints for any dependent resources in the same subnet for cluster to access them (example – storage).
191191

@@ -240,7 +240,7 @@ The well-know FQDN is like a public cluster, but it can only be resolved to a CN
240240
> HDInsight on AKS creates private DNS zone in the cluster pool, virtual network. If your client applications are in same virtual network, you need not configure the private DNS zone again. In case you're using a client application in a different virtual network, you're required to use virutal network peering to bind to private dns zone in the cluster pool virtual network or use private endpoints in the virutal network, and private dns zones, to add the A-record to the private endpoint private IP.
241241
242242

243-
Well-know FQDN: `{clusterName}.privatelink.{clusterPoolName}.{subscriptionId}.{region}.hdinsightaks.net`
243+
Private FQDN: `{clusterName}.privatelink.{clusterPoolName}.{subscriptionId}.{region}.hdinsightaks.net`
244244

245245
The private FQDN is only for private cluster, recorded as A-RECORD in private DNS zone, is resolved to private IP of cluster.
246246

0 commit comments

Comments
 (0)