Skip to content

Commit 5026af6

Browse files
Merge pull request #294661 from sreekzz/patch-93268
Modified Author Name
2 parents 67b5f1f + 1012d89 commit 5026af6

File tree

3 files changed

+7
-13
lines changed

3 files changed

+7
-13
lines changed

articles/hdinsight/enable-private-link-on-kafka-rest-proxy-hdi-cluster.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,7 @@ title: Enable Private Link on an Azure HDInsight Kafka Rest Proxy cluster
33
description: Learn how to Enable Private Link on an Azure HDInsight Kafka Rest Proxy cluster.
44
ms.service: azure-hdinsight
55
ms.topic: conceptual
6-
ms.author: piyushgupta
7-
author: piyush-gupta1999
8-
ms.date: 09/06/2024
6+
ms.date: 02/14/2025
97
---
108

119
# Enable Private Link on an HDInsight Kafka Rest Proxy cluster

articles/hdinsight/hdinsight-private-link.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,7 @@ title: Enable Private Link on an Azure HDInsight cluster
33
description: Learn how to connect to an outside HDInsight cluster by using Azure Private Link.
44
ms.service: azure-hdinsight
55
ms.topic: conceptual
6-
ms.author: piyushgupta
7-
author: piyush-gupta1999
8-
ms.date: 04/11/2024
6+
ms.date: 02/14/2024
97
---
108

119
# Enable Private Link on an HDInsight cluster
@@ -36,7 +34,7 @@ To start, deploy the following resources if you haven't created them already. Yo
3634
|Network security group|hdi-privlink-cluster-vnet-nsg|Default NSG as required for cluster deployment|
3735

3836
> [!NOTE]
39-
> The network security group (NSG) can simply be deployed, we do not need to modify any NSG rules for cluster deployment.
37+
> The network security group (NSG) can be deployed, we don't need to modify any NSG rules for cluster deployment.
4038
4139

4240
## <a name="DisableNetworkPolicy"></a>Step 2: Configure HDInsight subnet
@@ -136,7 +134,7 @@ To create the private endpoints:
136134
| Subnet | default |
137135

138136
> [!IMPORTANT]
139-
> If you're using KafkaRestProxy HDInsight cluster, then follow this extra steps to [Enable Private Endpoints](./enable-private-link-on-kafka-rest-proxy-hdi-cluster.md#create-private-endpoints).
137+
> If you're using KafkaRestProxy HDInsight cluster, then follow this extra step to [Enable Private Endpoints](./enable-private-link-on-kafka-rest-proxy-hdi-cluster.md#create-private-endpoints).
140138
>
141139
142140
Once the private endpoints are created, you’re done with this phase of the setup. If you didn’t make a note of the private IP addresses assigned to the endpoints, follow the steps below:
@@ -145,7 +143,7 @@ Once the private endpoints are created, you’re done with this phase of the set
145143
1. Click on 'Private endpoints' tab.
146144
1. You should see both the Ambari and ssh Network interfaces listed.
147145
1. Click on each one and navigate to the ‘DNS configuration’ blade to see the private IP address.
148-
1. Make a note of these IP addresses because they are required to connect to the cluster and properly configure DNS.
146+
1. Make a note of these IP addresses because they're required to connect to the cluster and properly configure DNS.
149147

150148
## <a name="ConfigureDNS"></a>Step 6: Configure DNS to connect over private endpoints
151149

@@ -195,7 +193,7 @@ To configure DNS resolution through a Private DNS zone:
195193
:::image type="content" source="media/hdinsight-private-link/private-dns-zone-add-ssh-record.png" alt-text="Diagram of private link dns zone add ssh record.":::
196194

197195
> [!IMPORTANT]
198-
> If you are using KafkaRestProxy HDInsight cluster, then follow this extra steps to [Configure DNS to connect over private endpoint](./enable-private-link-on-kafka-rest-proxy-hdi-cluster.md#configure-dns-to-connect-over-private-endpoints).
196+
> If you're using KafkaRestProxy HDInsight cluster, then follow this extra step to [Configure DNS to connect over private endpoint](./enable-private-link-on-kafka-rest-proxy-hdi-cluster.md#configure-dns-to-connect-over-private-endpoints).
199197
>
200198
201199
4. Associate the private DNS zone with the client VNET by adding a Virtual Network Link.

articles/hdinsight/kafka/secure-spark-kafka-streaming-integration-scenario.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,7 @@ title: Secure Spark and Kafka – Spark streaming integration scenario - Azure H
33
description: Learn how to secure Spark and Kafka streaming integration.
44
ms.service: azure-hdinsight
55
ms.topic: how-to
6-
ms.author: piyushgupta
7-
author: piyush-gupta1999
8-
ms.date: 11/25/2024
6+
ms.date: 02/14/2024
97
---
108

119
# Secure Spark and Kafka – Spark streaming integration scenario

0 commit comments

Comments
 (0)