You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight/hdinsight-create-virtual-network.md
+18-19Lines changed: 18 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,32 +5,32 @@ author: hrasheed-msft
5
5
ms.author: hrasheed
6
6
ms.reviewer: jasonh
7
7
ms.service: hdinsight
8
-
ms.custom: hdinsightactive
9
8
ms.topic: conceptual
10
-
ms.date: 07/23/2019
9
+
ms.custom: hdinsightactive
10
+
ms.date: 04/16/2020
11
11
---
12
12
13
13
# Create virtual networks for Azure HDInsight clusters
14
14
15
-
This article provides examples and code samples for creating and configuring [Azure Virtual Networks](../virtual-network/virtual-networks-overview.md) for use with Azure HDInsight clusters. Detailed examples of creating network security groups (NSGs) and configuring DNS are presented.
15
+
This article provides examples and code samples for creating and configuring [Azure Virtual Networks](../virtual-network/virtual-networks-overview.md). To use with Azure HDInsight clusters. Detailed examples of creating network security groups (NSGs) and configuring DNS are presented.
16
16
17
17
For background information on using virtual networks with Azure HDInsight, see [Plan a virtual network for Azure HDInsight](hdinsight-plan-virtual-network-deployment.md).
18
18
19
19
## Prerequisites for code samples and examples
20
20
21
-
Before executing any of the code samples in this article, ou should have an understanding of TCP/IP networking. If you are not familiar with TCP/IP networking, consult someone who is before making modifications to production networks.
21
+
Before executing any of the code samples in this article, have an understanding of TCP/IP networking. If you aren't familiar with TCP/IP networking, consult someone before making modifications to production networks.
22
22
23
-
Other prerequisites for the samples in this article include the following:
23
+
Other prerequisites for the samples in this article include the following items:
24
24
25
-
* If you are using PowerShell, you will need to install the [AZ Module](https://docs.microsoft.com/powershell/azure/overview).
26
-
* If you want to use Azure CLI and have not yet installed it, see [Install the Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli).
25
+
* If you're using PowerShell, you'll need to install the [AZ Module](https://docs.microsoft.com/powershell/azure/overview).
26
+
* If you want to use Azure CLI and haven't yet installed it, see [Install the Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli).
27
27
28
28
> [!IMPORTANT]
29
29
> If you are looking for step by step guidance on connecting HDInsight to your on-premises network using an Azure Virtual Network, see the [Connect HDInsight to your on-premises network](connect-on-premises-network.md) document.
30
30
31
31
## <aid="hdinsight-nsg"></a>Example: network security groups with HDInsight
32
32
33
-
The examples in this section demonstrate how to create network security group rules that allow HDInsight to communicate with the Azure management services. Before using the examples, adjust the IP addresses to match the ones for the Azure region you are using. You can find this information in [HDInsight management IP addresses](hdinsight-management-ip-addresses.md).
33
+
The examples in this section demonstrate how to create network security group rules. The rules allow HDInsight to communicate with the Azure management services. Before using the examples, adjust the IP addresses to match the ones for the Azure region you're using. You can find this information in [HDInsight management IP addresses](hdinsight-management-ip-addresses.md).
This example demonstrates how to add rules to allow inbound traffic on the required IP addresses. It does not contain a rule to restrict inbound access from other sources. The following code demonstrates how to enable SSH access from the Internet:
149
+
This example demonstrates how to add rules to allow inbound traffic on the required IP addresses. It doesn't contain a rule to restrict inbound access from other sources. The following code demonstrates how to enable SSH access from the Internet:
@@ -197,7 +197,6 @@ Use the following steps to create a virtual network that restricts inbound traff
197
197
198
198
Once this command completes, you can install HDInsight into the Virtual Network.
199
199
200
-
201
200
These steps only open access to the HDInsight health and management service on the Azure cloud. Any other access to the HDInsight cluster from outside the Virtual Network is blocked. To enable access from outside the virtual network, you must add additional Network Security Group rules.
202
201
203
202
The following code demonstrates how to enable SSH access from the Internet:
@@ -233,7 +232,7 @@ On the custom DNS server in the virtual network:
233
232
az network nic list --resource-group RESOURCEGROUP --query "[0].dnsSettings.internalDomainNameSuffix"
234
233
```
235
234
236
-
2. On the custom DNS server for the virtual network, use the following text as the contents of the `/etc/bind/named.conf.local` file:
235
+
1. On the custom DNS server for the virtual network, use the following text as the contents of the `/etc/bind/named.conf.local` file:
237
236
238
237
```
239
238
// Forward requests for the virtual network suffix to Azure recursive resolver
@@ -247,7 +246,7 @@ On the custom DNS server in the virtual network:
247
246
248
247
This configuration routes all DNS requests for the DNS suffix of the virtual network to the Azure recursive resolver.
249
248
250
-
2. On the custom DNS server for the virtual network, use the following text as the contents of the `/etc/bind/named.conf.options` file:
249
+
1. On the custom DNS server for the virtual network, use the following text as the contents of the `/etc/bind/named.conf.options` file:
251
250
252
251
```
253
252
// Clients to accept requests from
@@ -283,9 +282,9 @@ On the custom DNS server in the virtual network:
283
282
284
283
* Replace the value `192.168.0.1` with the IP address of your on-premises DNS server. This entry routes all other DNS requests to the on-premises DNS server.
285
284
286
-
3. To use the configuration, restart Bind. For example, `sudo service bind9 restart`.
285
+
1. To use the configuration, restart Bind. For example, `sudo service bind9 restart`.
287
286
288
-
4. Add a conditional forwarder to the on-premises DNS server. Configure the conditional forwarder to send requests for the DNS suffix from step 1 to the custom DNS server.
287
+
1. Add a conditional forwarder to the on-premises DNS server. Configure the conditional forwarder to send requests for the DNS suffix from step 1 to the custom DNS server.
289
288
290
289
> [!NOTE]
291
290
> Consult the documentation for your DNS software for specifics on how to add a conditional forwarder.
@@ -321,7 +320,7 @@ This example makes the following assumptions:
321
320
// Forward requests for the virtual network suffix to Azure recursive resolver
322
321
zone "0owcbllr5hze3hxdja3mqlrhhe.ex.internal.cloudapp.net" {
323
322
type forward;
324
-
forwarders {10.0.0.4;}; # The IP address of the DNS server in the other virtual network
323
+
forwarders {10.0.0.4;}; # The IP address of the DNS server in the other virtual network
325
324
};
326
325
```
327
326
@@ -346,7 +345,7 @@ This example makes the following assumptions:
346
345
allow-query { goodclients; };
347
346
348
347
forwarders {
349
-
168.63.129.16; # Azure recursive resolver
348
+
168.63.129.16; # Azure recursive resolver
350
349
};
351
350
352
351
dnssec-validation auto;
@@ -355,18 +354,18 @@ This example makes the following assumptions:
355
354
listen-on { any; };
356
355
};
357
356
```
358
-
357
+
359
358
Replace the `10.0.0.0/16` and `10.1.0.0/16` values with the IP address ranges of your virtual networks. This entry allows resources in each network to make requests of the DNS servers.
360
359
361
-
Any requests that are not for the DNS suffixes of the virtual networks (for example, microsoft.com) is handled by the Azure recursive resolver.
360
+
Any requests that aren't for the DNS suffixes of the virtual networks (for example, microsoft.com) is handled by the Azure recursive resolver.
362
361
363
362
4. To use the configuration, restart Bind. For example, `sudo service bind9 restart` on both DNS servers.
364
363
365
364
After completing these steps, you can connect to resources in the virtual network using fully qualified domain names (FQDN). You can now install HDInsight into the virtual network.
366
365
367
366
## Next steps
368
367
369
-
* For an end-to-end example of configuring HDInsight to connect to an on-premises network, see [Connect HDInsight to an on-premises network](./connect-on-premises-network.md).
368
+
* For a complete example of configuring HDInsight to connect to an on-premises network, see [Connect HDInsight to an on-premises network](./connect-on-premises-network.md).
370
369
* For configuring Apache HBase clusters in Azure virtual networks, see [Create Apache HBase clusters on HDInsight in Azure Virtual Network](hbase/apache-hbase-provision-vnet.md).
371
370
* For configuring Apache HBase geo-replication, see [Set up Apache HBase cluster replication in Azure virtual networks](hbase/apache-hbase-replication.md).
372
371
* For more information on Azure virtual networks, see the [Azure Virtual Network overview](../virtual-network/virtual-networks-overview.md).
0 commit comments