Skip to content

Commit 5dd7714

Browse files
authored
Improved Correctness score
Improved Correctness score
1 parent 7030f33 commit 5dd7714

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/hdinsight/hdinsight-restrict-outbound-traffic.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ A summary of the steps to lock down egress from your existing HDInsight with Azu
2626

2727
1. Create a subnet.
2828
1. Create a firewall.
29-
1. Add application rules to the firewall.
29+
1. `Add application` rules to the firewall.
3030
1. Add network rules to the firewall.
3131
1. Create a routing table.
3232

@@ -66,7 +66,7 @@ Create an application rule collection that allows the cluster to send and receiv
6666

6767
**Target FQDNs section**
6868

69-
| Name | Source addresses | Protocol:Port | Target FQDNS | Notes |
69+
| Name | Source addresses | Protocol: Port | Target FQDNS | Notes |
7070
| --- | --- | --- | --- | --- |
7171
| Rule_2 | * | https:443 | login.windows.net | Allows Windows login activity |
7272
| Rule_3 | * | https:443 | login.microsoftonline.com | Allows Windows login activity |
@@ -81,9 +81,9 @@ Create an application rule collection that allows the cluster to send and receiv
8181

8282
Create the network rules to correctly configure your HDInsight cluster.
8383

84-
1. Continuing from the prior step, navigate to **Network rule collection** > **+ Add network rule collection**.
84+
1. Continuing from the prior step, navigate to **Network rule collection** > `+ Add network rule collection`.
8585

86-
1. On the **Add network rule collection** screen, provide the following information:
86+
1. On the `Add network rule collection` screen, provide the following information:
8787

8888
**Top section**
8989

@@ -97,7 +97,7 @@ Create the network rules to correctly configure your HDInsight cluster.
9797

9898
| Name | Protocol | Source Addresses | Service Tags | Destination Ports | Notes |
9999
| --- | --- | --- | --- | --- | --- |
100-
| Rule_6 | TCP | * | SQL | 1433 , 11000-11999 | If you are using the default sql servers provided by HDInsight, configure a network rule in the Service Tags section for SQL that will allow you to log and audit SQL traffic. Unless you configured Service Endpoints for SQL Server on the HDInsight subnet, which will bypass the firewall. If you are using custom SQL server for Ambari, Oozie, Ranger and Hive metastores then you only need to allow the traffic to your own custom SQL Servers. Refer to [Azure SQL Database and Azure Synapse Analytics connectivity architecture](/azure/azure-sql/database/connectivity-architecture) to see why 11000-11999 port range is also needed in addition to 1433. |
100+
| Rule_6 | TCP | * | SQL | 1433, 11000-11999 | If you are using the default sql servers provided by HDInsight, configure a network rule in the Service Tags section for SQL that will allow you to log and audit SQL traffic. Unless you configured Service Endpoints for SQL Server on the HDInsight subnet, which will bypass the firewall. If you are using custom SQL server for Ambari, Oozie, Ranger and Hive metastore then you only need to allow the traffic to your own custom SQL Servers. Refer to [Azure SQL Database and Azure Synapse Analytics connectivity architecture](/azure/azure-sql/database/connectivity-architecture) to see why 11000-11999 port range is also needed in addition to 1433. |
101101
| Rule_7 | TCP | * | Azure Monitor | * | (optional) Customers who plan to use auto scale feature should add this rule. |
102102

103103
:::image type="content" source="./media/hdinsight-restrict-outbound-traffic/hdinsight-restrict-outbound-traffic-add-network-rule-collection.png" alt-text="Title: Enter application rule collection.":::

0 commit comments

Comments
 (0)