You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/batch/batch-virtual-network.md
+15-13Lines changed: 15 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Provision a pool in a virtual network
3
3
description: How to create a Batch pool in an Azure virtual network so that compute nodes can communicate securely with other VMs in the network, such as a file server.
4
4
ms.topic: how-to
5
-
ms.date: 10/26/2022
5
+
ms.date: 11/14/2022
6
6
ms.custom: seodec18
7
7
---
8
8
@@ -77,9 +77,9 @@ In order to provide the necessary communication between compute nodes and the Ba
77
77
configured such that:
78
78
79
79
* Inbound TCP traffic on ports 29876 and 29877 from Batch service IP addresses that correspond to the
80
-
`BatchNodeManagement` service tag. This rule is only created in `classic` pool communication mode.
80
+
BatchNodeManagement.*region* service tag. This rule is only created in `classic` pool communication mode.
81
81
* Inbound TCP traffic on port 22 (Linux nodes) or port 3389 (Windows nodes) to permit remote access. For certain types of multi-instance tasks on Linux (such as MPI), you'll need to also allow SSH port 22 traffic for IPs in the subnet containing the Batch compute nodes. This traffic may be blocked per subnet-level NSG rules (see below).
82
-
* Outbound any traffic on port 443 to Batch service IP addresses that correspond to the `BatchNodeManagement` service tag.
82
+
* Outbound any traffic on port 443 to Batch service IP addresses that correspond to the BatchNodeManagement.*region* service tag.
83
83
* Outbound traffic on any port to the virtual network. This rule may be amended per subnet-level NSG rules (see below).
84
84
* Outbound traffic on any port to the Internet. This rule may be amended per subnet-level NSG rules (see below).
85
85
@@ -92,13 +92,15 @@ If you have an NSG associated with the subnet for Batch compute nodes, you must
92
92
NSG with at least the inbound and outbound security rules that are shown in the following tables.
93
93
94
94
> [!WARNING]
95
-
> Batch service IP addresses can change over time. Therefore, we highly recommend that you use the `BatchNodeManagement` service tag (or a regional variant) for the NSG rules indicated in the following tables. Avoid populating NSG rules with specific Batch service IP addresses.
95
+
> Batch service IP addresses can change over time. Therefore, we highly recommend that you use the
96
+
> BatchNodeManagement.*region* service tag (or a regional variant) for the NSG rules indicated in the
97
+
> following tables. Avoid populating NSG rules with specific Batch service IP addresses.
96
98
97
99
#### Inbound security rules
98
100
99
101
| Source Service Tag or IP Addresses | Destination Ports | Protocol | Pool Communication Mode | Required |
@@ -182,20 +184,20 @@ To ensure that the nodes in your pool work in a VNet that has forced tunneling e
182
184
183
185
For classic communication mode pools:
184
186
185
-
- The Batch service needs to communicate with nodes for scheduling tasks. To enable this communication, add a UDR corresponding to the `BatchNodeManagement.<region>`[service tag](../virtual-network/virtual-networks-udr-overview.md#service-tags-for-user-defined-routes) in the region where your Batch account exists. Set the **Next hop type** to **Internet**.
187
+
- The Batch service needs to communicate with nodes for scheduling tasks. To enable this communication, add a UDR corresponding to the BatchNodeManagement.*region*[service tag](../virtual-network/virtual-networks-udr-overview.md#service-tags-for-user-defined-routes) in the region where your Batch account exists. Set the **Next hop type** to **Internet**.
186
188
187
189
- Ensure that outbound TCP traffic to Azure Storage on destination port 443 (specifically, URLs of the form `*.table.core.windows.net`, `*.queue.core.windows.net`, and `*.blob.core.windows.net`) isn't blocked by your on-premises network.
188
190
189
191
For [simplified communication mode](simplified-compute-node-communication.md) pools without using node management private endpoint:
190
192
191
-
- Ensure that outbound TCP/UDP traffic to the Azure Batch `BatchNodeManagement.<region>` service tag on destination port 443 isn't blocked by your on-premises network. Currently only TCP protocol is used, but UDP may be required for future compatibility.
193
+
- Ensure that outbound TCP/UDP traffic to the Azure Batch BatchNodeManagement.*region* service tag on destination port 443 isn't blocked by your on-premises network. Currently only TCP protocol is used, but UDP may be required for future compatibility.
192
194
193
195
For all pools:
194
196
195
197
- If you use virtual file mounts, review the [networking requirements](virtual-file-mount.md#networking-requirements), and ensure that no required traffic is blocked.
196
198
197
199
> [!WARNING]
198
-
> Batch service IP addresses can change over time. To prevent outages due to Batch service IP address changes, do not directly specify IP addresses. Instead use the `BatchNodeManagement.<region>`[service tag](../virtual-network/virtual-networks-udr-overview.md#service-tags-for-user-defined-routes).
200
+
> Batch service IP addresses can change over time. To prevent outages due to Batch service IP address changes, do not directly specify IP addresses. Instead use the BatchNodeManagement.*region*[service tag](../virtual-network/virtual-networks-udr-overview.md#service-tags-for-user-defined-routes).
Copy file name to clipboardExpand all lines: articles/batch/best-practices.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Best practices
3
3
description: Learn best practices and useful tips for developing your Azure Batch solutions.
4
-
ms.date: 10/31/2022
4
+
ms.date: 11/14/2022
5
5
ms.topic: conceptual
6
6
---
7
7
@@ -245,9 +245,9 @@ Review the following guidance related to connectivity in your Batch solutions.
245
245
246
246
### Network Security Groups (NSGs) and User Defined Routes (UDRs)
247
247
248
-
When provisioning [Batch pools in a virtual network](batch-virtual-network.md), ensure that you're closely following the guidelines regarding the use of the `BatchNodeManagement.<region>` service tag, ports, protocols and direction of the rule. Use of the service tag is highly recommended; don't use underlying Batch service IP addresses as they can change over time. Using Batch service IP addresses directly can cause instability, interruptions, or outages for your Batch pools.
248
+
When provisioning [Batch pools in a virtual network](batch-virtual-network.md), ensure that you're closely following the guidelines regarding the use of the BatchNodeManagement.*region* service tag, ports, protocols and direction of the rule. Use of the service tag is highly recommended; don't use underlying Batch service IP addresses as they can change over time. Using Batch service IP addresses directly can cause instability, interruptions, or outages for your Batch pools.
249
249
250
-
For User Defined Routes (UDRs), it's recommended to use `BatchNodeManagement.<region>`[service tags](../virtual-network/virtual-networks-udr-overview.md#service-tags-for-user-defined-routes) instead of Batch service IP addresses as they can change over time.
250
+
For User Defined Routes (UDRs), it's recommended to use BatchNodeManagement.*region*[service tags](../virtual-network/virtual-networks-udr-overview.md#service-tags-for-user-defined-routes) instead of Batch service IP addresses as they can change over time.
0 commit comments