Skip to content

Commit 62cde8b

Browse files
authored
Merge pull request #79110 from hrasheed-msft/hdi_firewall3
HDInsight Presentation updates for outbound traffic article
2 parents 16de979 + 1f36b27 commit 62cde8b

File tree

1 file changed

+31
-42
lines changed

1 file changed

+31
-42
lines changed

articles/hdinsight/hdinsight-restrict-outbound-traffic.md

Lines changed: 31 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -46,20 +46,22 @@ Select the new firewall **Test-FW01** from the Azure portal. Click **Rules** und
4646

4747
On the **Add application rule collection** screen, complete the following steps:
4848

49-
1. Enter a **Name**, **Priority**, and click **Allow** from the **Action** dropdown menu.
50-
1. Add the following rules:
51-
1. A rule to allow HDInsight and Windows Update traffic:
52-
1. In the **FQDN tags** section, provide a **Name**, and set **Source addresses** to `*`.
53-
1. Select **HDInsight** and the **WindowsUpdate** from the **FQDN Tags** dropdown menu.
54-
1. A rule to allow Windows login activity:
55-
1. In the **Target FQDNs** section, provide a **Name**, and set **Source addresses** to `*`.
56-
1. Enter `https:443` under **Protocol:Port** and `login.windows.net` under **Target FQDNS**.
57-
1. If your cluster is backed by WASB, then add a rule for WASB:
58-
1. In the **Target FQDNs** section, provide a **Name**, and set **Source addresses** to `*`.
59-
1. Enter `http:80,https:443` under **Protocol:Port** and the storage account url under **Target FQDNS**. The format will be similar to <storage_account_name.blob.core.windows.net>. To use ONLY https connections make sure ["secure transfer required"](https://docs.microsoft.com/azure/storage/common/storage-require-secure-transfer) is enabled on the storage account.
49+
1. Enter a **Name**, **Priority**, and click **Allow** from the **Action** dropdown menu, and enter the following rules in the **FQDN Tags Section** :
50+
51+
| **Name** | **Source Address** | **FQDN Tag** | **Notes** |
52+
| --- | --- | --- | --- |
53+
| Rule_1 | * | HDInsight and WindowsUpdate | Required for HDI services |
54+
55+
1. Add the following rules to the **Target FQDNs Section** :
56+
57+
| **Name** | **Source Address** | **Protocol:Port** | **Target FQDNS** | **Notes** |
58+
| --- | --- | --- | --- | --- |
59+
| Rule_2 | * | https:443 | login.windows.net | Allows Windows login activity |
60+
| Rule_3 | * | https:443,http:80 | <storage_account_name.blob.core.windows.net> | If your cluster is backed by WASB, then add a rule for WASB. To use ONLY https connections make sure ["secure transfer required"](https://docs.microsoft.com/azure/storage/common/storage-require-secure-transfer) is enabled on the storage account. |
61+
6062
1. Click **Add**.
6163

62-
![Title: Enter application rule collection details](./media/hdinsight-restrict-outbound-traffic/hdinsight-restrict-outbound-traffic-add-app-rule-collection-details.png)
64+
![Title: Enter application rule collection details](./media/hdinsight-restrict-outbound-traffic/hdinsight-restrict-outbound-traffic-add-app-rule-collection-details.png)
6365

6466
### Configure the firewall with network rules
6567

@@ -68,37 +70,24 @@ Create the network rules to correctly configure your HDInsight cluster.
6870
1. Select the new firewall **Test-FW01** from the Azure portal.
6971
1. Click **Rules** under **Settings** > **Network rule collection** > **Add network rule collection**.
7072
1. On the **Add network rule collection** screen, enter a **Name**, **Priority**, and click **Allow** from the **Action** dropdown menu.
71-
1. Create the following rules:
72-
1. A network rule in the IP Addresses section that allows the cluster to perform clock sync using NTP.
73-
1. In the **Rules** section, provide a **Name** and select **UDP** from the **Protocol** dropdown.
74-
1. Set **Source Addresses** and **Destination addresses** to `*`.
75-
1. Set **Destination Ports** to 123.
76-
1. If you are using Enterprise Security Package (ESP), then add a network rule in the IP Addresses section that allows communication with AAD-DS for ESP clusters.
77-
1. Determine the two IP addresses for your domain controllers.
78-
1. In the next row in the **Rules** section, provide a **Name** and select **Any** from the **Protocol** dropdown.
79-
1. Set **Source Addresses** `*`.
80-
1. Enter all of the IP addresses for your domain controllers in **Destination addresses** separated by commas.
81-
1. Set **Destination Ports** to `*`.
82-
1. If you are using Azure Data Lake Storage, then you can add a network rule in the IP Addresses section to address an SNI issue with ADLS Gen1 and Gen2. This option will route the traffic to firewall which might result in higher costs for large data loads but the traffic will be logged and auditable in firewall logs.
83-
1. Determine the IP address for your Data Lake Storage account. You can use a powershell command such as `[System.Net.DNS]::GetHostAddresses("STORAGEACCOUNTNAME.blob.core.windows.net")` to resolve the FQDN to an IP address.
84-
1. In the next row in the **Rules** section, provide a **Name** and select **TCP** from the **Protocol** dropdown.
85-
1. Set **Source Addresses** `*`.
86-
1. Enter the IP address for your storage account in **Destination addresses**.
87-
1. Set **Destination Ports** to `*`.
88-
1. (Optional) If you are using Log Analytics, then create a network rule in the IP Addresses section to enable communication with your Log Analytics workspace.
89-
1. In the next row in the **Rules** section, provide a **Name** and select **TCP** from the **Protocol** dropdown.
90-
1. Set **Source Addresses** `*`.
91-
1. Set **Destination addresses** to `*`.
92-
1. Set **Destination Ports** to `12000`.
93-
1. Configure a network rule in the Service Tags section for SQL that will allow you to log and audit SQL traffic, unless you configured Service Endpoints for SQL Server on the HDInsight subnet which will bypass the firewall.
94-
1. In the next row in the **Rules** section, provide a **Name** and select **TCP** from the **Protocol** dropdown.
95-
1. Set **Source Addresses** `*`.
96-
1. Set **Destination addresses** to `*`.
97-
1. Select **Sql** from the **Service Tags** dropdown.
98-
1. Set **Destination Ports** to `1433,11000-11999,14000-14999`.
73+
1. Create the following rules in the **IP Addresses** section:
74+
75+
| **Name** | **Protocol** | **Source Address** | **Destination Address** | **Destination Port** | **Notes** |
76+
| --- | --- | --- | --- | --- | --- |
77+
| Rule_1 | UDP | * | * | `123` | Time service |
78+
| Rule_2 | Any | * | DC_IP_Address_1, DC_IP_Address_2 | `*` | If you are using Enterprise Security Package (ESP), then add a network rule in the IP Addresses section that allows communication with AAD-DS for ESP clusters. You can find the IP addresses of the domain controllers on the AAD-DS section in the portal |
79+
| Rule_3 | TCP | * | IP Address of your Data Lake Storage account | `*` | If you are using Azure Data Lake Storage, then you can add a network rule in the IP Addresses section to address an SNI issue with ADLS Gen1 and Gen2. This option will route the traffic to firewall which might result in higher costs for large data loads but the traffic will be logged and auditable in firewall logs. Determine the IP address for your Data Lake Storage account. You can use a powershell command such as `[System.Net.DNS]::GetHostAddresses("STORAGEACCOUNTNAME.blob.core.windows.net")` to resolve the FQDN to an IP address.|
80+
| Rule_4 | TCP | * | * | `12000` | (Optional) If you are using Log Analytics, then create a network rule in the IP Addresses section to enable communication with your Log Analytics workspace. |
81+
82+
1. Create the following rules in the **Service Tags** section:
83+
84+
| **Name** | **Protocol** | **Source Address** | **Service Tags** | **Destination Port** | **Notes** |
85+
| --- | --- | --- | --- | --- | --- |
86+
| Rule_7 | TCP | * | * | `1433,11000-11999,14000-14999` | Configure a network rule in the Service Tags section for SQL that will allow you to log and audit SQL traffic, unless you configured Service Endpoints for SQL Server on the HDInsight subnet which will bypass the firewall. |
87+
9988
1. Click **Add** to complete creation of your network rule collection.
10089

101-
![Title: Enter application rule collection details](./media/hdinsight-restrict-outbound-traffic/hdinsight-restrict-outbound-traffic-add-network-rule-collection.png)
90+
![Title: Enter application rule collection details](./media/hdinsight-restrict-outbound-traffic/hdinsight-restrict-outbound-traffic-add-network-rule-collection.png)
10291

10392
### Create and configure a route table
10493

@@ -156,7 +145,7 @@ AzureDiagnostics | where msg_s contains "Deny" | where TimeGenerated >= ago(1h)
156145
Integrating your Azure Firewall with Azure Monitor logs is useful when first getting an application working when you are not aware of all of the application dependencies. You can learn more about Azure Monitor logs from [Analyze log data in Azure Monitor](../azure-monitor/log-query/log-query-overview.md)
157146

158147
## Access to the cluster
159-
After having the firewall setup successfully, you can use the internal endpoint (`https://<clustername>-int.azurehdinsight.net`) to access the Ambari from within the VNET. To use the public endpoint (`https://<clustername>.azurehdinsight.net`) or ssh endpoint (`<clustername>-ssh.azurehdinsight.net`), make sure you have the right routes in the route table and NSG rules setup to avoid the asymetric routing issue explained [here](https://docs.microsoft.com/azure/firewall/integrate-lb).
148+
After having the firewall setup successfully, you can use the internal endpoint (`https://<clustername>-int.azurehdinsight.net`) to access the Ambari from within the VNET. To use the public endpoint (`https://<clustername>.azurehdinsight.net`) or ssh endpoint (`<clustername>-ssh.azurehdinsight.net`), make sure you have the right routes in the route table and NSG rules setup to avoid the assymetric routing issue explained [here](https://docs.microsoft.com/azure/firewall/integrate-lb).
160149

161150
## Configure another network virtual appliance
162151

0 commit comments

Comments
 (0)