Skip to content

Commit 63f56ba

Browse files
authored
Merge pull request #78138 from hrasheed-msft/patch-74
Update hdinsight-extend-hadoop-virtual-network.md
2 parents ecd02c9 + eff0668 commit 63f56ba

File tree

1 file changed

+14
-16
lines changed

1 file changed

+14
-16
lines changed

articles/hdinsight/hdinsight-extend-hadoop-virtual-network.md

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: hrasheed
66
ms.service: hdinsight
77
ms.custom: hdinsightactive
88
ms.topic: conceptual
9-
ms.date: 03/29/2019
9+
ms.date: 05/28/2019
1010
---
1111

1212
# Extend Azure HDInsight using an Azure Virtual Network
@@ -206,41 +206,39 @@ To connect to Apache Ambari and other web pages through the virtual network, use
206206
207207
## <a id="networktraffic"></a> Controlling network traffic
208208
209+
### Controlling inbound traffic to HDInsight clusters
210+
209211
Network traffic in an Azure Virtual Networks can be controlled using the following methods:
210212
211213
* **Network security groups** (NSG) allow you to filter inbound and outbound traffic to the network. For more information, see the [Filter network traffic with network security groups](../virtual-network/security-overview.md) document.
212214
213-
> [!WARNING]
214-
> HDInsight does not support restricting outbound traffic. All outbound traffic should be allowed.
215-
216-
* **User-defined routes** (UDR) define how traffic flows between resources in the network. For more information, see the [User-defined routes and IP forwarding](../virtual-network/virtual-networks-udr-overview.md) document.
217-
218215
* **Network virtual appliances** replicate the functionality of devices such as firewalls and routers. For more information, see the [Network Appliances](https://azure.microsoft.com/solutions/network-appliances) document.
219216
220-
As a managed service, HDInsight requires unrestricted access to the HDInsight health and management services both for incoming and outgoing traffic from the VNET. When using NSGs and UDRs, you must ensure that these services can still communicate with HDInsight cluster.
217+
As a managed service, HDInsight requires unrestricted access to the HDInsight health and management services both for incoming and outgoing traffic from the VNET. When using NSGs, you must ensure that these services can still communicate with HDInsight cluster.
218+
219+
![Diagram of HDInsight entities created in Azure custom VNET](./media/hdinsight-virtual-network-architecture/vnet-diagram.png)
221220
222-
### <a id="hdinsight-ip"></a> HDInsight with network security groups and user-defined routes
221+
### <a id="hdinsight-ip"></a> HDInsight with network security groups
223222
224-
If you plan on using **network security groups** or **user-defined routes** to control network traffic, perform the following actions before installing HDInsight:
223+
If you plan on using **network security groups** to control network traffic, perform the following actions before installing HDInsight:
225224
226225
1. Identify the Azure region that you plan to use for HDInsight.
227226
228227
2. Identify the IP addresses required by HDInsight. For more information, see the [IP Addresses required by HDInsight](#hdinsight-ip) section.
229228
230-
3. Create or modify the network security groups or user-defined routes for the subnet that you plan to install HDInsight into.
229+
3. Create or modify the network security groups for the subnet that you plan to install HDInsight into.
231230
232-
* __Network security groups__: allow __inbound__ traffic on port __443__ from the IP addresses. This will ensure that HDI management services can reach the cluster from outside VNET.
233-
* __User-defined routes__: If you plan to use UDRs, create a route for each IP address and set the __Next hop type__ to __Internet__. You should also allow any other outbound traffic from the VNET with no restriction. For example, you can route all other traffic to your Azure firewall or network virtual appliance (hosted in Azure) for monitoring purposes but the outgoing traffic should not be blocked.
231+
* __Network security groups__: allow __inbound__ traffic on port __443__ from the IP addresses. This will ensure that HDInsight management services can reach the cluster from outside the virtual network.
234232
235-
For more information on network security groups or user-defined routes, see the following documentation:
233+
For more information on network security groups, see the [overview of network security groups](../virtual-network/security-overview.md).
236234
237-
* [Network security group](../virtual-network/security-overview.md)
235+
### Controlling outbound traffic to HDInsight clusters
238236
239-
* [User-defined routes](../virtual-network/virtual-networks-udr-overview.md)
237+
For more information on controlling outbound traffic from HDInsight clusters, see [Configure outbound network traffic restriction for Azure HDInsight clusters](hdinsight-restrict-outbound-traffic.md).
240238
241239
#### Forced tunneling to on-premise
242240
243-
Forced tunneling is a user-defined routing configuration where all traffic from a subnet is forced to a specific network or location, such as your on-premises network. HDInsight does __not__ support forced tunneling to the on-premises networks. If you are using Azure Firewall or a network virtual appliance hosted in Azure, you can use UDRs to route the traffic to it for monitoring purposes and allow all outgoing traffic.
241+
Forced tunneling is a user-defined routing configuration where all traffic from a subnet is forced to a specific network or location, such as your on-premises network. HDInsight does __not__ support forced tunneling of traffic to on-premises networks.
244242
245243
## <a id="hdinsight-ip"></a> Required IP addresses
246244

0 commit comments

Comments
 (0)