Skip to content

Commit 6d30ed5

Browse files
authored
Update network-virtual-appliance.md
1 parent 0ffd850 commit 6d30ed5

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/hdinsight/network-virtual-appliance.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
22
title: Configure network virtual appliance in Azure HDInsight
3-
description: Learn how to configure a number of additional features for your network virtual appliance in Azure HDInsight.
3+
description: Learn how to configure many additional features for your network virtual appliance in Azure HDInsight.
44
ms.service: hdinsight
55
ms.topic: how-to
6-
ms.date: 09/19/2023
6+
ms.date: 09/20/2023
77
---
88

99
# Configure network virtual appliance in Azure HDInsight
1010

1111
> [!Important]
1212
> The following information is **only** required if you wish to configure a network virtual appliance (NVA) other than [Azure Firewall](./hdinsight-restrict-outbound-traffic.md).
1313
14-
Azure Firewall FQDN tag is automatically configured to allow traffic for many of the common important FQDNs. Using another network virtual appliance will require you to configure a number of additional features. Keep the following factors in mind as you configure your network virtual appliance:
14+
Azure Firewall FQDN tag is automatically configured to allow traffic for many of the common important FQDNs. Using another network virtual appliance requires you to configure a number of additional features. Keep the following factors in mind as you configure your network virtual appliance:
1515

1616
* Service Endpoint capable services can be configured with service endpoints that results in bypassing the NVA, usually for cost or performance considerations.
1717
* If ResourceProviderConnection is set to *outbound*, you can use private endpoints for the storage and SQL servers for metastores and there is no need to add them to the NVA.
@@ -21,7 +21,7 @@ Azure Firewall FQDN tag is automatically configured to allow traffic for many of
2121

2222
## Service endpoint capable dependencies
2323

24-
You can optionally enable one or more of the following service endpoints which will result in bypassing the NVA. This option can be useful for large amounts of data transfers to save on cost and also for performance optimizations.
24+
You can optionally enable one or more of the following service endpoints, which result in bypassing the NVA. This option can be useful for large amounts of data transfers to save on cost and also for performance optimizations.
2525

2626
| **Endpoint** |
2727
|---|
@@ -33,7 +33,7 @@ You can optionally enable one or more of the following service endpoints which w
3333

3434
| **Endpoint** | **Details** |
3535
|---|---|
36-
| IPs published [here](hdinsight-management-ip-addresses.md) | These IPs are for HDInsight resource provider and should be included in the UDR to avoid asymmetric routing. This rule is only needed if the ResourceProviderConnection is set to *Inbound*. If the ResourceProviderConnection is set to *Outbound* then these IPs are not needed in the UDR. |
36+
| IPs published [here](hdinsight-management-ip-addresses.md) | These IPs are for HDInsight resource provider and should be included in the UDR to avoid asymmetric routing. This rule is only needed if the ResourceProviderConnection is set to *Inbound*. If the ResourceProviderConnection is set to *Outbound*, then these IPs are not needed in the UDR. |
3737
| AAD-DS private IPs | Only needed for ESP clusters, if the VNETs are not peered.|
3838

3939

0 commit comments

Comments
 (0)