You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hpc-cache/hpc-cache-prerequisites.md
+55-3Lines changed: 55 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Azure HPC Cache prerequisites
3
3
description: Prerequisites for using Azure HPC Cache
4
-
author: ekpgh
4
+
author: ronhogue
5
5
ms.service: hpc-cache
6
6
ms.topic: how-to
7
-
ms.date: 01/19/2022
7
+
ms.date: 02/24/2022
8
8
ms.author: rohogue
9
9
---
10
10
@@ -34,10 +34,11 @@ A paid subscription is recommended.
34
34
35
35
## Network infrastructure
36
36
37
-
Two network-related prerequisites should be set up before you can use your cache:
37
+
These network-related prerequisites need to be set up before you can use your cache:
38
38
39
39
* A dedicated subnet for the Azure HPC Cache instance
40
40
* DNS support so that the cache can access storage and other resources
41
+
* Access from the subnet to additional Microsoft Azure infrastructure services, including NTP servers and the Azure Queue Storage service.
41
42
42
43
### Cache subnet
43
44
@@ -49,6 +50,8 @@ The Azure HPC Cache needs a dedicated subnet with these qualities:
49
50
50
51
The best practice is to create a new subnet for each cache. You can create a new virtual network and subnet as part of creating the cache.
51
52
53
+
When creating this subnet, be careful that its security settings allow access to the necessary infrastructure services mentioned later in this section. You can restrict outbound internet connectivity, but make sure that there are exceptions for the items documented here.
54
+
52
55
### DNS access
53
56
54
57
The cache needs DNS to access resources outside of its virtual network. Depending on which resources you're using, you might need to set up a customized DNS server and configure forwarding between that server and Azure DNS servers:
@@ -95,6 +98,55 @@ More tips for NTP access:
95
98
96
99
* You can configure which NTP server your HPC Cache uses on the **Networking** page. Read [Configure additional settings](configuration.md#customize-ntp) for more information.
97
100
101
+
### Azure Queue Storage access
102
+
103
+
The cache must be able to securely access the [Azure Queue Storage service](../storage/queues/storage-queues-introduction.md) from inside its dedicated subnet. Azure HPC Cache uses the queues service when communicating configuration and state information.
104
+
105
+
If the cache can't access the queue service, you might see a CacheConnectivityError message when creating the cache.
106
+
107
+
There are two ways to provide access:
108
+
109
+
* Create an Azure Storage service endpoint in your cache subnet.
110
+
Read [Add a virtual network subnet](../virtual-network/virtual-network-manage-subnet.md#add-a-subnet) for instructions to add the **Microsoft.Storage** service endpoint.
111
+
112
+
* Individually configure access to the Azure storage queue service domain in your network security group or other firewalls.
113
+
114
+
Add rules to permit access on these ports:
115
+
116
+
* TCP port 443 for secure traffic to any host in the domain queue.core.windows.net (`*.queue.core.windows.net`).
117
+
118
+
* TCP port 80 - used for verification of the server-side certificate. This is sometimes referred to as certificate revocation list (CRL) checking and online certificate status protocol (OCSP) communications. All of *.queue.core.windows.net uses the same certificate, and thus the same CRL/OCSP servers. The hostname is stored in the server-side SSL certificate.
119
+
120
+
Refer to the security rule tips in [NTP access](#ntp-access) for more information.
121
+
122
+
This command lists the CRL and OSCP servers that need to be permitted access. These servers must be resolvable by DNS and reachable on port 80 from the cache subnet.
123
+
124
+
```bash
125
+
126
+
openssl s_client -connect azure.queue.core.windows.net:443 2>&1< /dev/null | sed -n '/-----BEGIN/,/-----END/p'| openssl x509 -noout -text -in /dev/stdin |egrep -i crl\|ocsp|grep URI
127
+
128
+
```
129
+
130
+
The output looks something like this, and can change if the SSL certificate updates:
0 commit comments