You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight/hdinsight-service-tags.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Network security group (NSG) service tags for Azure HDInsight
3
-
description: Use HDInsight service tags to allow inbound traffic to your cluster from HDInsight health and management services nodes, without explicitly adding IP addresses to your network security groups.
3
+
description: Use HDInsight service tags to allow inbound traffic to your cluster from health and management services nodes, without adding IP addresses to your NSGs.
4
4
author: hrasheed-msft
5
5
ms.author: hrasheed
6
6
ms.service: hdinsight
@@ -9,23 +9,23 @@ ms.custom: hdinsightactive
9
9
ms.date: 03/10/2020
10
10
---
11
11
12
-
# Network security group (NSG) service tags for Azure HDInsight
12
+
# NSG service tags for Azure HDInsight
13
13
14
-
HDInsight service tags for network security groups (NSGs) are groups of IP addresses for health and management services. These groups help minimize complexity for security rule creation. [Service tags](../virtual-network/security-overview.md#service-tags) provide an alternative method for allowing inbound traffic from specific IP addresses without entering each of the [management IP addresses](hdinsight-management-ip-addresses.md) in your network security groups.
14
+
Azure HDInsight service tags for network security groups (NSGs) are groups of IP addresses for health and management services. These groups help minimize complexity for security rule creation. [Service tags](../virtual-network/security-overview.md#service-tags) provide an alternative method for allowing inbound traffic from specific IP addresses without entering each of the [management IP addresses](hdinsight-management-ip-addresses.md) in your NSGs.
15
15
16
-
These service tags are created and managed by the HDInsight service. You can't create your own service tag, or modify an existing tag. Microsoft manages the address prefixes that match to the service tag, and automatically updates the service tag as addresses change.
16
+
The HDInsight service manages these service tags. You can't create your own service tag or modify an existing tag. Microsoft manages the address prefixes that match to the service tag and automatically updates the service tag as addresses change.
17
17
18
-
## Getting started with service tags
18
+
## Get started with service tags
19
19
20
20
You have two options for using service tags in your network security groups:
21
21
22
-
1.Use a single HDInsight service tag - this option will open your virtual network to all of the IP Addresses that the HDInsight service is using to monitor clusters across all regions. This option is the simplest method, but may not be appropriate if you have restrictive security requirements.
22
+
-**Use a single global HDInsight service tag**: This option opens your virtual network to all IP addresses that the HDInsight service uses to monitor clusters across all regions. This option is the simplest method, but might not be appropriate if you have restrictive security requirements.
23
23
24
-
1.Use multiple regional service tags - this option will open your virtual network to only the IP Addresses that HDInsight is using in that specific region. However, if you're using multiple regions, then you'll need to add multiple service tags to your virtual network.
24
+
-**Use multiple regional service tags**: This option opens your virtual network to only the IP addresses that HDInsight uses in that specific region. However, if you're using multiple regions, you'll need to add multiple service tags to your virtual network.
25
25
26
26
## Use a single global HDInsight service tag
27
27
28
-
The easiest way to begin using service tags with your HDInsight cluster is to add the global tag `HDInsight` to a network security group rule.
28
+
The easiest way to begin using service tags with your HDInsight cluster is to add the global tag `HDInsight` to an NSG rule.
29
29
30
30
1. From the [Azure portal](https://portal.azure.com/), select your network security group.
31
31
@@ -35,19 +35,19 @@ The easiest way to begin using service tags with your HDInsight cluster is to ad
35
35
36
36
1. From the **Source service tag** drop-down list, select **HDInsight**.
37
37
38
-

38
+

39
39
40
-
This tag contains the IP addresses of health and management services for all of the regions where HDInsight is available, and will ensure that your cluster can communicate with the necessary health and management services no matter where it's created.
40
+
This tag contains the IP addresses of health and management services for all regions where HDInsight is available. The tag will ensure that your cluster can communicate with the necessary health and management services no matter where it's created.
41
41
42
42
## Use regional HDInsight service tags
43
43
44
-
If option one won't work because you need more restrictive permissions, then you can allow only the service tags applicable for your region. The applicable service tags may be one, two, or three service tags, depending on the region where your cluster is created.
44
+
If the global tag option won't work because you need more restrictive permissions, you can allow only the service tags that are applicable for your region. There may be one, two, or three applicable service tags, depending on the region where your cluster is created.
45
45
46
-
To find out which service tags to add for your region, read the following sections of the document.
46
+
To find out which service tags to add for your region, read the following sections of the article.
47
47
48
48
### Use a single regional service tag
49
49
50
-
If you prefer service tag option two, and your cluster is located in one of the regions listed in this table, then you only need to add a single regional service tag to your network security group.
50
+
If you prefer to use regional service tags and your cluster is located in one of the regions listed in this table, you only need to add a single regional service tag to your network security group.
51
51
52
52
| Country | Region | Service tag |
53
53
| ---- | ---- | ---- |
@@ -68,22 +68,22 @@ If you prefer service tag option two, and your cluster is located in one of the
68
68
| Japan | Japan West | HDInsight.JapanWest |
69
69
| France | France Central| HDInsight.FranceCentral |
70
70
| UK | UK South | HDInsight.UKSouth |
71
-
| Azure Government | USDoD Central | HDInsight.USDoDCentral |
71
+
| Azure Government | USDoD Central | HDInsight.USDoDCentral |
72
72
| | USGov Texas | HDInsight.USGovTexas |
73
73
| | UsDoD East | HDInsight.USDoDEast |
74
74
| | USGov Arizona | HDInsight.USGovArizona |
75
75
76
76
### Use multiple regional service tags
77
77
78
-
If you prefer service tag option two, and the region where your cluster is created wasn't listed above, then you need to allow multiple regional service tags. The need to use more than one is due to differences in the arrangement of resource providers for the various regions.
78
+
If you prefer to use regional service tags but the region where your cluster is created wasn't listed in the preceding table, you need to allow multiple regional service tags. The need to use more than one is due to differences in the arrangement of resource providers for the various regions.
79
79
80
80
The remaining regions are divided into groups based on which regional service tags they use.
81
81
82
82
#### Group 1
83
83
84
-
If your cluster is created in one of the regions in the table below, allow the service tags `HDInsight.WestUS` and `HDInsight.EastUS` in addition to the regional service tag listed. Regions in this section require three service tags.
84
+
If your cluster is created in one of the regions in the following table, allow the service tags `HDInsight.WestUS` and `HDInsight.EastUS` in addition to the regional service tag listed. Regions in this section require three service tags.
85
85
86
-
For example, if your cluster is created in the `East US 2` region, then you'll need to add the following service tags to your network security group:
86
+
For example, if your cluster is created in the `East US 2` region, you'll need to add the following service tags to your network security group:
87
87
88
88
-`HDInsight.EastUS2`
89
89
-`HDInsight.WestUS`
@@ -106,17 +106,17 @@ For example, if your cluster is created in the `East US 2` region, then you'll n
106
106
107
107
#### Group 2
108
108
109
-
Clusters in the regions of **China North** and **China East**, need to allow two service tags: `HDInsight.ChinaNorth` and `HDInsight.ChinaEast`.
109
+
Clusters in the regions of *China North* and *China East* need to allow two service tags: `HDInsight.ChinaNorth` and `HDInsight.ChinaEast`.
110
110
111
111
#### Group 3
112
112
113
-
Clusters in the regions of **US Gov Iowa** and **US Gov Virginia**, need to allow two service tags: `HDInsight.USGovIowa` and `HDInsight.USGovVirginia`.
113
+
Clusters in the regions of *US Gov Iowa* and *US Gov Virginia* need to allow two service tags: `HDInsight.USGovIowa` and `HDInsight.USGovVirginia`.
114
114
115
115
#### Group 4
116
116
117
-
Clusters in the regions of **Germany Central** and **Germany Northeast**, need to allow two service tags: `HDInsight.GermanyCentral` and `HDInsight.GermanyNorthEast`.
117
+
Clusters in the regions of *Germany Central* and *Germany Northeast* need to allow two service tags: `HDInsight.GermanyCentral` and `HDInsight.GermanyNortheast`.
118
118
119
119
## Next steps
120
120
121
-
-[Network security groups - service tags](../virtual-network/security-overview.md#security-rules)
121
+
-[Network security groups: service tags](../virtual-network/security-overview.md#security-rules)
122
122
-[Create virtual networks for Azure HDInsight clusters](hdinsight-create-virtual-network.md)
0 commit comments