Skip to content

Commit 8cca186

Browse files
authored
Merge pull request #113379 from dagiro/713935
713935
2 parents 6079a37 + 351cb55 commit 8cca186

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/hdinsight/hdinsight-use-external-metadata-stores.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: jasonh
77
ms.service: hdinsight
88
ms.topic: conceptual
99
ms.custom: hdinsightactive
10-
ms.date: 04/03/2020
10+
ms.date: 04/30/2020
1111
---
1212

1313
# Use external metadata stores in Azure HDInsight
@@ -62,6 +62,8 @@ Create or have an existing Azure SQL Database before setting up a custom Hive me
6262

6363
While creating the cluster, HDInsight service needs to connect to the external metastore and verify your credentials. Configure Azure SQL Database firewall rules to allow Azure services and resources to access the server. Enable this option in the Azure portal by selecting **Set server firewall**. Then select **No** underneath **Deny public network access**, and **Yes** underneath **Allow Azure services and resources to access this server** for the Azure SQL Database server or database. For more information, see [Create and manage IP firewall rules](https://docs.microsoft.com/azure/sql-database/sql-database-firewall-configure#use-the-azure-portal-to-manage-server-level-ip-firewall-rules)
6464

65+
Private endpoints for SQL stores are not supported.
66+
6567
![set server firewall button](./media/hdinsight-use-external-metadata-stores/configure-azure-sql-database-firewall1.png)
6668

6769
![allow azure services access](./media/hdinsight-use-external-metadata-stores/configure-azure-sql-database-firewall2.png)

0 commit comments

Comments
 (0)