Skip to content

Commit 8d1036d

Browse files
Merge pull request #270339 from sreekzz/patch-17
Made changes as per review comment
2 parents be25dc0 + 3ec1174 commit 8d1036d

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/hdinsight-aks/control-egress-traffic-from-hdinsight-on-aks-clusters.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ Following is an example of setting up firewall rules, and testing your outbound
185185

186186
1. Navigate to the firewall's overview page and select its firewall policy.
187187

188-
1. In the firewall policy page, from the left navigation, select **Application Rules > Add a rule collection**.
188+
1. In the firewall policy page, from the left navigation, select **Application Rules and Network Rules > Add a rule collection.**
189189

190190
1. In **Rules**, add a network rule with the subnet as the source address, and specify an FQDN destination.
191191

@@ -239,9 +239,10 @@ Well-know FQDN: `{clusterName}.{clusterPoolName}.{subscriptionId}.{region}.hdi
239239

240240
The well-know FQDN is like a public cluster, but it can only be resolved to a CNAME with subdomain, which means well-know FQDN of private cluster must be used with correct `Private DNS zone setting` to make sure FQDN can be finally solved to correct Private IP address.
241241

242+
Private DNS zone should be able to resolve private FQDN to an IP `(privatelink.{clusterPoolName}.{subscriptionId})`.
242243

243244
> [!NOTE]
244-
> HDInsight on AKS creates private DNS zone in the cluster pool, virtual network. If your client applications are in same virtual network, you need not configure the private DNS zone again. In case you're using a client application in a different virtual network, you're required to use virutal network peering to bind to private dns zone in the cluster pool virtual network or use private endpoints in the virutal network, and private dns zones, to add the A-record to the private endpoint private IP.
245+
> HDInsight on AKS creates private DNS zone in the cluster pool, virtual network. If your client applications are in same virtual network, you need not configure the private DNS zone again. In case you're using a client application in a different virtual network, you're required to use virutal network peering and bind to private dns zone in the cluster pool virtual network or use private endpoints in the virutal network, and private dns zones, to add the A-record to the private endpoint private IP.
245246
246247

247248
Private FQDN: `{clusterName}.privatelink.{clusterPoolName}.{subscriptionId}.{region}.hdinsightaks.net`

0 commit comments

Comments
 (0)