Skip to content

Commit 9d9db0d

Browse files
Merge pull request #266638 from rkottackal/patch-4
Update secure-traffic-by-firewall.md
2 parents d7abc72 + 8e76c1d commit 9d9db0d

File tree

1 file changed

+8
-19
lines changed

1 file changed

+8
-19
lines changed

articles/hdinsight-aks/secure-traffic-by-firewall.md

Lines changed: 8 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to secure traffic using firewall on HDInsight on AKS usin
44
ms.service: hdinsight-aks
55
ms.custom: devx-track-azurecli
66
ms.topic: how-to
7-
ms.date: 08/3/2023
7+
ms.date: 02/19/2024
88
---
99

1010
# Use firewall to restrict outbound traffic using Azure CLI
@@ -73,7 +73,7 @@ FWROUTE_NAME_INTERNET="${PREFIX}-fwinternet"
7373
```
7474
> [!Important]
7575
> 1. If you add NSG in subnet `HDIAKS_SUBNET_NAME`, you need to add certain outbound and inbound rules manually. Follow [use NSG to restrict the traffic](./secure-traffic-by-nsg.md).
76-
> 1. Don't associate subnet `HDIAKS_SUBNET_NAME` with a route table because HDInsight on AKS creates cluster pool with default outbound type and can't create the cluster pool in a subnet already associated with a route table.
76+
> 1. By default, route table will not be associated with subnet. If required, user has to create a route table and associate it with the cluster pool.
7777
7878
## Create HDInsight on AKS cluster pool using Azure portal
7979
@@ -83,9 +83,9 @@ FWROUTE_NAME_INTERNET="${PREFIX}-fwinternet"
8383
8484
:::image type="content" source="./media/secure-traffic-by-firewall/security-tab.png" alt-text="Diagram showing the security tab." border="true" lightbox="./media/secure-traffic-by-firewall/security-tab.png":::
8585
86-
1. When HDInsight on AKS cluster pool is created, you can find a route table in subnet `HDIAKS_SUBNET_NAME`.
86+
1. Create a route table.
8787
88-
:::image type="content" source="./media/secure-traffic-by-firewall/route-table.png" alt-text="Diagram showing the route table." border="true" lightbox="./media/secure-traffic-by-firewall/route-table.png":::
88+
Create a route table and associate it with the cluster pool. For more information, see [create a route table](../virtual-network/manage-route-table.md#create-a-route-table).
8989
9090
### Get AKS cluster details created behind the cluster pool
9191
@@ -168,22 +168,11 @@ FWROUTE_NAME_INTERNET="${PREFIX}-fwinternet"
168168
169169
### Create route in the route table to redirect the traffic to firewall
170170
171-
1. Get the route table associated with HDInsight on AKS cluster pool.
172-
173-
```azurecli
174-
ROUTE_TABLE_ID=$(az network vnet subnet show --name $HDIAKS_SUBNET_NAME --vnet-name $VNET_NAME --resource-group $RG --query routeTable.id -o tsv)
175-
176-
ROUTE_TABLE_NAME=$(az network route-table show --ids $ROUTE_TABLE_ID --query 'name' -o tsv)
177-
```
178-
1. Create the route.
179-
```azurecli
180-
az network route-table route create -g $AKS_MANAGED_RG --name $FWROUTE_NAME --route-table-name $ROUTE_TABLE_NAME --address-prefix 0.0.0.0/0 --next-hop-type VirtualAppliance --next-hop-ip-address $FWPRIVATE_IP
181-
182-
az network route-table route create -g $AKS_MANAGED_RG --name $FWROUTE_NAME_INTERNET --route-table-name $ROUTE_TABLE_NAME --address-prefix $FWPUBLIC_IP/32 --next-hop-type Internet
183-
```
171+
Create a route table to be associated to HDInsight on AKS cluster pool. For more information, see [create route table commands](../virtual-network/manage-route-table.md#create-route-table---commands).
172+
184173
## Create cluster
185174
186-
In the previous steps, we have routed the traffic to firewall.
175+
In the previous steps, we routed network traffic to firewall.
187176
188177
The following steps provide details about the specific network and application rules needed by each cluster type. You can refer to the cluster creation pages for creating [Apache Flink](./flink/flink-create-cluster-portal.md), [Trino](./trino/trino-create-cluster.md), and [Apache Spark](./spark/hdinsight-on-aks-spark-overview.md) clusters based on your need.
189178
@@ -245,7 +234,7 @@ The following steps provide details about the specific network and application r
245234
az network route-table route create -g $AKS_MANAGED_RG --name clientip --route-table-name $ROUTE_TABLE_NAME --address-prefix {Client_IPs} --next-hop-type Internet
246235
```
247236

248-
If you can't reach the cluster and have configured NSG, follow [use NSG to restrict the traffic](./secure-traffic-by-nsg.md) to allow the traffic.
237+
If you can't reach the cluster after having configured NSG, follow [use NSG to restrict the traffic](./secure-traffic-by-nsg.md) to allow the traffic.
249238

250239
> [!TIP]
251240
> If you want to allow more traffic, you can configure it over the firewall.

0 commit comments

Comments
 (0)