Skip to content

Commit a763825

Browse files
committed
freshness64
1 parent c14705b commit a763825

File tree

1 file changed

+18
-19
lines changed

1 file changed

+18
-19
lines changed

articles/hdinsight/hdinsight-create-virtual-network.md

Lines changed: 18 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -5,32 +5,32 @@ author: hrasheed-msft
55
ms.author: hrasheed
66
ms.reviewer: jasonh
77
ms.service: hdinsight
8-
ms.custom: hdinsightactive
98
ms.topic: conceptual
10-
ms.date: 07/23/2019
9+
ms.custom: hdinsightactive
10+
ms.date: 04/16/2020
1111
---
1212

1313
# Create virtual networks for Azure HDInsight clusters
1414

15-
This article provides examples and code samples for creating and configuring [Azure Virtual Networks](../virtual-network/virtual-networks-overview.md) for use with Azure HDInsight clusters. Detailed examples of creating network security groups (NSGs) and configuring DNS are presented.
15+
This article provides examples and code samples for creating and configuring [Azure Virtual Networks](../virtual-network/virtual-networks-overview.md). To use with Azure HDInsight clusters. Detailed examples of creating network security groups (NSGs) and configuring DNS are presented.
1616

1717
For background information on using virtual networks with Azure HDInsight, see [Plan a virtual network for Azure HDInsight](hdinsight-plan-virtual-network-deployment.md).
1818

1919
## Prerequisites for code samples and examples
2020

21-
Before executing any of the code samples in this article, ou should have an understanding of TCP/IP networking. If you are not familiar with TCP/IP networking, consult someone who is before making modifications to production networks.
21+
Before executing any of the code samples in this article, have an understanding of TCP/IP networking. If you aren't familiar with TCP/IP networking, consult someone before making modifications to production networks.
2222

23-
Other prerequisites for the samples in this article include the following:
23+
Other prerequisites for the samples in this article include the following items:
2424

25-
* If you are using PowerShell, you will need to install the [AZ Module](https://docs.microsoft.com/powershell/azure/overview).
26-
* If you want to use Azure CLI and have not yet installed it, see [Install the Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli).
25+
* If you're using PowerShell, you'll need to install the [AZ Module](https://docs.microsoft.com/powershell/azure/overview).
26+
* If you want to use Azure CLI and haven't yet installed it, see [Install the Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli).
2727

2828
> [!IMPORTANT]
2929
> If you are looking for step by step guidance on connecting HDInsight to your on-premises network using an Azure Virtual Network, see the [Connect HDInsight to your on-premises network](connect-on-premises-network.md) document.
3030
3131
## <a id="hdinsight-nsg"></a>Example: network security groups with HDInsight
3232

33-
The examples in this section demonstrate how to create network security group rules that allow HDInsight to communicate with the Azure management services. Before using the examples, adjust the IP addresses to match the ones for the Azure region you are using. You can find this information in [HDInsight management IP addresses](hdinsight-management-ip-addresses.md).
33+
The examples in this section demonstrate how to create network security group rules. The rules allow HDInsight to communicate with the Azure management services. Before using the examples, adjust the IP addresses to match the ones for the Azure region you're using. You can find this information in [HDInsight management IP addresses](hdinsight-management-ip-addresses.md).
3434

3535
### Azure Resource Management template
3636

@@ -146,7 +146,7 @@ Set-AzVirtualNetworkSubnetConfig `
146146
$vnet | Set-AzVirtualNetwork
147147
```
148148

149-
This example demonstrates how to add rules to allow inbound traffic on the required IP addresses. It does not contain a rule to restrict inbound access from other sources. The following code demonstrates how to enable SSH access from the Internet:
149+
This example demonstrates how to add rules to allow inbound traffic on the required IP addresses. It doesn't contain a rule to restrict inbound access from other sources. The following code demonstrates how to enable SSH access from the Internet:
150150

151151
```powershell
152152
Get-AzNetworkSecurityGroup -Name hdisecure -ResourceGroupName RESOURCEGROUP |
@@ -197,7 +197,6 @@ Use the following steps to create a virtual network that restricts inbound traff
197197
198198
Once this command completes, you can install HDInsight into the Virtual Network.
199199
200-
201200
These steps only open access to the HDInsight health and management service on the Azure cloud. Any other access to the HDInsight cluster from outside the Virtual Network is blocked. To enable access from outside the virtual network, you must add additional Network Security Group rules.
202201
203202
The following code demonstrates how to enable SSH access from the Internet:
@@ -233,7 +232,7 @@ On the custom DNS server in the virtual network:
233232
az network nic list --resource-group RESOURCEGROUP --query "[0].dnsSettings.internalDomainNameSuffix"
234233
```
235234
236-
2. On the custom DNS server for the virtual network, use the following text as the contents of the `/etc/bind/named.conf.local` file:
235+
1. On the custom DNS server for the virtual network, use the following text as the contents of the `/etc/bind/named.conf.local` file:
237236
238237
```
239238
// Forward requests for the virtual network suffix to Azure recursive resolver
@@ -247,7 +246,7 @@ On the custom DNS server in the virtual network:
247246
248247
This configuration routes all DNS requests for the DNS suffix of the virtual network to the Azure recursive resolver.
249248
250-
2. On the custom DNS server for the virtual network, use the following text as the contents of the `/etc/bind/named.conf.options` file:
249+
1. On the custom DNS server for the virtual network, use the following text as the contents of the `/etc/bind/named.conf.options` file:
251250
252251
```
253252
// Clients to accept requests from
@@ -283,9 +282,9 @@ On the custom DNS server in the virtual network:
283282
284283
* Replace the value `192.168.0.1` with the IP address of your on-premises DNS server. This entry routes all other DNS requests to the on-premises DNS server.
285284
286-
3. To use the configuration, restart Bind. For example, `sudo service bind9 restart`.
285+
1. To use the configuration, restart Bind. For example, `sudo service bind9 restart`.
287286
288-
4. Add a conditional forwarder to the on-premises DNS server. Configure the conditional forwarder to send requests for the DNS suffix from step 1 to the custom DNS server.
287+
1. Add a conditional forwarder to the on-premises DNS server. Configure the conditional forwarder to send requests for the DNS suffix from step 1 to the custom DNS server.
289288
290289
> [!NOTE]
291290
> Consult the documentation for your DNS software for specifics on how to add a conditional forwarder.
@@ -321,7 +320,7 @@ This example makes the following assumptions:
321320
// Forward requests for the virtual network suffix to Azure recursive resolver
322321
zone "0owcbllr5hze3hxdja3mqlrhhe.ex.internal.cloudapp.net" {
323322
type forward;
324-
forwarders {10.0.0.4;}; # The IP address of the DNS server in the other virtual network
323+
forwarders {10.0.0.4;}; # The IP address of the DNS server in the other virtual network
325324
};
326325
```
327326
@@ -346,7 +345,7 @@ This example makes the following assumptions:
346345
allow-query { goodclients; };
347346
348347
forwarders {
349-
168.63.129.16; # Azure recursive resolver
348+
168.63.129.16; # Azure recursive resolver
350349
};
351350
352351
dnssec-validation auto;
@@ -355,18 +354,18 @@ This example makes the following assumptions:
355354
listen-on { any; };
356355
};
357356
```
358-
357+
359358
Replace the `10.0.0.0/16` and `10.1.0.0/16` values with the IP address ranges of your virtual networks. This entry allows resources in each network to make requests of the DNS servers.
360359
361-
Any requests that are not for the DNS suffixes of the virtual networks (for example, microsoft.com) is handled by the Azure recursive resolver.
360+
Any requests that aren't for the DNS suffixes of the virtual networks (for example, microsoft.com) is handled by the Azure recursive resolver.
362361
363362
4. To use the configuration, restart Bind. For example, `sudo service bind9 restart` on both DNS servers.
364363
365364
After completing these steps, you can connect to resources in the virtual network using fully qualified domain names (FQDN). You can now install HDInsight into the virtual network.
366365
367366
## Next steps
368367
369-
* For an end-to-end example of configuring HDInsight to connect to an on-premises network, see [Connect HDInsight to an on-premises network](./connect-on-premises-network.md).
368+
* For a complete example of configuring HDInsight to connect to an on-premises network, see [Connect HDInsight to an on-premises network](./connect-on-premises-network.md).
370369
* For configuring Apache HBase clusters in Azure virtual networks, see [Create Apache HBase clusters on HDInsight in Azure Virtual Network](hbase/apache-hbase-provision-vnet.md).
371370
* For configuring Apache HBase geo-replication, see [Set up Apache HBase cluster replication in Azure virtual networks](hbase/apache-hbase-replication.md).
372371
* For more information on Azure virtual networks, see the [Azure Virtual Network overview](../virtual-network/virtual-networks-overview.md).

0 commit comments

Comments
 (0)