Skip to content

Commit b3596c9

Browse files
Update load-balancer-migration-guidelines.md
1 parent 818ec6b commit b3596c9

File tree

1 file changed

+32
-29
lines changed

1 file changed

+32
-29
lines changed

articles/hdinsight/load-balancer-migration-guidelines.md

Lines changed: 32 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -14,38 +14,39 @@ This transition is done in line with the announcement of retirement of Azure bas
1414

1515
## Impact on HDInsight clusters
1616

17-
### Long running clusters (when you don’t create and delete cluster daily for your use case)
17+
### Long running clusters (when you don’t create and delete cluster frequently for your use case)
1818

19-
* **Scenario 1:** Existing HDInsight clusters without custom virtual network. (No virtual network provided during cluster creation.)
19+
* **Scenario 1:** Existing HDInsight clusters without custom virtual network (No virtual network provided during cluster creation).
2020

2121
* No immediate disruption until Mar 31, 2025. However, we strongly recommend re-creating the cluster before Mar 31, 2025 to avoid potential disruption.
2222

23-
* **Scenario 2:** Existing HDInsight clusters with custom virtual network.
23+
* **Scenario 2:** Existing HDInsight clusters with custom virtual network (Used your own VNet for cluster creation).
2424

2525
* No immediate disruption until Mar 31, 2025. However, we strongly recommend re-creating the cluster before Mar 31, 2025 to avoid potential disruption.
2626

2727
### New cluster creation
2828

29-
* **Scenario 1:** HDInsight clusters without custom virtual network. (No virtual network provided during cluster creation)
29+
* **Scenario 1:** HDInsight clusters without custom virtual network (No virtual network selected during cluster creation).
3030

3131
* In this case, no impact. You can recreate the cluster directly.
3232

33-
* **Scenario 2:** HDInsight clusters with custom virtual network. (Providing your own VNet during cluster creation)
33+
* **Scenario 2:** HDInsight clusters with custom virtual network (Using your own VNet during cluster creation).
3434

3535
* In this case, there are two options to create a cluster
3636

3737
**Approach 1:** Create the cluster with a new subnet
3838

39-
1. Choose the outbound connectivity for your cluster, and follow this document [Use Source Network Address Translation (SNAT) for outbound connections](/azure/load-balancer/load-balancer-outbound-connections), and choose one method to provide outbound connectivity for the new cluster. The most recommended way is to attach a NAT gateway and a Network Security Group (NSG) to the subnet.
39+
1. Choose the outbound connectivity for your cluster
40+
41+
Follow this document [Use Source Network Address Translation (SNAT) for outbound connections](/azure/load-balancer/load-balancer-outbound-connections), and choose one method to provide outbound connectivity for the new cluster. The most recommended way is to attach a NAT gateway and a Network Security Group (NSG) to the subnet.
4042

41-
1. (Optional) Create a new NAT gateway and a new network security group (NSG).
43+
1. Create a new NAT gateway and a new Network Security Group(NSG) or use the existing ones.
4244

4345
> [!NOTE]
44-
> You can associate an existing NAT gateway and NSG or the newly created ones.
45-
>
46-
> Follow the docs [Quickstart: Create a NAT gateway - Azure portal](/azure/nat-gateway/quickstart-create-nat-gateway-portal), and [Create, change, or delete an Azure network security group](/azure/virtual-network/manage-network-security-group?tabs=network-security-group-portal#create-a-network-security-group) to create a new NAT gateway and a new network security group.
47-
>
48-
> You can refer to this document [Control network traffic in Azure HDInsight](./control-network-traffic.md#hdinsight-with-network-security-groups) to set up correct NSG rules.
46+
> You can use an existing NAT gateway and NSG.
47+
48+
Follow the docs [Quickstart: Create a NAT gateway - Azure portal](/azure/nat-gateway/quickstart-create-nat-gateway-portal), and [Create, change, or delete an Azure network security group](/azure/virtual-network/manage-network-security-group?tabs=network-security-group-portal#create-a-network-security-group) to create a new NAT gateway and a new network security group.
49+
You can refer to this document [Control network traffic in Azure HDInsight](./control-network-traffic.md#hdinsight-with-network-security-groups) to set up correct NSG rules.
4950

5051
1. Create a new subnet and associate the subnet with the NAT gateway and network security group.
5152

@@ -58,23 +59,24 @@ This transition is done in line with the announcement of retirement of Azure bas
5859

5960
:::image type="content" source="./media/load-balancer-migration-guidelines/create-hdinsight-cluster.png" alt-text="Screenshot showing how to create a HDInsight cluster." border="true" lightbox="./media/load-balancer-migration-guidelines/create-hdinsight-cluster.png":::
6061

61-
**Approach 2: Use the existing subnet**
62+
**Approach 2:** Create the cluster using the existing subnet
6263

63-
To upgrade your existing custom virtual network to integrate with Azure standard load balancer (which HDInsight clusters use by default now), see, [Use Source Network Address Translation (SNAT) for outbound connections](/azure/load-balancer/load-balancer-outbound-connections) to provide outbound connectivity for the cluster.
64+
Your existing virtual network may be incompatible with Azure Standard Load Balancer, to upgrade your existing custom virtual network to integrate with Azure standard load balancer (which HDInsight clusters use by default now), see, [Use Source Network Address Translation (SNAT) for outbound connections](/azure/load-balancer/load-balancer-outbound-connections) to provide outbound connectivity for the cluster.
6465

6566
The most recommended way is to attach a network security group and a NAT gateway to the subnet. Since the existing subnet which has HDInsight clusters with Azure basic load balancers can't be associated with an NAT gateway due to incompatibility with basic load balancer, there are two scenarios:
6667

67-
#### Case 1: Existing subnet has no HDInsight clusters with Azure Basic load balancers
68+
#### Case 1: Existing subnet has no HDInsight clusters with Azure Basic Load Balancers
6869

6970
Follow these steps:
7071

71-
1. Create a new NAT gateway and a new network security group or use the existing ones.
72+
1. Create a new NAT gateway and a new Network Security Group(NSG) or use the existing ones.
7273

7374
> [!NOTE]
74-
> You could associate an existing NAT gateway and NSG or the newly created ones.
75-
> Follow this document [Quickstart: Create a NAT gateway - Azure portal](/azure/nat-gateway/quickstart-create-nat-gateway-portal), and [Create, change, or delete an Azure network security group](/azure/virtual-network/manage-network-security-group?tabs=network-security-group-portal#create-a-network-security-group) to create a new NAT gateway and a new network security group.
76-
>
77-
> You can refer to this document [Control network traffic in Azure HDInsight](./control-network-traffic.md#hdinsight-with-network-security-groups) to set up correct NSG rules.
75+
> You could use an existing NAT gateway and NSG.
76+
77+
Follow this document [Quickstart: Create a NAT gateway - Azure portal](/azure/nat-gateway/quickstart-create-nat-gateway-portal), and [Create, change, or delete an Azure network security group](/azure/virtual-network/manage-network-security-group?tabs=network-security-group-portal#create-a-network-security-group) to create a new NAT gateway and a new network security group.
78+
79+
You can refer to this document [Control network traffic in Azure HDInsight](./control-network-traffic.md#hdinsight-with-network-security-groups) to set up correct NSG rules.
7880

7981

8082
1. Associate the NAT gateway with your subnet along with a network security group.
@@ -92,21 +94,22 @@ This transition is done in line with the announcement of retirement of Azure bas
9294
9395
Consider one of these methods:
9496

95-
* **Approach 1:** The most recommended way is to associate a NAT gateway to the subnet along with network security group.
97+
* **Method 1:** The most recommended way is to associate a NAT gateway to the subnet along with network security group.
9698

97-
According to [Azure NAT Gateway frequently asked questions](/azure/nat-gateway/faq#are-basic-sku-resources--basic-load-balancer-and-basic-public-ip-addresses--compatible-with-a-nat-gateway), the subnet with NAT gateway and Azure standard load balancer isn't compatible.
99+
According to [Azure NAT Gateway frequently asked questions](/azure/nat-gateway/faq#are-basic-sku-resources--basic-load-balancer-and-basic-public-ip-addresses--compatible-with-a-nat-gateway), NAT gateway is incomaptible with Azure basic load balancer.
98100

99101
To associate with a NAT Gateway, perform the following steps.
100102

101103
1. Delete all the existing HDInsight clusters with Azure basic load balancers in this subnet.
102104

103-
1. Create a new NAT gateway and a new network security group or use the existing ones.
105+
1. Create a new NAT gateway and a new Network Security Group(NSG) or use the existing ones.
104106
105107
> [!NOTE]
106-
> You could associate an existing NAT gateway and NSG or use the newly created ones.
107-
> Follow this document [Quickstart: Create a NAT gateway - Azure portal](/azure/nat-gateway/quickstart-create-nat-gateway-portal), and [Create, change, or delete an Azure network security group](/azure/virtual-network/manage-network-security-group?tabs=network-security-group-portal#create-a-network-security-group) to create a new NAT gateway and a new network security group.
108-
>
109-
> You can refer to this document [Control network traffic in Azure HDInsight](./control-network-traffic.md#hdinsight-with-network-security-groups) to set up correct NSG rules.
108+
> You could use an existing NAT gateway and NSG.
109+
110+
Follow this document [Quickstart: Create a NAT gateway - Azure portal](/azure/nat-gateway/quickstart-create-nat-gateway-portal), and [Create, change, or delete an Azure network security group](/azure/virtual-network/manage-network-security-group?tabs=network-security-group-portal#create-a-network-security-group) to create a new NAT gateway and a new network security group.
111+
112+
You can refer to this document [Control network traffic in Azure HDInsight](./control-network-traffic.md#hdinsight-with-network-security-groups) to set up correct NSG rules.
110113
111114
1. Associate the subnet with the NAT gateway and network security group.
112115

@@ -119,9 +122,9 @@ This transition is done in line with the announcement of retirement of Azure bas
119122
:::image type="content" source="./media/load-balancer-migration-guidelines/virtual-network.png" alt-text="Screenshot showing virtual network." border="true" lightbox="./media/load-balancer-migration-guidelines/virtual-network.png":::
120123

121124

122-
* **Approach 2:** Select option other than **Associate a NAT gateway to the subnet** provided in [Use Source Network Address Translation (SNAT) for outbound connections](/azure/load-balancer/load-balancer-outbound-connections), and follow the instruction for the selected option.
125+
* **Method 2:** Select option other than **Associate a NAT gateway to the subnet** provided in [Use Source Network Address Translation (SNAT) for outbound connections](/azure/load-balancer/load-balancer-outbound-connections), and follow the instruction for the selected option.
123126

124-
* **Approach 3:** Create a new subnet and then create the cluster with the new subnet.
127+
* **Method 3:** Create a new subnet and then create the cluster with the new subnet.
125128

126129
## Next steps
127130

0 commit comments

Comments
 (0)