Skip to content

Commit c69876e

Browse files
Merge pull request #270077 from sreekzz/patch-12
Added Note to common traffic
2 parents 704e670 + 3e19057 commit c69876e

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

articles/hdinsight-aks/required-outbound-traffic.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Outbound traffic on HDInsight on AKS
33
description: Learn required outbound traffic on HDInsight on AKS.
44
ms.service: hdinsight-aks
55
ms.topic: conceptual
6-
ms.date: 02/27/2024
6+
ms.date: 03/26/2024
77
---
88

99
# Required outbound traffic for HDInsight on AKS
@@ -22,20 +22,23 @@ You need to configure the following network and application security rules in yo
2222

2323
## Common traffic
2424

25+
2526
|Type| Destination Endpoint | Protocol | Port | Azure Firewall Rule Type | Use |
2627
|----|-----------------------------------|----------|------|-----| ----|
27-
| ServiceTag | AzureCloud.`<Region>` | UDP | 1194 | Network security rule| Tunneled secure communication between the nodes and the control plane.|
28-
| ServiceTag | AzureCloud.`<Region>` | TCP | 9000 | Network security rule|Tunneled secure communication between the nodes and the control plane.|
28+
| ** ServiceTag | AzureCloud.`<Region>` | UDP | 1194 | Network security rule| Tunneled secure communication between the nodes and the control plane.|
29+
| ** ServiceTag | AzureCloud.`<Region>` | TCP | 9000 | Network security rule|Tunneled secure communication between the nodes and the control plane.|
2930
| FQDN Tag| AzureKubernetesService | HTTPS | 443 |Application security rule| Required by AKS Service.|
30-
| Service Tag | AzureMonitor | TCP | 443 |Application security rule| Required for integration with Azure Monitor.|
31+
| Service Tag | AzureMonitor | TCP | 443 |Netowrk security rule| Required for integration with Azure Monitor.|
3132
| FQDN| hiloprodrpacr00.azurecr.io|HTTPS|443|Application security rule| Downloads metadata info of the docker image for setup of HDInsight on AKS and monitoring.|
3233
| FQDN| *.blob.core.windows.net|HTTPS|443|Application security rule| Monitoring and setup of HDInsight on AKS.|
33-
| FQDN|graph.microsoft.com|HTTPS|443|Application security rule| Authentication.|
34+
| FQDN|graph.microsoft.com|HTTPS|443|Application security rule| Authentication.|
3435
| FQDN|*.servicebus.windows.net|HTTPS|443|Application security rule| Monitoring.|
3536
| FQDN|*.table.core.windows.net|HTTPS|443|Application security rule| Monitoring.
3637
| FQDN|gcs.prod.monitoring.core.windows.net|HTTPS|443|Application security rule| Monitoring.|
37-
| FQDN|API Server FQDN (available once AKS cluster is created)|TCP|443|Network security rule| Required as the running pods/deployments use it to access the API Server. You can get this information from the AKS cluster running behind the cluster pool. For more information, see [how to get API Server FQDN](secure-traffic-by-firewall-azure-portal.md#get-aks-cluster-details-created-behind-the-cluster-pool) using Azure portal.|
38+
| ** FQDN|API Server FQDN (available once AKS cluster is created)|TCP|443|Network security rule| Required as the running pods/deployments use it to access the API Server. You can get this information from the AKS cluster running behind the cluster pool. For more information, see [how to get API Server FQDN](secure-traffic-by-firewall-azure-portal.md#get-aks-cluster-details-created-behind-the-cluster-pool) using Azure portal.|
3839

40+
> [!NOTE]
41+
> ** This configiration isn't required if you enable private AKS.
3942
4043
## Cluster specific traffic
4144

0 commit comments

Comments
 (0)