You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight-aks/control-egress-traffic-from-hdinsight-on-aks-clusters.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ HDInsight on AKS is a managed Platform as a Service (PaaS) that runs on Azure Ku
14
14
15
15
By default, HDInsight on AKS clusters allow outbound network connections from clusters to any destination, if the destination is reachable from the node's network interface. This means that cluster resources can access any public or private IP address, domain name, or URL on the internet or on your virtual network.
16
16
17
-
However, in some scenarios, you may want to control or restrict the egress traffic from your cluster for security, compliance, or cost reasons.
17
+
However, in some scenarios, you may want to control or restrict the egress traffic from your cluster for security, compliance reasons.
18
18
19
19
For example, you may want to:
20
20
@@ -35,11 +35,11 @@ Some of the most common ones are:
35
35
36
36
1. Use Outbound cluster pool with User defined routing to control egress traffic at the subnet level.
37
37
38
-
1.The AKS control plane, or API server has internal IP addresses. You can ensure network traffic between AKS Control plane / API server and HDInsight on AKS node pools remains on the private network only.
38
+
1.Use Private AKS cluster feature - To ensure AKS control plane, or API server has internal IP addresses. The network traffic between AKS Control plane / API server and HDInsight on AKS node pools (clusters) remains on the private network only.
39
39
40
40
1. Avoid creating public IPs for the cluster, use private ingress feature on your clusters.
41
41
42
-
In the following sections, we describe each method and tool in more detail.
42
+
In the following sections, we describe each method in detail.
43
43
44
44
### Outbound with load balancer
45
45
@@ -53,7 +53,7 @@ Once you opt for this configuration, HDInsight on AKS automatically completes cr
53
53
54
54
A public IP created by HDInsight on AKS, and it's an AKS-managed resource, which means that AKS manages the lifecycle of that public IP and doesn't require user action directly on the public IP resource.
55
55
56
-
When clusters are created, then certain ingress public IPs also get created.
56
+
When clusters are created, then certain ingress public IPs also get created.
57
57
58
58
To allow requests to be sent to the cluster, you need to [allowlist the traffic](./secure-traffic-by-nsg.md#inbound-security-rules-ingress-traffic). You can also configure certain [rules in the NSG ](./secure-traffic-by-nsg.md#inbound-security-rules-ingress-traffic) to do a coarse-grained control.
59
59
@@ -209,13 +209,12 @@ Once the cluster pool is created, you can observe in the MC Group that there's n
209
209
210
210
### Cluster pool creation with private AKS
211
211
212
-
In a private cluster, the control plane or API server has internal IP addresses that are defined in the [RFC1918 - Address Allocation for Private Internet document](https://datatracker.ietf.org/doc/html/rfc1918). By using a private cluster, you can ensure network traffic between your API server and your HDInsight on AKS workload clusters remains on the private network only.
212
+
With private AKS, the control plane or API server has internal IP addresses that are defined in the [RFC1918 - Address Allocation for Private Internet document](https://datatracker.ietf.org/doc/html/rfc1918). By using this option of private AKS, you can ensure network traffic between your API server and your HDInsight on AKS workload clusters remains on the private network only.
When you provision a private AKS cluster, AKS by default creates a private FQDN with a private DNS zone. An extra public FQDN with a corresponding A record in Azure public DNS. The agent nodes continue to use the A record in the private DNS zone to resolve the private IP address of the private endpoint for communication to the API server.
217
-
218
-
As HDInsight on AKS automatically inserts the A record to the private DNS zone, for private ingress.
216
+
> [!IMPORTANT]
217
+
> When you provision a private AKS cluster, AKS by default creates a private FQDN with a private DNS zone. An extra public FQDN with a corresponding A record in Azure public DNS. The agent nodes continue to use the A record in the private DNS zone to resolve the private IP address of the private endpoint for communication to the API server. As HDInsight on AKS Resource provider automatically inserts the A record to the private DNS zone, for private ingress.
The well-know FQDN is like a public cluster, but it can only be resolved to a CNAME with subdomain, which means well-know FQDN of private cluster must be used with correct `Private DNS zone setting` to make sure FQDN can be finally solved to correct Private IP address.
238
237
239
238
240
-
241
239
> [!NOTE]
242
240
> HDInsight on AKS creates private DNS zone in the cluster pool, virtual network. If your client applications are in same virtual network, you need not configure the private DNS zone again. In case you're using a client application in a different virtual network, you're required to use virutal network peering to bind to private dns zone in the cluster pool virtual network or use private endpoints in the virutal network, and private dns zones, to add the A-record to the private endpoint private IP.
0 commit comments