Skip to content

Commit d310a3b

Browse files
authored
Merge pull request #31764 from omidm1/patch-16
added fqdn tags
2 parents f34cfb2 + c6f4143 commit d310a3b

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/hdinsight/hdinsight-restrict-outbound-traffic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ There are several dependencies that require inbound traffic. The inbound managem
2121

2222
The HDInsight outbound traffic dependencies are almost entirely defined with FQDNs, which don't have static IP addresses behind them. The lack of static addresses means that Network Security Groups (NSGs) can't be used to lock down the outbound traffic from a cluster. The addresses change often enough that one can't set up rules based on the current name resolution and use that to set up NSG rules.
2323

24-
The solution to securing outbound addresses is to use a firewall device that can control outbound traffic based on domain names. Azure Firewall can restrict outbound HTTP and HTTPS traffic based on the FQDN of the destination.
24+
The solution to securing outbound addresses is to use a firewall device that can control outbound traffic based on domain names. Azure Firewall can restrict outbound HTTP and HTTPS traffic based on the FQDN of the destination or [FQDN tags](https://docs.microsoft.com/en-us/azure/firewall/fqdn-tags).
2525

2626
## Configuring Azure Firewall with HDInsight
2727

@@ -74,7 +74,7 @@ On the **Add application rule collection** screen, complete the following steps:
7474
1. Enter `https:443` under **Protocol:Port** and `sqm.telemetry.microsoft.com` under **Target FQDNS**.
7575
1. If your cluster is backed by WASB and you are not using the service endpoints above, then add a rule for WASB:
7676
1. In the **Target FQDNs** section, provide a **Name**, and set **Source addresses** to `*`.
77-
1. Enter `wasb` under **Protocol:Port** and `*` under **Target FQDNS**.
77+
1. Enter `http` or [https] depending on if you are using wasb:// or wasbs:// under **Protocol:Port** and the storage account url under **Target FQDNS**.
7878
1. Click **Add**.
7979

8080
![Title: Enter application rule collection details](./media/hdinsight-restrict-outbound-traffic/hdinsight-restrict-outbound-traffic-add-app-rule-collection-details.png)

0 commit comments

Comments
 (0)