|
1 | 1 | ---
|
2 | 2 | title: Azure HDInsight management IP addresses
|
3 |
| -description: Learn which IP addresses you must allow inbound traffic from, in order to properly configure network security groups and user defined routes for virtual networking with Azure HDInsight. |
4 |
| -author: hol82 |
5 |
| -ms.author: hol |
6 |
| -ms.reviewer: hrasheed |
| 3 | +description: Learn which IP addresses you must allow inbound traffic from, in order to properly configure network security groups and user-defined routes for virtual networking with Azure HDInsight. |
| 4 | +author: hrasheed-msft |
| 5 | +ms.author: hrasheed |
| 6 | +ms.reviewer: jasonh |
7 | 7 | ms.service: hdinsight
|
8 |
| -ms.custom: hdinsightactive |
9 | 8 | ms.topic: conceptual
|
10 |
| -ms.date: 12/16/2019 |
| 9 | +ms.custom: hdinsightactive |
| 10 | +ms.date: 03/03/2020 |
11 | 11 | ---
|
12 | 12 |
|
13 | 13 | # HDInsight management IP addresses
|
14 | 14 |
|
15 | 15 | > [!Important]
|
16 | 16 | > In most cases, you can now use the [service tag](hdinsight-service-tags.md) feature for network security groups, instead of manually adding IP addresses. New regions will only be added for service tags and the static IP addresses will eventually be deprecated.
|
17 | 17 |
|
18 |
| -If you use network security groups (NSGs) or user defined routes (UDRs) to control inbound traffic to your HDInsight cluster, you must ensure that your cluster can communicate with critical Azure health and management services. Some of the IP addresses for these services are region specific, and some of them apply to all Azure regions. You may also need to allow traffic from the Azure DNS service if you aren't using custom DNS. |
| 18 | +If you use network security groups (NSGs) or user-defined routes (UDRs) to control inbound traffic to your HDInsight cluster, you must ensure that your cluster can communicate with critical Azure health and management services. Some of the IP addresses for these services are region-specific, and some of them apply to all Azure regions. You may also need to allow traffic from the Azure DNS service if you aren't using custom DNS. |
19 | 19 |
|
20 | 20 | The following sections discuss the specific IP addresses that must be allowed.
|
21 | 21 |
|
22 | 22 | ## Azure DNS service
|
23 | 23 |
|
24 |
| -If you are using the Azure-provided DNS service, allow access from __168.63.129.16__ on port 53. For more information, see the [Name resolution for VMs and Role instances](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md) document. If you are using custom DNS, skip this step. |
| 24 | +If you're using the Azure-provided DNS service, allow access from __168.63.129.16__ on port 53. For more information, see the [Name resolution for VMs and Role instances](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md) document. If you're using custom DNS, skip this step. |
25 | 25 |
|
26 | 26 | ## Health and management services: All regions
|
27 | 27 |
|
28 |
| -Allow traffic from the following IP addresses for Azure HDInsight health and management services which apply to all Azure regions: |
| 28 | +Allow traffic from the following IP addresses for Azure HDInsight health and management services, which apply to all Azure regions: |
29 | 29 |
|
30 | 30 | | Source IP address | Destination | Direction |
|
31 | 31 | | ---- | ----- | ----- |
|
@@ -79,8 +79,9 @@ For information on the IP addresses to use for Azure Government, see the [Azure
|
79 | 79 |
|
80 | 80 | For more information, see the [Controlling network traffic](hdinsight-plan-virtual-network-deployment.md#networktraffic) section.
|
81 | 81 |
|
82 |
| -If you are using user-defined routes (UDRs), you should specify a route and allow outbound traffic from the VNET to the above IPs with the next hop set to "Internet". |
| 82 | +If you're using user-defined routes (UDRs), you should specify a route and allow outbound traffic from the virtual network to the above IPs with the next hop set to "Internet". |
83 | 83 |
|
84 | 84 | ## Next steps
|
85 | 85 |
|
86 | 86 | * [Create virtual networks for Azure HDInsight clusters](hdinsight-create-virtual-network.md)
|
| 87 | +* [Network security group (NSG) service tags for Azure HDInsight](hdinsight-service-tags.md) |
0 commit comments