You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight/connect-on-premises-network.md
+58-56Lines changed: 58 additions & 56 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,9 @@ author: hrasheed-msft
5
5
ms.author: hrasheed
6
6
ms.reviewer: jasonh
7
7
ms.service: hdinsight
8
-
ms.custom: hdinsightactive
9
8
ms.topic: conceptual
10
-
ms.date: 10/16/2019
9
+
ms.custom: hdinsightactive
10
+
ms.date: 03/04/2020
11
11
---
12
12
13
13
# Connect HDInsight to your on-premises network
@@ -23,12 +23,12 @@ Learn how to connect HDInsight to your on-premises network by using Azure Virtua
23
23
24
24
To allow HDInsight and resources in the joined network to communicate by name, you must perform the following actions:
25
25
26
-
* Create Azure Virtual Network.
27
-
* Create a custom DNS server in the Azure Virtual Network.
28
-
* Configure the virtual network to use the custom DNS server instead of the default Azure Recursive Resolver.
29
-
* Configure forwarding between the custom DNS server and your on-premises DNS server.
26
+
1. Create Azure Virtual Network.
27
+
1. Create a custom DNS server in the Azure Virtual Network.
28
+
1. Configure the virtual network to use the custom DNS server instead of the default Azure Recursive Resolver.
29
+
1. Configure forwarding between the custom DNS server and your on-premises DNS server.
30
30
31
-
This configuration enables the following behavior:
31
+
These configurations enable the following behavior:
32
32
33
33
* Requests for fully qualified domain names that have the DNS suffix __for the virtual network__ are forwarded to the custom DNS server. The custom DNS server then forwards these requests to the Azure Recursive Resolver, which returns the IP address.
34
34
* All other requests are forwarded to the on-premises DNS server. Even requests for public internet resources such as microsoft.com are forwarded to the on-premises DNS server for name resolution.
@@ -60,11 +60,13 @@ These steps use the [Azure portal](https://portal.azure.com) to create an Azure
60
60
61
61
1. Sign in to the [Azure portal](https://portal.azure.com).
62
62
63
-
2. From the left menu, navigate to **+ Create a resource** > **Compute** > **Ubuntu Server 18.04 LTS**.
63
+
1. From the top menu, select **+ Create a resource**.
64
64
65
-

65
+

66
66
67
-
3. From the __Basics__ tab, enter the following information:
67
+
1. Select **Compute** > **Virtual machine** to go to the **Create a virtual machine** page.
68
+
69
+
1. From the __Basics__ tab, enter the following information:
68
70
69
71
| Field | Value |
70
72
| --- | --- |
@@ -118,35 +120,35 @@ Once the virtual machine has been created, you'll receive a **Deployment succeed
118
120
2. To install Bind, use the following commands from the SSH session:
119
121
120
122
```bash
121
-
sudo apt-get update -y
122
-
sudo apt-get install bind9 -y
123
+
sudo apt-get update -y
124
+
sudo apt-get install bind9 -y
123
125
```
124
126
125
127
3. To configure Bind to forward name resolution requests to your on premises DNS server, use the following text as the contents of the `/etc/bind/named.conf.options` file:
126
128
127
-
acl goodclients {
128
-
10.0.0.0/16;# Replace with the IP address range of the virtual network
129
-
10.1.0.0/16;# Replace with the IP address range of the on-premises network
130
-
localhost;
131
-
localnets;
132
-
};
129
+
acl goodclients {
130
+
10.0.0.0/16;# Replace with the IP address range of the virtual network
131
+
10.1.0.0/16;# Replace with the IP address range of the on-premises network
132
+
localhost;
133
+
localnets;
134
+
};
133
135
134
-
options {
135
-
directory "/var/cache/bind";
136
+
options {
137
+
directory "/var/cache/bind";
136
138
137
-
recursion yes;
139
+
recursion yes;
138
140
139
-
allow-query { goodclients; };
141
+
allow-query { goodclients; };
140
142
141
-
forwarders {
142
-
192.168.0.1;# Replace with the IP address of the on-premises DNS server
143
-
};
143
+
forwarders {
144
+
192.168.0.1;# Replace with the IP address of the on-premises DNS server
145
+
};
144
146
145
-
dnssec-validation auto;
147
+
dnssec-validation auto;
146
148
147
-
auth-nxdomain no;# conform to RFC1035
148
-
listen-on { any; };
149
-
};
149
+
auth-nxdomain no;# conform to RFC1035
150
+
listen-on { any; };
151
+
};
150
152
151
153
> [!IMPORTANT]
152
154
> Replace the values in the `goodclients` section with the IP address range of the virtual network and on-premises network. This section defines the addresses that this DNS server accepts requests from.
@@ -173,15 +175,15 @@ Once the virtual machine has been created, you'll receive a **Deployment succeed
The `icb0d0thtw0ebifqt0g1jycdxd.ex.internal.cloudapp.net` text is the __DNS suffix__ for this virtual network. Save this value, as it is used later.
178
+
The `icb0d0thtw0ebifqt0g1jycdxd.ex.internal.cloudapp.net` text is the __DNS suffix__ for this virtual network. Save this value, as it's used later.
177
179
178
180
5. To configure Bind to resolve DNS names for resources within the virtual network, use the following text as the contents of the `/etc/bind/named.conf.local` file:
179
181
180
182
// Replace the following with the DNS suffix for your virtual network
181
-
zone "icb0d0thtw0ebifqt0g1jycdxd.ex.internal.cloudapp.net" {
182
-
type forward;
183
-
forwarders {168.63.129.16;};# The Azure recursive resolver
184
-
};
183
+
zone "icb0d0thtw0ebifqt0g1jycdxd.ex.internal.cloudapp.net" {
184
+
type forward;
185
+
forwarders {168.63.129.16;}; # The Azure recursive resolver
186
+
};
185
187
186
188
> [!IMPORTANT]
187
189
> You must replace the `icb0d0thtw0ebifqt0g1jycdxd.ex.internal.cloudapp.net` with the DNS suffix you retrieved earlier.
@@ -250,9 +252,9 @@ A conditional forward only forwards requests for a specific DNS suffix. In this
250
252
The following text is an example of a conditional forwarder configuration for the **Bind** DNS software:
251
253
252
254
zone "icb0d0thtw0ebifqt0g1jycdxd.ex.internal.cloudapp.net" {
253
-
type forward;
254
-
forwarders {10.0.0.4;};# The custom DNS server's internal IP address
255
-
};
255
+
type forward;
256
+
forwarders {10.0.0.4;}; # The custom DNS server's internal IP address
257
+
};
256
258
257
259
For information on using DNS on **Windows Server 2016**, see the [Add-DnsServerConditionalForwarderZone](https://technet.microsoft.com/itpro/powershell/windows/dnsserver/add-dnsserverconditionalforwarderzone) documentation...
258
260
@@ -301,25 +303,25 @@ To directly connect to HDInsight through the virtual network, use the following
301
303
302
304
1. To discover the internal fully qualified domain names of the HDInsight cluster nodes, use one of the following methods:
303
305
304
-
```powershell
305
-
$resourceGroupName = "The resource group that contains the virtual network used with HDInsight"
az network nic list --resource-group <resourcegroupname> --output table --query "[?contains(name,'node')].{NICname:name,InternalIP:ipConfigurations[0].privateIpAddress,InternalFQDN:dnsSettings.internalFqdn}"
322
-
```
306
+
```powershell
307
+
$resourceGroupName = "The resource group that contains the virtual network used with HDInsight"
az network nic list --resource-group <resourcegroupname> --output table --query "[?contains(name,'node')].{NICname:name,InternalIP:ipConfigurations[0].privateIpAddress,InternalFQDN:dnsSettings.internalFqdn}"
324
+
```
323
325
324
326
2. To determine the port that a service is available on, see the [Ports used by Apache Hadoop services on HDInsight](./hdinsight-hadoop-port-settings-for-services.md) document.
0 commit comments