You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight-aks/control-egress-traffic-from-hdinsight-on-aks-clusters.md
+32-32Lines changed: 32 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ For example, you may want to:
24
24
25
25
* Monitor or audit the egress traffic from cluster for troubleshooting or compliance purposes.
26
26
27
-
## Methods and tools to control egress traffic
27
+
## Methods and tools to control egress traffic
28
28
29
29
30
30
There are several methods and tools for controlling egress traffic from HDInsight on AKS clusters, by configuring the settings at cluster pool and cluster levels.
@@ -57,7 +57,7 @@ When clusters are created, then certain ingress public IPs also get created.
57
57
58
58
To allow requests to be sent to the cluster, you need to [allowlist the traffic](./secure-traffic-by-nsg.md#inbound-security-rules-ingress-traffic). You can also configure certain [rules in the NSG ](./secure-traffic-by-nsg.md#inbound-security-rules-ingress-traffic) to do a coarse-grained control.
59
59
60
-
### Outbound with user defined routing
60
+
### Outbound with user defined routing
61
61
62
62
> [!NOTE]
63
63
> The `userDefinedRouting` outbound type is an advanced networking scenario and requires proper network configuration, before you begin.
@@ -77,7 +77,7 @@ For inbound traffic, you're required to choose based on the requirements to choo
77
77
78
78
In HDInsight on AKS cluster pools, when you set an outbound type of UDR, no standard load balancer created.
79
79
80
-
You're required to first set the firewall rules for the Outbound with userDefinedRouting to work.
80
+
You're required to first set the firewall rules for the Outbound with `userDefinedRouting` to work.
81
81
82
82
> [!IMPORTANT]
83
83
> Outbound type of UDR requires a route for 0.0.0.0/0 and a next hop destination of NVA in the route table. The route table already has a default 0.0.0.0/0 to the Internet. Without a public IP address for Azure to use for Source Network Address Translation (SNAT), simply adding this route won't provide you outbound Internet connectivity. AKS validates that you don't create a 0.0.0.0/0 route pointing to the Internet but instead to a gateway, NVA, etc. When using an outbound type of UDR, a load balancer public IP address for inbound requests isn't created unless you configure a service of type loadbalancer. HDInsight on AKS never creates a public IP address for outbound requests if you set an outbound type of UDR.
@@ -92,28 +92,28 @@ Following is an example of setting up firewall rules, and testing your outbound
92
92
93
93
1. Create the required firewall subnet:
94
94
95
-
To deploy a firewall into the integrated virtual network, you need a subnet called AzureFirewallSubnet or Name of your choice.
95
+
To deploy a firewall into the integrated virtual network, you need a subnet called **AzureFirewallSubnet or Name of your choice**.
96
96
97
97
1. In the Azure portal, navigate to the virtual network integrated with your app.
98
98
99
-
1. From the left navigation, select Subnets > + Subnet.
99
+
1. From the left navigation, select **Subnets > + Subnet**.
100
100
101
-
1. In Name, type AzureFirewallSubnet.
101
+
1. In **Name**, type **AzureFirewallSubnet**.
102
102
103
-
1. Subnet address range, accept the default or specify a range that's at least /26 in size.
103
+
1.**Subnet address range**, accept the default or specify a range that's {at least /26 in size}(/azure/firewall/firewall-faq#why-does-azure-firewall-need-a--26-subnet-size).
104
104
105
-
1. Select Save.
105
+
1. Select **Save**.
106
106
107
107
108
108
1. Deploy the firewall and get its IP
109
109
110
-
1. On the Azure portal menu or from the Home page, select 'Create a resource.'
110
+
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
111
111
112
-
1. Type firewall in the search box and press Enter.
112
+
1. Type firewall in the search box and press **Enter**.
113
113
114
-
1. Select Firewall and then select Create.
114
+
1. Select **Firewall** and then select **Create**.
115
115
116
-
1. On the Create a Firewall page, configure the firewall as shown in the following table:
116
+
1. On the **Create a Firewall** page, configure the firewall as shown in the following table:
117
117
118
118
119
119
|Setting |Value |
@@ -127,72 +127,72 @@ Following is an example of setting up firewall rules, and testing your outbound
1. Select Create again. This process takes a few minutes to deploy.
132
+
1. Select **Create again**. This process takes a few minutes to deploy.
133
133
134
134
1. After deployment completes, go to your resource group, and select the firewall.
135
135
136
-
1. In the firewall's Overview page, copy private IP address. The private IP address will be used as next hop address in the routing rule for the virtual network.
136
+
1. In the firewall's **Overview** page, copy private IP address. **The private IP address will be used as next hop address in the routing rule for the virtual network**.
137
137
138
138
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/setup-firewall.png" alt-text="Screenshot showing how to set up firewall." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/setup-firewall.png":::
139
139
140
-
1. Route all traffic to the firewall
140
+
1. Route all traffic to the firewall
141
141
142
142
When you create a virtual network, Azure automatically creates a default route table for each of its subnets and adds system [default routes to the table](/azure/virtual-network/virtual-networks-udr-overview#default). In this step, you create a user-defined route table that routes all traffic to the firewall, and then associate it with the App Service subnet in the integrated virtual network.
143
143
144
-
1. On the [Azure portal](https://portal.azure.com/) menu, select All services or search for and select All services from any page.
144
+
1. On the [Azure portal](https://portal.azure.com/) menu, select **All services** or search for and select **All services** from any page.
145
145
146
-
1. Under Networking, select Route tables.
146
+
1. Under **Networking**, select **Route tables**.
147
147
148
-
1. Select Add.
148
+
1. Select **Add**.
149
149
150
150
1. Configure the route table like the following example:
Outbound traffic from your HDInsight on AKS subnet is now routed through the integrated virtual network to the firewall.
179
179
180
180
To control the outbound traffic, add an application rule to firewall policy.
181
181
182
182
1. Navigate to the firewall's overview page and select its firewall policy.
183
183
184
-
1. In the firewall policy page, from the left navigation, select Application Rules > Add a rule collection.
184
+
1. In the firewall policy page, from the left navigation, select **Application Rules > Add a rule collection**.
185
185
186
-
1. In Rules, add a network rule with the subnet as the source address, and specify an FQDN destination.
186
+
1. In **Rules**, add a network rule with the subnet as the source address, and specify an FQDN destination.
187
187
188
-
1. You need to add AKS and HDInsight on AKS rules for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
188
+
1. You need to add [AKS](/azure/aks/outbound-rules-control-egress#required-outbound-network-rules-and-fqdns-for-aks-clusters) and [HDInsight on AKS](./secure-traffic-by-firewall-azure-portal#add-network-and-application-rules-to-the-firewall) rules for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
189
189
190
-
1. You can also add the private endpoints for any dependent resources in the same subnet for cluster to access them (example – storage).
190
+
1. You can also add the [private endpoints](/azure/hdinsight-aks/secure-traffic-by-firewall-azure-portal#add-network-and-application-rules-to-the-firewall) for any dependent resources in the same subnet for cluster to access them (example – storage).
191
191
192
-
1. Select Add.
192
+
1. Select **Add**.
193
193
194
194
195
-
1. Verify if public IP is created
195
+
1. Verify if public IP is created
196
196
197
197
With the firewall rules set, you can select the subnet during the cluster pool creation.
0 commit comments