Skip to content

Commit ec220e3

Browse files
author
Sreekanth Iyer (Ushta Te Consultancy Services)
committed
Added Bold letters
1 parent b7f3968 commit ec220e3

File tree

1 file changed

+32
-32
lines changed

1 file changed

+32
-32
lines changed

articles/hdinsight-aks/control-egress-traffic-from-hdinsight-on-aks-clusters.md

Lines changed: 32 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ For example, you may want to:
2424

2525
* Monitor or audit the egress traffic from cluster for troubleshooting or compliance purposes.
2626

27-
## Methods and tools to control egress traffic
27+
## Methods and tools to control egress traffic
2828

2929

3030
There are several methods and tools for controlling egress traffic from HDInsight on AKS clusters, by configuring the settings at cluster pool and cluster levels.
@@ -57,7 +57,7 @@ When clusters are created, then certain ingress public IPs also get created.
5757

5858
To allow requests to be sent to the cluster, you need to [allowlist the traffic](./secure-traffic-by-nsg.md#inbound-security-rules-ingress-traffic). You can also configure certain [rules in the NSG ](./secure-traffic-by-nsg.md#inbound-security-rules-ingress-traffic) to do a coarse-grained control.
5959

60-
### Outbound with user defined routing
60+
### Outbound with user defined routing
6161

6262
> [!NOTE]
6363
> The `userDefinedRouting` outbound type is an advanced networking scenario and requires proper network configuration, before you begin.
@@ -77,7 +77,7 @@ For inbound traffic, you're required to choose based on the requirements to choo
7777

7878
In HDInsight on AKS cluster pools, when you set an outbound type of UDR, no standard load balancer created.
7979

80-
You're required to first set the firewall rules for the Outbound with userDefinedRouting to work.
80+
You're required to first set the firewall rules for the Outbound with `userDefinedRouting` to work.
8181

8282
> [!IMPORTANT]
8383
> Outbound type of UDR requires a route for 0.0.0.0/0 and a next hop destination of NVA in the route table. The route table already has a default 0.0.0.0/0 to the Internet. Without a public IP address for Azure to use for Source Network Address Translation (SNAT), simply adding this route won't provide you outbound Internet connectivity. AKS validates that you don't create a 0.0.0.0/0 route pointing to the Internet but instead to a gateway, NVA, etc. When using an outbound type of UDR, a load balancer public IP address for inbound requests isn't created unless you configure a service of type loadbalancer. HDInsight on AKS never creates a public IP address for outbound requests if you set an outbound type of UDR.
@@ -92,28 +92,28 @@ Following is an example of setting up firewall rules, and testing your outbound
9292

9393
1. Create the required firewall subnet:
9494

95-
To deploy a firewall into the integrated virtual network, you need a subnet called AzureFirewallSubnet or Name of your choice.
95+
To deploy a firewall into the integrated virtual network, you need a subnet called **AzureFirewallSubnet or Name of your choice**.
9696

9797
1. In the Azure portal, navigate to the virtual network integrated with your app.
9898

99-
1. From the left navigation, select Subnets > + Subnet.
99+
1. From the left navigation, select **Subnets > + Subnet**.
100100

101-
1. In Name, type AzureFirewallSubnet.
101+
1. In **Name**, type **AzureFirewallSubnet**.
102102

103-
1. Subnet address range, accept the default or specify a range that's at least /26 in size.
103+
1. **Subnet address range**, accept the default or specify a range that's {at least /26 in size}(/azure/firewall/firewall-faq#why-does-azure-firewall-need-a--26-subnet-size).
104104

105-
1. Select Save.
105+
1. Select **Save**.
106106

107107

108108
1. Deploy the firewall and get its IP
109109

110-
1. On the Azure portal menu or from the Home page, select 'Create a resource.'
110+
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
111111

112-
1. Type firewall in the search box and press Enter.
112+
1. Type firewall in the search box and press **Enter**.
113113

114-
1. Select Firewall and then select Create.
114+
1. Select **Firewall** and then select **Create**.
115115

116-
1. On the Create a Firewall page, configure the firewall as shown in the following table:
116+
1. On the **Create a Firewall** page, configure the firewall as shown in the following table:
117117

118118

119119
|Setting |Value |
@@ -127,72 +127,72 @@ Following is an example of setting up firewall rules, and testing your outbound
127127

128128
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/create-firewall-page.png" alt-text="Screenshot showing create a firewall basic tab." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/create-firewall-page.png":::
129129

130-
1. Click Review + create.
130+
1. Click **Review + create**.
131131

132-
1. Select Create again. This process takes a few minutes to deploy.
132+
1. Select **Create again**. This process takes a few minutes to deploy.
133133

134134
1. After deployment completes, go to your resource group, and select the firewall.
135135

136-
1. In the firewall's Overview page, copy private IP address. The private IP address will be used as next hop address in the routing rule for the virtual network.
136+
1. In the firewall's **Overview** page, copy private IP address. **The private IP address will be used as next hop address in the routing rule for the virtual network**.
137137

138138
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/setup-firewall.png" alt-text="Screenshot showing how to set up firewall." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/setup-firewall.png":::
139139

140-
1. Route all traffic to the firewall
140+
1. Route all traffic to the firewall
141141

142142
When you create a virtual network, Azure automatically creates a default route table for each of its subnets and adds system [default routes to the table](/azure/virtual-network/virtual-networks-udr-overview#default). In this step, you create a user-defined route table that routes all traffic to the firewall, and then associate it with the App Service subnet in the integrated virtual network.
143143

144-
1. On the [Azure portal](https://portal.azure.com/) menu, select All services or search for and select All services from any page.
144+
1. On the [Azure portal](https://portal.azure.com/) menu, select **All services** or search for and select **All services** from any page.
145145

146-
1. Under Networking, select Route tables.
146+
1. Under **Networking**, select **Route tables**.
147147

148-
1. Select Add.
148+
1. Select **Add**.
149149

150150
1. Configure the route table like the following example:
151151

152152
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/create-cluster-basic-tab.png" alt-text="Screenshot showing create cluster basic tab." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/create-cluster-basic-tab.png":::
153153

154154
Make sure you select the same region as the firewall you created.
155155

156-
1. Select Review + create.
156+
1. Select **Review + create**.
157157

158-
1. Select Create.
158+
1. Select **Create**.
159159

160-
1. After deployment completes, select Go to resource.
160+
1. After deployment completes, select **Go to resource**.
161161

162-
1. From the left navigation, select Routes > Add.
162+
1. From the left navigation, select **Routes > Add**.
163163

164164
1. Configure the new route as shown in the following table:
165165

166166
|Setting |Value |
167167
|-|-
168168
|Address prefix |0.0.0.0/0 |
169169
|Next hop type |Virtual appliance |
170-
|Next hop address |The private IP address for the firewall that you copied in (section 2 - Deploy the firewall and get its IP) |
170+
|Next hop address |The private IP address for the firewall that you copied |
171171
172172
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/create-route-table.png" alt-text="Screenshot showing create route table." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/create-route-table.png":::
173173

174-
1. Select OK.
174+
1. Select **OK**.
175175

176-
1. Configure firewall policies
176+
1. Configure firewall policies
177177

178178
Outbound traffic from your HDInsight on AKS subnet is now routed through the integrated virtual network to the firewall.
179179

180180
To control the outbound traffic, add an application rule to firewall policy.
181181

182182
1. Navigate to the firewall's overview page and select its firewall policy.
183183

184-
1. In the firewall policy page, from the left navigation, select Application Rules > Add a rule collection.
184+
1. In the firewall policy page, from the left navigation, select **Application Rules > Add a rule collection**.
185185

186-
1. In Rules, add a network rule with the subnet as the source address, and specify an FQDN destination.
186+
1. In **Rules**, add a network rule with the subnet as the source address, and specify an FQDN destination.
187187

188-
1. You need to add AKS and HDInsight on AKS rules for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
188+
1. You need to add [AKS](/azure/aks/outbound-rules-control-egress#required-outbound-network-rules-and-fqdns-for-aks-clusters) and [HDInsight on AKS](./secure-traffic-by-firewall-azure-portal#add-network-and-application-rules-to-the-firewall) rules for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
189189

190-
1. You can also add the private endpoints for any dependent resources in the same subnet for cluster to access them (example – storage).
190+
1. You can also add the [private endpoints](/azure/hdinsight-aks/secure-traffic-by-firewall-azure-portal#add-network-and-application-rules-to-the-firewall) for any dependent resources in the same subnet for cluster to access them (example – storage).
191191

192-
1. Select Add.
192+
1. Select **Add**.
193193

194194

195-
1. Verify if public IP is created
195+
1. Verify if public IP is created
196196

197197
With the firewall rules set, you can select the subnet during the cluster pool creation.
198198

0 commit comments

Comments
 (0)