Skip to content

Commit f0a47d3

Browse files
authored
Merge pull request #107349 from dagiro/freshness26
freshness26
2 parents 9ff7dfe + d54bbcf commit f0a47d3

File tree

2 files changed

+7
-6
lines changed

2 files changed

+7
-6
lines changed

articles/hdinsight/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -846,8 +846,6 @@
846846
href: ./domain-joined/hdinsight-security-overview.md
847847
- name: Tutorials
848848
items:
849-
- name: Use firewall to restrict outbound traffic
850-
href: ./hdinsight-restrict-outbound-traffic.md
851849
- name: Apache HBase RBAC with Apache Ranger
852850
href: ./domain-joined/apache-domain-joined-run-hbase.md
853851
- name: Apache Hive RBAC with Apache Ranger
@@ -896,6 +894,8 @@
896894
href: ./domain-joined/ssh-domain-accounts.md
897895
- name: Securing data
898896
href: ./hdinsight-hadoop-create-linux-clusters-with-secure-transfer-storage.md
897+
- name: Use firewall to restrict outbound traffic
898+
href: ./hdinsight-restrict-outbound-traffic.md
899899
- name: Troubleshoot
900900
items:
901901
- name: ESP Authentication issues

articles/hdinsight/hdinsight-restrict-outbound-traffic.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: hrasheed
66
ms.reviewer: jasonh
77
ms.service: hdinsight
88
ms.topic: conceptual
9-
ms.date: 10/23/2019
9+
ms.date: 03/11/2020
1010
---
1111

1212
# Configure outbound network traffic for Azure HDInsight clusters using Firewall
@@ -21,12 +21,13 @@ There are several dependencies that require inbound traffic. The inbound managem
2121

2222
The HDInsight outbound traffic dependencies are almost entirely defined with FQDNs, which don't have static IP addresses behind them. The lack of static addresses means that Network Security Groups (NSGs) can't be used to lock down the outbound traffic from a cluster. The addresses change often enough that one can't set up rules based on the current name resolution and use that to set up NSG rules.
2323

24-
The solution to securing outbound addresses is to use a firewall device that can control outbound traffic based on domain names. Azure Firewall can restrict outbound HTTP and HTTPS traffic based on the FQDN of the destination or [FQDN tags](https://docs.microsoft.com/azure/firewall/fqdn-tags).
24+
The solution to securing outbound addresses is to use a firewall device that can control outbound traffic based on domain names. Azure Firewall can restrict outbound HTTP and HTTPS traffic based on the FQDN of the destination or [FQDN tags](../firewall/fqdn-tags.md).
2525

2626
## Configuring Azure Firewall with HDInsight
2727

2828
A summary of the steps to lock down egress from your existing HDInsight with Azure Firewall are:
2929

30+
1. Create a subnet.
3031
1. Create a firewall.
3132
1. Add application rules to the firewall
3233
1. Add network rules to the firewall.
@@ -72,7 +73,7 @@ Create an application rule collection that allows the cluster to send and receiv
7273
| --- | --- | --- | --- | --- |
7374
| Rule_2 | * | https:443 | login.windows.net | Allows Windows login activity |
7475
| Rule_3 | * | https:443 | login.microsoftonline.com | Allows Windows login activity |
75-
| Rule_4 | * | https:443,http:80 | storage_account_name.blob.core.windows.net | Replace `storage_account_name` with your actual storage account name. If your cluster is backed by WASB, then add a rule for WASB. To use ONLY https connections, make sure ["secure transfer required"](https://docs.microsoft.com/azure/storage/common/storage-require-secure-transfer) is enabled on the storage account. |
76+
| Rule_4 | * | https:443,http:80 | storage_account_name.blob.core.windows.net | Replace `storage_account_name` with your actual storage account name. If your cluster is backed by WASB, then add a rule for WASB. To use ONLY https connections, make sure ["secure transfer required"](../storage/common/storage-require-secure-transfer.md) is enabled on the storage account. |
7677

7778
![Title: Enter application rule collection details](./media/hdinsight-restrict-outbound-traffic/hdinsight-restrict-outbound-traffic-add-app-rule-collection-details.png)
7879

@@ -177,7 +178,7 @@ To learn about the scale limits of Azure Firewall and request increases, see [th
177178

178179
## Access to the cluster
179180

180-
After having the firewall set up successfully, you can use the internal endpoint (`https://CLUSTERNAME-int.azurehdinsight.net`) to access the Ambari from inside the VNET.
181+
After having the firewall set up successfully, you can use the internal endpoint (`https://CLUSTERNAME-int.azurehdinsight.net`) to access the Ambari from inside the virtual network.
181182

182183
To use the public endpoint (`https://CLUSTERNAME.azurehdinsight.net`) or ssh endpoint (`CLUSTERNAME-ssh.azurehdinsight.net`), make sure you have the right routes in the route table and NSG rules to avoid the asymmetric routing issue explained [here](../firewall/integrate-lb.md). Specifically in this case, you need to allow the client IP address in the Inbound NSG rules and also add it to the user-defined route table with the next hop set as `internet`. If this isn't set up correctly, you'll see a timeout error.
183184

0 commit comments

Comments
 (0)