You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight-aks/control-egress-traffic-from-hdinsight-on-aks-clusters.md
+22-18Lines changed: 22 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Control network traffic from HDInsight on AKS Cluster pools and cluster
3
3
description: A guide to configure and manage inbound and outbound network connections from HDInsight on AKS.
4
4
ms.service: hdinsight-aks
5
5
ms.topic: how-to
6
-
ms.date: 03/26/2024
6
+
ms.date: 04/02/2024
7
7
---
8
8
9
9
# Control network traffic from HDInsight on AKS Cluster pools and clusters
@@ -26,7 +26,6 @@ For example, you may want to:
26
26
27
27
## Methods and tools to control egress traffic
28
28
29
-
30
29
You have different options and tools for managing how the egress traffic flows from HDInsight on AKS clusters. You can set up some of these at the cluster pool level and others at the cluster level.
31
30
32
31
***Outbound with load balancer.** When you deploy a cluster pool with this Egress path, a public IP address is provisioned and assigned to the load balancer resource. A custom virtual network (VNET) is not required; however, it is highly recommended. You can use Azure Firewall or Network Security Groups (NSGs) on the custom VNET to manage the traffic that leaves the network.
@@ -41,7 +40,7 @@ In the following sections, we describe each method in detail.
41
40
42
41
### Outbound with load balancer
43
42
44
-
The load balancer is used for egress through an HDInsight on AKS assigned public IP. When you configure the outbound type of loadBalancer on your cluster pool, you can expect egress out of the load balancer created by the HDInsight on AKS.
43
+
The load balancer is used for egress through an HDInsight on AKS assigned public IP. When you configure the outbound type of load balancer on your cluster pool, you can expect egress out of the load balancer created by the HDInsight on AKS.
45
44
46
45
You can configure the outbound with load balancer configuration using the Azure portal.
47
46
@@ -59,17 +58,20 @@ To allow requests to be sent to the cluster, you need to [allowlist the traffic]
59
58
60
59
> [!NOTE]
61
60
> The `userDefinedRouting` outbound type is an advanced networking scenario and requires proper network configuration, before you begin.
62
-
> Changing the outbound type after cluster pool creation is not supported.
61
+
> Changing the outbound type after cluster pool creation is not supported.
62
+
63
+
If userDefinedRouting is set, HDInsight on AKS won't automatically configure egress paths. The egress setup must be done by the user.
63
64
64
-
When `userDefinedRouting` is enabled, HDInsight on AKS doesn't have the ability to set up egress paths automatically. The user has to do the egress configuration.
65
+
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/user-defined-routing.png" alt-text="Screenshot showing user defined routing." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/user-defined-routing.png":::
65
66
66
-
You need to set up the HDInsight on AKS cluster within an existing virtual network that has a pre-set subnet, and you need to create clear egress.
67
+
You must deploy the HDInsight on AKS cluster into an existing virtual network with a subnet that has been previously configured, and you must establish explicit egress.
67
68
68
-
This design needs to send egress traffic to a network appliance such as a firewall, gateway, or proxy. Then, the public IP attached to the appliance can take care of the Network Address Translation (NAT).
69
+
This architecture requires explicitly sending egress traffic to an appliance like a firewall, gateway, or proxy, so a public IP assigned to the standard load balancer or appliance can handle the Network Address Translation (NAT).
69
70
70
-
Unlike Outbound with load balancer cluster pools, HDInsight on AKS does not set up outbound public IP address or outbound rules. Your custom route table (UDR) is the only path for outgoing traffic.
71
+
HDInsight on AKS doesn't configure outbound public IP address or outbound rules, unlike the Outbound with load balancer type clusters as described in the above section. Your UDR is the only source for egress traffic.
72
+
73
+
For inbound traffic, you are required to choose based on the requirements to choose a private cluster (for securing traffic on AKS control plane / API server) and select the private ingress option available on each of the cluster shape to use public or internal load balancer based traffic.
71
74
72
-
The path for the inbound traffic is determined by whether you choose to Enable Private AKS on your cluster pool. Then, you can select the private ingress option available on each of the cluster to use public or internal load balancer based traffic.
73
75
74
76
### Cluster pool creation for outbound with `userDefinedRouting `
75
77
@@ -78,11 +80,13 @@ When you use HDInsight on AKS cluster pools and choose userDefinedRouting (UDR)
78
80
> [!IMPORTANT]
79
81
> UDR egress path needs a route for 0.0.0.0/0 and a next hop destination of your Firewall or NVA in the route table. The route table already has a default 0.0.0.0/0 to the Internet. You can't get outbound Internet connectivity by just adding this route, because Azure needs a public IP address for SNAT. AKS checks that you don't create a 0.0.0.0/0 route pointing to the Internet, but to a gateway, NVA, etc. When you use UDR, a load balancer public IP address for inbound requests is only created if you configure a service of type loadbalancer. HDInsight on AKS never creates a public IP address for outbound requests when you use a UDR egress path.
80
82
81
-
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/user-defined-routing.png" alt-text="Screenshot showing user defined routing." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/user-defined-routing.png":::
With the following steps you will understand how to lock down the outbound traffic from your HDInsight on AKS service to back-end Azure resources or other network resources with Azure Firewall. This configuration helps prevent data exfiltration or the risk of malicious program implantation.
82
86
83
-
This guide shows you how to secure the outbound traffic from your HDInsight on AKS service to back-end Azure resources or other network resources with Azure Firewall. This configuration helps protect against data leakage or the threat of malicious program installation.
87
+
Azure Firewall lets you control outbound traffic at a much more granular level and filter traffic based on real-time threat intelligence from Microsoft Cyber Security. You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks.
84
88
85
-
Azure Firewall gives you more fine-grained control over outbound traffic and filters it based on up-to-date threat data from Microsoft Cyber Security. You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks [see Azure Firewall features](/azure/firewall/features).
89
+
Following is an example of setting up firewall rules, and testing your outbound connections
86
90
87
91
Here is an example of how to configure firewall rules, and check your outbound connections.
88
92
@@ -145,7 +149,7 @@ Here is an example of how to configure firewall rules, and check your outbound c
145
149
146
150
1. Configure the route table like the following example:
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/create-route-table.png" alt-text="Screenshot showing how to create route table." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/create-route-table.png":::
149
153
150
154
Make sure you select the same region as the firewall you created.
151
155
@@ -168,8 +172,7 @@ Here is an example of how to configure firewall rules, and check your outbound c
168
172
1. From the left navigation, select **Subnets > Associate**.
169
173
1. In **Virtual network**, select your integrated virtual network.
170
174
1. In **Subnet**, select the HDInsight on AKS subnet you wish to use.
171
-
172
-
175
+
173
176
:::image type="content" source="./media/control-egress traffic-from-hdinsight-on-aks-clusters/associate-subnet.png" alt-text="Screenshot showing how to associate subnet." lightbox="./media/control-egress traffic-from-hdinsight-on-aks-clusters/associate-subnet.png":::
174
177
175
178
1. Select **OK**.
@@ -212,10 +215,11 @@ Once the cluster pool is created, you can observe in the MC Group that there's n
212
215
213
216
With private AKS, the control plane or API server has internal IP addresses that are defined in the [RFC1918 - Address Allocation for Private Internet document](https://datatracker.ietf.org/doc/html/rfc1918). By using this option of private AKS, you can ensure network traffic between your API server and your HDInsight on AKS workload clusters remains on the private network only.
> By default, a private DNS zone with a private FQDN and a public DNS zone with a public FQDN are created when you enable private AKS. The agent nodes use the A record in the private DNS zone to find the private IP address of the private endpoint to communicate with the API server. The HDInsight on AKS Resource provider adds the A record to the private DNS zone automatically for private ingress.
220
+
When you provision a private AKS cluster, AKS by default creates a private FQDN with a private DNS zone and an additional public FQDN with a corresponding A record in Azure public DNS. The agent nodes continue to use the record in the private DNS zone to resolve the private IP address of the private endpoint for communication to the API server.
221
+
222
+
As HDInsight on AKS will automatically insert the record to the private DNS zone in the HDInsight on AKS created managed group, for private ingress.
0 commit comments