Skip to content

Commit 462ff44

Browse files
committed
acrolynx
1 parent d830d87 commit 462ff44

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

azure-managed-lustre/configure-network-security-group.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -62,12 +62,12 @@ Once the network security group is created, you can associate it to the unique s
6262

6363
## Configure network security group rules
6464

65-
It is important to follow the minimum provided guidelines when configuring your network security group so Azure Managed Lustre can operate essential services like the Lustre protocol, engineering and diagnostic support, Azure Blob storage, and security monitoring. Disabling any of these essential services may lead to a degraded product and support experience.
65+
It's important to follow the minimum provided guidelines when you configure your network security group. Proper network security group configuration enables Azure Managed Lustre to operate essential services like the Lustre protocol, engineering and diagnostic support, Azure Blob storage, and security monitoring. Disabling any of these essential services may lead to a degraded product and support experience.
6666

67-
To configure network security group rules for Azure Managed Lustre file system support, you can add inbound and outbound security rules to the network security group associated to the subnet where your Azure Managed Lustre file system is deployed. The following sections describe how to create and configure the inbound and outbound security rules that allow Azure Managed Lustre file system support.
67+
To configure network security group rules for Azure Managed Lustre file system support, add inbound and outbound security rules to the network security group associated with the Azure Managed Lustre subnet. The following sections describe how to create and configure the inbound and outbound security rules that allow Azure Managed Lustre file system support.
6868

6969
> [!NOTE]
70-
> The security rules shown in this section are configured based on an Azure Managed Lustre file system test deployment in the East US region, with Blob Storage integration enabled. You'll need to adjust the rules based on your deployment region, virtual network subnet IP address, and other configuration settings for the Azure Managed Lustre file system.
70+
> The security rules shown in this section are configured based on an Azure Managed Lustre file system test deployment in the East US region, with Blob Storage integration enabled. You need to adjust the rules based on your deployment region, virtual network subnet IP address, and other configuration settings for the Azure Managed Lustre file system.
7171
7272
### Create inbound security rules
7373

@@ -82,9 +82,9 @@ You can create inbound security rules in the Azure portal. The following example
8282

8383
Add the following inbound rules to the network security group. A description of all Azure service tags can be found at [Azure Service Tags Overview](/azure/virtual-network/service-tags-overview).
8484

85-
| Priority | Name | Port(s) | Protocol | Source | Destination | Action | Description |
85+
| Priority | Name | Ports | Protocol | Source | Destination | Action | Description |
8686
| --- | --- | --- | --- | --- | --- | --- | --- |
87-
| 110 | *rule-name* | Any | Any | *IP address/CIDR range for Azure Managed Lustre file system subnet* | *IP address/CIDR range for Azure Managed Lustre file system subnet* | Allow | Allow traffic flow between Azure Managed Lustre hosts for file system activities. Note that the system also requires TCP port 22 (SSH) for initial deployment and configuration. |
87+
| 110 | *rule-name* | Any | Any | *IP address/CIDR range for Azure Managed Lustre file system subnet* | *IP address/CIDR range for Azure Managed Lustre file system subnet* | Allow | Allow traffic flow between Azure Managed Lustre hosts for file system activities. The system also requires TCP port 22 (SSH) for initial deployment and configuration. |
8888
| 111 | *rule-name* | 988, 1019-1023 | TCP | *IP address/CIDR range for Lustre client subnet* | *IP address/CIDR range for Azure Managed Lustre file system subnet* | Allow | Allow your Lustre clients to interact with all Azure Managed Lustre storage nodes for file system activities. The Lustre file system protocol requires ports 988 and 1019-1023. |
8989
| 112 | *rule-name* | Any | TCP | `AzureMonitor` | `VirtualNetwork` | Allow | Allow the AzureMonitor service to detect health or security issues with the Azure Managed Lustre service hosts. |
9090
| 120 | *rule-name* | Any | Any | Any | Any | Deny | Deny all other inbound flows. |
@@ -106,7 +106,7 @@ You can create outbound security rules in the Azure portal. The following exampl
106106

107107
Add the following outbound rules and network service tags to the network security group. A description of all Azure service tags can be found at [Azure Service Tags Overview](/azure/virtual-network/service-tags-overview).
108108

109-
| Priority | Name | Port(s) | Protocol | Source | Destination | Action | Description |
109+
| Priority | Name | Ports | Protocol | Source | Destination | Action | Description |
110110
| --- | --- | --- | --- | --- | --- | --- | --- |
111111
| 100 | *rule-name* | 443 | TCP | `VirtualNetwork` | `AzureMonitor` | Allow | Allow the AzureMonitor service to report health or and security issues diagnosed with the Azure Managed Lustre service hosts. |
112112
| 101 | *rule-name* | 443 | TCP | `VirtualNetwork` | `AzureKeyVault.EastUS` | Allow | Allow access to AzureKeyVault, which the service uses to store essential security secrets needed for basic operation and storage access. |

0 commit comments

Comments
 (0)