You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-managed-lustre/configure-network-security-group.md
+24-22Lines changed: 24 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,10 +62,12 @@ Once the network security group is created, you can associate it to the unique s
62
62
63
63
## Configure network security group rules
64
64
65
-
To configure network security group rules for Azure Managed Lustre file system support, you can add inbound and outbound security rules to the network security group associated to the subnet where your Azure Managed Lustre file system is deployed. The following sections describe how to create and configure the inbound and outbound security rules that allow Azure Managed Lustre file system support.
65
+
It's important to follow the minimum provided guidelines when you configure your network security group. Proper network security group configuration enables Azure Managed Lustre to operate essential services like the Lustre protocol, engineering and diagnostic support, Azure Blob storage, and security monitoring. Disabling any of these essential services may lead to a degraded product and support experience.
66
+
67
+
To configure network security group rules for Azure Managed Lustre file system support, add inbound and outbound security rules to the network security group associated with the Azure Managed Lustre subnet. The following sections describe how to create and configure the inbound and outbound security rules that allow Azure Managed Lustre file system support.
66
68
67
69
> [!NOTE]
68
-
> The security rules shown in this section are configured based on an Azure Managed Lustre file system test deployment in the East US region, with Blob Storage integration enabled. You'll need to adjust the rules based on your deployment region, virtual network subnet IP address, and other configuration settings for the Azure Managed Lustre file system.
70
+
> The security rules shown in this section are configured based on an Azure Managed Lustre file system test deployment in the East US region, with Blob Storage integration enabled. You need to adjust the rules based on your deployment region, virtual network subnet IP address, and other configuration settings for the Azure Managed Lustre file system.
69
71
70
72
### Create inbound security rules
71
73
@@ -78,13 +80,13 @@ You can create inbound security rules in the Azure portal. The following example
78
80
79
81
:::image type="content" source="media/network-security-group/add-inbound-security-rule.png" alt-text="Screenshot showing how to create an inbound security rule for a network security group in the Azure portal." lightbox="media/network-security-group/add-inbound-security-rule.png":::
80
82
81
-
Add the following inbound rules to the network security group:
83
+
Add the following inbound rules to the network security group. A description of all Azure service tags can be found at [Azure Service Tags Overview](/azure/virtual-network/service-tags-overview).
| 110 |*rule-name*| Any | Any |*IP address/CIDR range for Azure Managed Lustre file system subnet*|*IP address/CIDR range for Azure Managed Lustre file system subnet*| Allow |Permit protocol or port flows between hosts on the Azure Managed Lustre file system subnet. For example, the system uses TCP port 22 (SSH) for initial deployment and configuration. |
86
-
| 111 |*rule-name*| 988, 1019-1023 | TCP |*IP address/CIDR range for Lustre client subnet*|*IP address/CIDR range for Azure Managed Lustre file system subnet*| Allow |Permit communication between the Lustre client subnet and the Azure Managed Lustre file system subnet. Allows only TCP ports 988 and 1019-1023 on source and destination. |
87
-
| 112 |*rule-name*| Any | TCP |`AzureMonitor`|`VirtualNetwork`| Allow |Permit inbound flows from the AzureMonitor service tag. Allow TCP source port 443 only. |
87
+
| 110 |*rule-name*| Any | Any |*IP address/CIDR range for Azure Managed Lustre file system subnet*|*IP address/CIDR range for Azure Managed Lustre file system subnet*| Allow |Allow traffic flow between Azure Managed Lustre hosts for file system activities. The system also requires TCP port 22 (SSH) for initial deployment and configuration. |
88
+
| 111 |*rule-name*| 988, 1019-1023 | TCP |*IP address/CIDR range for Lustre client subnet*|*IP address/CIDR range for Azure Managed Lustre file system subnet*| Allow |Allow your Lustre clients to interact with all Azure Managed Lustre storage nodes for file system activities. The Lustre file system protocol requires ports 988 and 1019-1023. |
89
+
| 112 |*rule-name*| Any | TCP |`AzureMonitor`|`VirtualNetwork`| Allow |Allow the AzureMonitor service to detect health or security issues with the Azure Managed Lustre service hosts. |
88
90
| 120 |*rule-name*| Any | Any | Any | Any | Deny | Deny all other inbound flows. |
89
91
90
92
The inbound security rules in the Azure portal should look similar to the following screenshot. The screenshot is provided as an example; consult the table for the complete list of rules. You should adjust the subnet IP address/CIDR range and other settings based on your deployment:
@@ -102,23 +104,23 @@ You can create outbound security rules in the Azure portal. The following exampl
102
104
103
105
:::image type="content" source="media/network-security-group/add-outbound-security-rule.png" alt-text="Screenshot showing how to create an outbound security rule for a network security group in the Azure portal." lightbox="media/network-security-group/add-outbound-security-rule.png":::
104
106
105
-
Add the following outbound rules to the network security group:
107
+
Add the following outbound rules and network service tags to the network security group. A description of all Azure service tags can be found at [Azure Service Tags Overview](/azure/virtual-network/service-tags-overview).
| 100 |*rule-name*| 443 | TCP |`VirtualNetwork`|`AzureMonitor`| Allow |Permit outbound flows to the `AzureMonitor` service tag. TCP destination port 443 only. |
110
-
| 101 |*rule-name*| 443 | TCP |`VirtualNetwork`|`AzureKeyVault.EastUS`| Allow |Permit outbound flows to the `AzureKeyVault.EastUS`service tag. TCP destination port 443 only. |
111
-
| 102 |*rule-name*| 443 | TCP |`VirtualNetwork`|`AzureActiveDirectory`| Allow |Permit outbound flows to the `AzureActiveDirectory`service tag. TCP destination port 443 only. |
112
-
| 103 |*rule-name*| 443 | TCP |`VirtualNetwork`|`Storage.EastUS`| Allow |Permit outbound flows to the `Storage.EastUS` service tag. TCP destination port 443 only. |
113
-
| 104 |*rule-name*| 443 | TCP |`VirtualNetwork`|`GuestAndHybridManagement`| Allow |Permits outbound flows to the `GuestAndHybridManagement`service tag. TCP destination port 443 only. |
114
-
| 105 |*rule-name*| 443 | TCP |`VirtualNetwork`|`ApiManagement.EastUS`| Allow |Permit outbound flows to the `ApiManagement.EastUS` service tag. TCP destination port 443 only. |
115
-
| 106 |*rule-name*| 443 | TCP |`VirtualNetwork`|`AzureDataLake`| Allow |Permit outbound flows to the `AzureDataLake` service tag. TCP destination port 443 only. |
116
-
| 107 |*rule-name*| 443 | TCP |`VirtualNetwork`|`AzureResourceManager`| Allow |Permits outbound flows to the `AzureResourceManager`service tag. TCP destination port 443 only. |
117
-
| 108 |*rule-name*| 988, 1019-1023 | TCP |*IP address/CIDR range for Azure Managed Lustre file system subnet*|*IP address/CIDR range for Lustre client subnet*| Allow |Permit outbound flows for Azure Managed Lustre file system to Lustre client. Allows only TCP ports 988 and 1019-1023 on source and destination. |
118
-
| 109 |*rule-name*| 123 | UDP |*IP address/CIDR range for Azure Managed Lustre file system subnet*| 168.61.215.74/32 | Allow |Permit outbound flows to MS NTP server (168.61.215.74). UDP destination port 123 only. |
| 111 |*rule-name*| Any | Any |*IP address/CIDR range for Azure Managed Lustre file system subnet*|*IP address/CIDR range for Azure Managed Lustre file system subnet*| Allow |Permit protocol or port flows between hosts on the Azure Managed Lustre file system subnet. For example, the system uses TCP port 22 (SSH) for initial deployment and configuration. |
121
-
| 112 |*rule-name*| 443 | TCP |`VirtualNetwork`|`EventHub`| Allow |Permits outbound flows to the `EventHub` service tag. TCP destination port 443 only. |
111
+
| 100 |*rule-name*| 443 | TCP |`VirtualNetwork`|`AzureMonitor`| Allow |Allow the AzureMonitor service to report health or and security issues diagnosed with the Azure Managed Lustre service hosts. |
112
+
| 101 |*rule-name*| 443 | TCP |`VirtualNetwork`|`AzureKeyVault.EastUS`| Allow |Allow access to AzureKeyVault, which the service uses to store essential security secrets needed for basic operation and storage access. |
113
+
| 102 |*rule-name*| 443 | TCP |`VirtualNetwork`|`AzureActiveDirectory`| Allow |Allow access to AzureActiveDirectory required for the secure Entra ID service used during deployment and support activities. |
114
+
| 103 |*rule-name*| 443 | TCP |`VirtualNetwork`|`Storage.EastUS`| Allow |Allow access to Storage account endpoints that are required for Lustre HSM, system health signals, and other communication flows to the Azure Managed Lustre Resource Provider. |
115
+
| 104 |*rule-name*| 443 | TCP |`VirtualNetwork`|`GuestAndHybridManagement`| Allow |Allow access to GuestAndHybridManagement so the service can utilize Azure Log Analytics for supportability workflows. |
116
+
| 105 |*rule-name*| 443 | TCP |`VirtualNetwork`|`ApiManagement.EastUS`| Allow |Allow access to ApiManagement for security and performance of Azure Managed Lustre’s interactions with other services. |
117
+
| 106 |*rule-name*| 443 | TCP |`VirtualNetwork`|`AzureDataLake`| Allow |Allow access to AzureDataLake so security and health services running on the Azure Managed Lustre platform can log essential information for platform supportability. |
118
+
| 107 |*rule-name*| 443 | TCP |`VirtualNetwork`|`AzureResourceManager`| Allow |Allow access to Azure Resource Manager, which the service requires for deployment and maintenance of its internal resources. |
119
+
| 108 |*rule-name*| 988, 1019-1023 | TCP |*IP address/CIDR range for Azure Managed Lustre file system subnet*|*IP address/CIDR range for Lustre client subnet*| Allow |Allow the essential ports for proper Lustre protocol operation between the storage servers and the Lustre client VMs. |
120
+
| 109 |*rule-name*| 123 | UDP |*IP address/CIDR range for Azure Managed Lustre file system subnet*| 168.61.215.74/32 | Allow |Allow access to the MS NTP server for time synchronization of the Lustre storage servers and client VMs. |
121
+
| 110 |*rule-name*| 443 | TCP |`VirtualNetwork`| 20.34.120.0/21 | Allow |Allow Azure Managed Lustre to upload telemetry to its telemetry service, which is essential for Azure engineering to provide product support. |
122
+
| 111 |*rule-name*| Any | Any |*IP address/CIDR range for Azure Managed Lustre file system subnet*|*IP address/CIDR range for Azure Managed Lustre file system subnet*| Allow |Allow Azure Managed Lustre servers to communicate with each other within the subnet. Note: the system uses port 22 (SSH) during initial deployment and configuration. |
123
+
| 112 |*rule-name*| 443 | TCP |`VirtualNetwork`|`EventHub`| Allow |Allow access to EventHub so security and monitoring services running on the Azure Managed Lustre platform can store real-time system events. |
122
124
| 1000 |*rule-name*| Any | Any |`VirtualNetwork`|`Internet`| Deny | Deny outbound flows to the internet. |
123
125
| 1010 |*rule-name*| Any | Any | Any | Any | Deny | Deny all other outbound flows. |
0 commit comments