Default security group settings on Azure
Depending on what you chose during environment creation, CDP can create security groups for your environment automatically or you can provide your own security groups.
Environment security groups
Depending on what you chose during environment creation, CDP can create security groups for your environment automatically or you can provide your own security groups.
- If you choose to use your own security groups, you are asked to create Knox and Default security groups as described in the Security groups documentation.
- If you choose for CDP to create all security groups required for an environment, the following security groups are created:
Data Lake: master
Azure naming convention: master${dl-name}${numeric-id}sg
Protocol | Port Range | Source | Description |
---|---|---|---|
TCP | 22 | Your CIDR | This is an optional port for end user SSH access to cluster hosts. You should open it to your organization’s CIDR. |
TCP | 443 | Your CIDR and CDP CIDR | This port is used to access the Data Lake and Data Hub cluster UIs via Knox
gateway. You should open it to your organization’s CIDR in order to access cluster
UIs. This port is also required if you are planning to spin up Machine Learning workspaces since HTTPS access to ML workspaces is available over port 443. If you are not planning to use the Machine Learning service, you do not need to open this port. When CCM is enabled, you only need to set this to your CIDR. |
TCP | 9443 | CDP CIDR | This port is used by CDP to maintain management control of clusters and data
lakes. This port is not used when CCM is enabled. |
TCP, UDP | 0-65535 | Your VNet’s CIDR (for example 10.10.0.0/16) and your subnet’s CIDR (for example 10.0.2.0/24). | This is required for internal communication within the VNet. |
ICMP | N/A | Your internal VNet CIDR (for example 10.10.0.0/16). | This is required for internal communication within the VNet. |
Data Lake: IDBroker
AWS naming convention:
${environment-name}-${random-id}-ClusterNodeSecurityGroupidbroker-${random-id}
Azure naming convention: idbroker${dl-name}${numeric-id}sg
Protocol | Port Range | Source | Description |
---|---|---|---|
TCP | 22 | Your CIDR |
This is an optional port for end user SSH access to cluster hosts. |
TCP, UDP | 0-65535 | Your VNet’s CIDR (for example 10.10.0.0/16) and your subnet’s CIDR (for example 10.0.2.0/24). | This is required for internal communication within the VNet. |
ICMP | N/A | Your internal VNet CIDR (for example 10.10.0.0/16). | This is required for internal communication within the VNet. |
FreeIPA
Azure naming convention: master0-${env-name}freeipa${numeric-id}sg
Protocol | Port Range | Source | Description |
---|---|---|---|
TCP | 22 | Your CIDR | This is an optional port for end user SSH access to cluster hosts. You should open it to your organization’s CIDR. |
TCP | 9443 | CDP CIDR | This port is used by CDP to maintain management control of clusters and data
lakes. This port is not used when CCM is enabled. |
TCP, UDP | 0-65535 | Your VNet’s CIDR (for example 10.10.0.0/16) and your subnet’s CIDR (for example 10.0.2.0/24). | This is required for internal communication within the VNet. |
ICMP | N/A | Your internal VNet CIDR (for example 10.10.0.0/16). | This is required for internal communication within the VNet. |
Data Hub security groups
Depending on what you chose during environment creation, CDP can create security groups for your Data Hub clusters automatically or it can use your pre-created security groups:
- If during environment creation, you provided your own security groups, CDP uses these security groups when deploying clusters.
- If during environment creation you chose for CDP to create new security groups, new security groups are created for each Data Hub cluster as follows:
Data Hub: master
Azure naming convention: ${hostgroup-name}${dh-name}${numeric-id}sg
Protocol | Port Range | Source | Description |
---|---|---|---|
TCP | 22 | Your CIDR | This is an optional port for end user SSH access to cluster hosts. You should open it to your organization’s CIDR. |
TCP | 443 | Your CIDR and CDP CIDR | This port is used to access the Data Lake and Data Hub cluster UIs via Knox
gateway. You should open it to your organization’s CIDR in order to access cluster UIs.
When CCM is enabled, you only need to set this to your CIDR. |
TCP | 9443 | CDP CIDR | This port is used by CDP to maintain management control of clusters and
data lakes. This port is not used when CCM is enabled. |
TCP, UDP | 0-65535 | Your VNet’s CIDR (for example 10.10.0.0/16) and your subnet’s CIDR (for example 10.0.2.0/24). | This is required for internal communication within the VNet. |
ICMP | N/A | Your internal VNet CIDR (for example 10.10.0.0/16). | This is required for internal communication within the VNet. |
Data Hub: worker
Azure naming convention: ${hostgroup-name}${dh-name}${numeric-id}sg
Protocol | Port Range | Source | Description |
---|---|---|---|
TCP | 22 | Your CIDR | This is an optional port for end user SSH access to cluster hosts. |
TCP, UDP | 0-65535 | Your VNet’s CIDR (for example 10.10.0.0/16) and your subnet’s CIDR (for example 10.0.2.0/24). | This is required for internal communication within the VNet. |
ICMP | N/A | Your internal VNet CIDR (for example 10.10.0.0/16). | This is required for internal communication within the VNet. |
Hub: compute
Azure naming convention: ${hostgroup-name}${dh-name}${numeric-id}sg
Protocol | Port Range | Source | Description |
---|---|---|---|
TCP | 22 | Your CIDR | This is an optional port for end user SSH access to cluster hosts. |
TCP, UDP | 0-65535 | Your VNet’s CIDR (for example 10.10.0.0/16) and your subnet’s CIDR (for example 10.0.2.0/24). | This is required for internal communication within the VNet. |
ICMP | N/A | Your internal VNet CIDR (for example 10.10.0.0/16). | This is required for internal communication within the VNet. |
Data Warehouse security groups
CDP always creates new security groups when Cloudera Data Warehouses (CDW) are deployed.
Machine Learning security groups
CDP always creates new security groups when Cloudera Machine Learning (CML) workspaces are deployed.
Data Engineering security groups
CDP always creates new security groups when Cloudera Data Engineering (CDE) clusters are deployed.
DataFlow security groups
CDP always creates new security groups when Cloudera DataFlow (CDF) environments are enabled.