Skip to content

Commit 7ecad76

Browse files
Merge pull request MicrosoftDocs#72756 from laurenhughes/batchtag
Update service tag
2 parents 1b1dd3b + de8bbd1 commit 7ecad76

File tree

2 files changed

+14
-14
lines changed

2 files changed

+14
-14
lines changed

articles/batch/batch-virtual-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: jeconnoc
77

88
ms.service: batch
99
ms.topic: article
10-
ms.date: 10/05/2018
10+
ms.date: 04/10/2019
1111
ms.author: lahugh
1212
ms.custom: seodec18
1313

includes/batch-virtual-network-ports.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: include file
33
description: include file
44
services: batch
55
documentationcenter:
6-
author: dlepow
6+
author: laurenhughes
77
manager: jeconnoc
88
editor: ''
99

@@ -13,8 +13,8 @@ ms.devlang: na
1313
ms.topic: include
1414
ms.tgt_pltfrm: na
1515
ms.workload:
16-
ms.date: 10/05/2018
17-
ms.author: danlep
16+
ms.date: 04/10/2019
17+
ms.author: lahugh
1818
ms.custom: include file
1919
---
2020

@@ -49,27 +49,27 @@ Additional VNet requirements differ, depending on whether the Batch pool is in t
4949
The subnet must allow inbound communication from the Batch service to be able to schedule tasks on the compute nodes, and outbound communication to communicate with Azure Storage or other resources. For pools in the Virtual Machine configuration, Batch adds NSGs at the level of network interfaces (NICs) attached to VMs. These NSGs automatically configure inbound and outbound rules to allow the following traffic:
5050

5151
* Inbound TCP traffic on ports 29876 and 29877 from Batch service role IP addresses.
52-
* Inbound TCP traffic on port 22 (Linux nodes) or port 3389 (Windows nodes) to permit remote access.
52+
* Inbound TCP traffic on port 22 (Linux nodes) or port 3389 (Windows nodes) to permit remote access. For certain types of multi-instance tasks on Linux (such as MPI), you will need to also allow SSH port 22 traffic for IPs in the subnet containing the Batch compute nodes.
5353
* Outbound traffic on any port to the virtual network.
5454
* Outbound traffic on any port to the internet.
5555

5656
> [!IMPORTANT]
5757
> Exercise caution if you modify or add inbound or outbound rules in Batch-configured NSGs. If communication to the compute nodes in the specified subnet is denied by an NSG, then the Batch service sets the state of the compute nodes to **unusable**.
5858
59-
You do not need to specify NSGs at the subnet level because Batch configures its own NSGs. However, if the specified subnet has associated Network Security Groups (NSGs) and/or a firewall, configure the inbound and outbound security rules as shown in the following tables. Configure inbound traffic on port 3389 (Windows) or 22 (Linux) only if you need to permit remote access to the pool VMs. It is not required for the pool VMs to be usable.
59+
You do not need to specify NSGs at the subnet level because Batch configures its own NSGs. However, if the specified subnet has associated Network Security Groups (NSGs) and/or a firewall, configure the inbound and outbound security rules as shown in the following tables. Configure inbound traffic on port 3389 (Windows) or 22 (Linux) only if you need to permit remote access to the pool VMs from outside sources. It is not required for the pool VMs to be usable. Note that you will need to enable virtual network subnet traffic on port 22 for Linux if using certain kinds of multi-instance tasks such as MPI.
6060

6161
**Inbound security rules**
6262

63-
| Source IP addresses | Source ports | Destination | Destination ports | Protocol | Action |
64-
| --- | --- | --- | --- | --- | --- |
65-
Any <br /><br />Although this requires effectively "allow all", the Batch service applies an NSG at the network interface level on each VM created under Virtual Machine configuration that filters out all non-Batch service IP addresses. | * | Any | 29876-29877 | TCP | Allow |
66-
| User machines, used for debugging purposes to remotely access the pool VMs. | * | Any | 3389 (Windows), 22 (Linux) | TCP | Allow |
63+
| Source IP addresses | Source service tag | Source ports | Destination | Destination ports | Protocol | Action |
64+
| --- | --- | --- | --- | --- | --- | --- |
65+
| N/A | `BatchNodeManagement` [Service tag](../articles/virtual-network/security-overview.md#service-tags) | * | Any | 29876-29877 | TCP | Allow |
66+
| User source IPs for remotely accessing compute nodes and/or compute node subnet for Linux multi-instance tasks, if required. | N/A | * | Any | 3389 (Windows), 22 (Linux) | TCP | Allow |
6767

6868
**Outbound security rules**
6969

7070
| Source | Source ports | Destination | Destination service tag | Protocol | Action |
7171
| --- | --- | --- | --- | --- | --- |
72-
| Any | 443 | [Service tag](../articles/virtual-network/security-overview.md#service-tags) | Storage (in the same region as your Batch account and VNet) | Any | Allow |
72+
| Any | 443 | [Service tag](../articles/virtual-network/security-overview.md#service-tags) | `Storage` (in the same region as your Batch account and VNet) | Any | Allow |
7373

7474
### Pools in the Cloud Services configuration
7575

@@ -89,17 +89,17 @@ The subnet must allow inbound communication from the Batch service to be able to
8989

9090
You do not need to specify an NSG, because Batch configures inbound communication only from Batch IP addresses to the pool nodes. However, If the specified subnet has associated NSGs and/or a firewall, configure the inbound and outbound security rules as shown in the following tables. If communication to the compute nodes in the specified subnet is denied by an NSG, then the Batch service sets the state of the compute nodes to **unusable**.
9191

92-
Configure inbound traffic on port 3389 (Windows) or 22 (Linux) only if you need to permit remote access to the pool nodes. It is not required for the pool nodes to be usable.
92+
Configure inbound traffic on port 3389 for Windows if you need to permit RDP access to the pool nodes. It is not required for the pool nodes to be usable.
9393

9494
**Inbound security rules**
9595

9696
| Source IP addresses | Source ports | Destination | Destination ports | Protocol | Action |
9797
| --- | --- | --- | --- | --- | --- |
9898
Any <br /><br />Although this requires effectively "allow all", the Batch service applies an ACL rule at the level of each node that filters out all non-Batch service IP addresses. | * | Any | 10100, 20100, 30100 | TCP | Allow |
99-
| User machines, used for debugging purposesto remotely access the pool VMs. | * | Any | 3389 (Windows), 22 (Linux) | TCP | Allow |
99+
| Optional, to allow RDP access to compute nodes. | * | Any | 3389 | TCP | Allow |
100100

101101
**Outbound security rules**
102102

103103
| Source | Source ports | Destination | Destination ports | Protocol | Action |
104104
| --- | --- | --- | --- | --- | --- |
105-
| Any | * | Any | 443 | Any | Allow |
105+
| Any | * | Any | 443 | Any | Allow |

0 commit comments

Comments
 (0)