Skip to content

Latest commit

 

History

History
49 lines (32 loc) · 2.86 KB

private-manage.md

File metadata and controls

49 lines (32 loc) · 2.86 KB
title titleSuffix description author ms.author ms.reviewer ms.date ms.service ms.subservice ms.topic
Manage SQL Server Big Data Clusters in Azure Kubernetes Service (AKS) private cluster
SQL Server Big Data Cluster
Learn how to manage a SQL Server Big Data Clusters in Azure Kubernetes Service (AKS) private cluster.
HugoMSFT
hudequei
wiassaf
12/04/2023
sql
big-data-cluster
how-to

Manage SQL Server Big Data Clusters in AKS private cluster

[!INCLUDE big-data-clusters-banner-retirement]

This article explains how to manage an Azure Kubernetes Service (AKS) private cluster with big data clusters deployed in Azure.

As described in Create a private cluster, the AKS private cluster API server endpoint has no public IP address. To manage, the API server, use a VM that has access to the AKS clusters's Azure Virtual Network (VNet).

Azure VM - same VNet

The simplest method is to deploy an Azure VM in the same VNet as the AKS cluster.

  1. Deploy an Azure VM in the same VNET with your AKS cluster. This is sometimes called a jumpbox.
  2. Connect to that VM and Install SQL Server 2019 Big Data tools.

For security purpose, you can use AKS features for the API server authorized IP ranges to limit access to the API server (on AKS Control Plane). The limited access allows specific IP addresses - such as a jumpbox VM or management VM, or an IP address range for a group of developers, and the firewall public frontend IP address.

Other options

Alternatives to using a jumpbox include:

Related content