IPsec Encryption in transit for Azure HDInsight
This article discusses the implementation of encryption in transit for communication between Azure HDInsight cluster nodes.
Background
Azure HDInsight offers a variety of security features for securing your enterprise data. These solutions are grouped under the pillars of perimeter security, authentication, authorization, auditing, encryption, and compliance. Encryption can be applied to data both at rest and in transit.
Encryption at rest is covered by server-side encryption on Azure storage accounts, as well as disk encryption on the Azure VMs that are a part of your HDInsight cluster.
Encryption of data in transit on HDInsight is achieved with Transport Layer Security (TLS) for accessing the cluster gateways and Internet Protocol Security (IPsec) between cluster nodes. IPsec can be optionally enabled between all head nodes, worker nodes, edge nodes, zookeeper nodes as well as gateway and ID broker nodes.
Enable encryption in transit
Azure portal
To create a new cluster with encryption in transit enabled using the Azure portal, do the following steps:
Begin the normal cluster creation process. See Create Linux-based clusters in HDInsight by using the Azure portal for initial cluster creation steps.
Complete the Basics and Storage tabs. Proceed to the Security + Networking tab.
On the Security + Networking tab, select the Enable encryption in transit checkbox.
Create a cluster with encryption in transit enabled through the Azure CLI
Encryption in transit is enabled using the isEncryptionInTransitEnabled
property.
You can download a sample template and parameter file. Before using the template and the Azure CLI code snippet below, replace the following placeholders with their correct values:
Placeholder | Description |
---|---|
<SUBSCRIPTION_ID> |
The ID of your Azure subscription |
<RESOURCE_GROUP> |
The resource group where you want the new cluster and storage account created. |
<STORAGEACCOUNTNAME> |
The existing storage account that should be used with the cluster. The name should be of the form ACCOUNTNAME.blob.core.windows.net |
<CLUSTERNAME> |
The name of your HDInsight cluster. |
<PASSWORD> |
Your chosen password for signing in to the cluster using SSH and the Ambari dashboard. |
<VNET_NAME> |
The virtual network where the cluster will be deployed. |
The code snippet below does the following initial steps:
- Logs in to your Azure account.
- Sets the active subscription where the create operations will be done.
- Creates a new resource group for the new deployment activities.
- Deploy the template to create a new cluster.
az login
az account set --subscription <SUBSCRIPTION_ID>
# Create resource group
az group create --name <RESOURCEGROUPNAME> --location eastus2
az deployment group create --name HDInsightEnterpriseSecDeployment \
--resource-group <RESOURCEGROUPNAME> \
--template-file hdinsight-enterprise-security.json \
--parameters parameters.json