Connection Considerations | Teradata Vantage on Azure (DIY) - Connection Considerations - Teradata Vantage on Azure

Teradata Vantageā„¢ on Azure (DIY) Installation and Administration Guide

Product
Teradata Vantage on Azure
Release Number
2.2
Published
August 2021
Language
English (United States)
Last Update
2021-08-06
dita:mapPath
djf1623284042771.ditamap
dita:ditavalPath
fon1623285509395.ditaval
dita:id
B035-2810
lifecycle
previous
Product Category
Cloud

If you are using VMs in Azure, configure these VMs to reside in the same VNet. When configuring the software, use private IP addresses to connect to these VMs.

If you are using VMs to connect from the Azure public cloud to an on-premises Teradata system, use public IP addresses to connect to the on-premises Teradata system when configuring the software.

You need to use public IP addresses only if you deploy a VM using a public Azure virtual network. If you deploy a VM using a private Azure virtual network, the VMs have private IPs and a VNet connection is required for SSH access.

When deploying a VM, make a note of the IP and DNS addresses of the Vantage VM and the IP and DNS addresses of the additional software. Use this information when configuring the additional software VMs. The VM location determines whether to use internal or external addresses when configuring the following software:
  • Teradata Data Mover
  • Teradata Query Service
  • Teradata Viewpoint

For example, use Vantage private IP addresses in Data Mover job XML and Data Mover portlets if all VMs reside in the same VNet. In Data Mover portlets, use the private IP address of the Data Mover VM to connect to a Vantage system. If source and target systems reside outside Azure, such as an on-premises system, use the public IP addresses instead.

Only the software listed above can connect to an on-premises system if you have opened the appropriate inbound ports in the corporate firewall on those premises.