Connection Considerations | Teradata® VantageCloud Enterprise on Azure (DIY) - Connection Considerations - Teradata® VantageCloud Enterprise on Azure

VantageCloud Enterprise on Azure (DIY) Installation and Administration Guide - 2.4.6

Product
Teradata® VantageCloud Enterprise on Azure
Release Number
2.4.6
Published
May 2025
ft:locale
en-US
ft:lastEdition
2025-06-04
dita:mapPath
ztq1662440257891.ditamap
dita:ditavalPath
fui1635951983017.ditaval
dita:id
eqk1475705518038
Product Category
Cloud

If you are using VMs in Azure, configure these VMs to reside in the same VNet. When configuring the software, use private IP addresses to connect to these VMs.

If you are using VMs to connect from the Azure public cloud to an on-premises Teradata system, use public IP addresses to connect to the on-premises Teradata system when configuring the software.

You need to use public IP addresses only if you deploy a VM using a public Azure virtual network. If you deploy a VM using a private Azure virtual network, the VMs have private IPs and a VNet connection is required for SSH access.

When deploying a VM, make a note of the IP and DNS addresses of the Vantage VM and the IP and DNS addresses of the additional software. Use this information when configuring the additional software VMs. The VM location determines whether to use internal or external addresses when configuring the following software:
  • Teradata Data Mover
  • Teradata Query Service
  • Teradata Viewpoint

For example, use Vantage private IP addresses in Data Mover job XML and Data Mover portlets if all VMs reside in the same VNet. In Data Mover portlets, use the private IP address of the Data Mover VM to connect to a Vantage system. If source and target systems reside outside Azure, such as an on-premises system, use the public IP addresses instead.

Only the software listed previously can connect to an on-premises system if you have opened the appropriate inbound ports in the corporate firewall on those premises.