Connection Considerations | Teradata Vantage on Azure (DIY) - Connection Considerations - Teradata Vantage on Azure

Teradata Vantageā„¢ on Azure (DIY) Installation and Administration Guide

Product
Teradata Vantage on Azure
Release Number
2.3
Published
April 2022
Language
English (United States)
Last Update
2022-04-18
dita:mapPath
jsn1635415435502.ditamap
dita:ditavalPath
fui1635951983017.ditaval
dita:id
B035-2810
lifecycle
previous
Product Category
Cloud

If you are using VMs in Azure, configure these VMs to reside in the same VNet. When configuring the software, use private IP addresses to connect to these VMs.

If you are using VMs to connect from the Azure public cloud to an on-premises Teradata system, use public IP addresses to connect to the on-premises Teradata system when configuring the software.

You need to use public IP addresses only if you deploy a VM using a public Azure virtual network. If you deploy a VM using a private Azure virtual network, the VMs have private IPs and a VNet connection is required for SSH access.

When deploying a VM, make a note of the IP and DNS addresses of the Vantage VM and the IP and DNS addresses of the additional software. Use this information when configuring the additional software VMs. The VM location determines whether to use internal or external addresses when configuring the following software:
  • Teradata Data Mover
  • Teradata Query Service
  • Teradata Viewpoint

For example, use Vantage private IP addresses in Data Mover job XML and Data Mover portlets if all VMs reside in the same VNet. In Data Mover portlets, use the private IP address of the Data Mover VM to connect to a Vantage system. If source and target systems reside outside Azure, such as an on-premises system, use the public IP addresses instead.

Only the software listed previously can connect to an on-premises system if you have opened the appropriate inbound ports in the corporate firewall on those premises.