Skip to content

Commit 09423d5

Browse files
Merge pull request #3127 from Blackmist/fixing-link
Fixing link
2 parents 0c60510 + ac71798 commit 09423d5

File tree

1 file changed

+23
-17
lines changed

1 file changed

+23
-17
lines changed

articles/ai-studio/how-to/configure-managed-network.md

Lines changed: 23 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,26 @@
11
---
2-
title: How to configure a managed network for Azure AI Foundry hubs
2+
title: How to configure a managed network
33
titleSuffix: Azure AI Foundry
4-
description: Learn how to configure a managed network for Azure AI Foundry hubs.
4+
description: Learn how to configure a managed network for Azure AI Foundry hubs. A managed network secures your computing resources.
55
manager: scottpolly
66
ms.service: azure-ai-foundry
77
ms.custom: ignite-2023, build-2024, devx-track-azurecli, ignite-2024
88
ms.topic: how-to
9-
ms.date: 11/19/2024
9+
ms.date: 02/24/2025
1010
ms.reviewer: meerakurup
1111
ms.author: larryfr
1212
author: Blackmist
1313
zone_pivot_groups: azure-ai-studio-sdk-cli
14+
15+
#Customer intent: As an administrator, I want to configure a managed network for Azure AI Foundry hubs so that my computing resources are protected.
16+
1417
---
1518

1619
# How to configure a managed network for Azure AI Foundry hubs
1720

1821
We have two network isolation aspects. One is the network isolation to access an [Azure AI Foundry](https://ai.azure.com) hub. Another is the network isolation of computing resources for both your hub and project (such as compute instance, serverless and managed online endpoint.) This document explains the latter highlighted in the diagram. You can use hub built-in network isolation to protect your computing resources.
1922

20-
:::image type="content" source="../media/how-to/network/azure-ai-network-outbound.svg" alt-text="Diagram of hub network isolation." lightbox="../media/how-to/network/azure-ai-network-outbound.png":::
23+
:::image type="content" source="../media/how-to/network/azure-ai-network-outbound.svg" alt-text="Diagram of hub network isolation configuration with Azure AI Foundry." lightbox="../media/how-to/network/azure-ai-network-outbound.png":::
2124

2225
You need to configure following network isolation configurations.
2326

@@ -54,10 +57,13 @@ The following diagram shows a managed virtual network configured to __allow inte
5457
The following diagram shows a managed virtual network configured to __allow only approved outbound__:
5558

5659
> [!NOTE]
57-
> In this configuration, the storage, key vault, and container registry used by the hub are flagged as private. Since they are flagged as private, a private endpoint is used to communicate with them.
60+
> In this configuration, the storage, key vault, and container registry used by the hub are flagged as private. Since they're flagged as private, a private endpoint is used to communicate with them.
5861
5962
:::image type="content" source="../media/how-to/network/only-approved-outbound.svg" alt-text="Diagram of managed virtual network isolation configured for allow only approved outbound." lightbox="../media/how-to/network/only-approved-outbound.png":::
6063

64+
> [!NOTE]
65+
> When you're accessing a private storage account from a public AI Foundry hub, you must access AI Foundry from within the virtual network of your storage account. Accessing AI Foundry from within the virtual network ensures that you can call actions such as upload files to the private storage account. The private storage account is independent of your AI Foundry hub's networking settings. For more on setting your private storage accounts virtual network, see [Configure Azure Storage firewalls and virtual networks](/azure/storage/common/storage-network-security).
66+
6167
## Prerequisites
6268

6369
Before following the steps in this article, make sure you have the following prerequisites:
@@ -135,7 +141,7 @@ Before following the steps in this article, make sure you have the following pre
135141

136142
## Limitations
137143

138-
* Azure AI Foundry supports managed virtual network isolation for securing your compute resources. Azure AI Foundry does not support bring your own virtual network for securing compute resources. Please note bring your own virtual network for securing computes is different than your Azure virtual network that is required to access Azure AI Foundry from your on-premises network.
144+
* Azure AI Foundry supports managed virtual network isolation for securing your compute resources. Azure AI Foundry doesn't support bring your own virtual network for securing compute resources. Note that bringing your own virtual network for securing computes is different than your Azure virtual network that is required to access Azure AI Foundry from your on-premises network.
139145
* Once you enable managed virtual network isolation of your Azure AI, you can't disable it.
140146
* Managed virtual network uses private endpoint connection to access your private resources. You can't have a private endpoint and a service endpoint at the same time for your Azure resources, such as a storage account. We recommend using private endpoints in all scenarios.
141147
* The managed virtual network is deleted when the Azure AI is deleted.
@@ -149,14 +155,14 @@ Before following the steps in this article, make sure you have the following pre
149155
## Configure a managed virtual network to allow internet outbound
150156

151157
> [!TIP]
152-
> The creation of the managed VNet is deferred until a compute resource is created or provisioning is manually started. When allowing automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network.
158+
> The creation of the managed virtual network is deferred until a compute resource is created or provisioning is manually started. When allowing automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network.
153159

154160
# [Azure portal](#tab/portal)
155161

156162
* __Create a new hub__:
157163

158164
1. Sign in to the [Azure portal](https://portal.azure.com), and choose Azure AI Foundry from Create a resource menu.
159-
1. Select **+ New Azure AI**.
165+
1. Select __+ New Azure AI__.
160166
1. Provide the required information on the __Basics__ tab.
161167
1. From the __Networking__ tab, select __Private with Internet Outbound__.
162168
1. To add an _outbound rule_, select __Add user-defined outbound rules__ from the __Networking__ tab. From the __Outbound rules__ sidebar, provide the following information:
@@ -332,14 +338,14 @@ To configure a managed virtual network that allows internet outbound communicati
332338
## Configure a managed virtual network to allow only approved outbound
333339

334340
> [!TIP]
335-
> The managed VNet is automatically provisioned when you create a compute resource. When allowing automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network. If you configured FQDN outbound rules, the first FQDN rule adds around __10 minutes__ to the provisioning time.
341+
> The managed virtual network is automatically provisioned when you create a compute resource. When allowing automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network. If you configured FQDN outbound rules, the first FQDN rule adds around __10 minutes__ to the provisioning time.
336342

337343
# [Azure portal](#tab/portal)
338344

339345
* __Create a new hub__:
340346

341347
1. Sign in to the [Azure portal](https://portal.azure.com), and choose Azure AI Foundry from Create a resource menu.
342-
1. Select **+ New Azure AI**.
348+
1. Select __+ New Azure AI__.
343349
1. Provide the required information on the __Basics__ tab.
344350
1. From the __Networking__ tab, select __Private with Approved Outbound__.
345351

@@ -624,7 +630,7 @@ To reduce the wait time and avoid potential timeout errors, we recommend manuall
624630
Alternatively, you can use the `provision_network_now` flag to provision the managed network as part of hub creation. This flag is in preview.
625631

626632
> [!NOTE]
627-
> To create an online deployment, you must manually provision the managed network, or create a compute instance first which will automatically provision it.
633+
> To create an online deployment, you must manually provision the managed network, or create a compute instance first. Creating a compute instance automatically provision it.
628634

629635
# [Azure portal](#tab/portal)
630636

@@ -644,7 +650,7 @@ The following example shows how to provision a managed virtual network.
644650
az ml workspace provision-network -g my_resource_group -n my_ai_hub_name
645651
```
646652

647-
To verify that the provisioning has completed, use the following command:
653+
To verify that the provisioning completed, use the following command:
648654

649655
```azurecli
650656
az ml workspace show -n my_ai_hub_name -g my_resource_group --query managed_network
@@ -667,7 +673,7 @@ ml_client = MLClient(DefaultAzureCredential(), subscription_id, resource_group,
667673
provision_network_result = ml_client.workspaces.begin_provision_network(workspace_name=ai_hub_name).result()
668674
```
669675

670-
To verify that the AI Hub has been provisioned, use `ml_client.workspaces.get()` to get the AI Hub information. The `managed_network` property contains the status of the managed network.
676+
To verify the AI provisioning, use `ml_client.workspaces.get()` to get the AI Hub information. The `managed_network` property contains the status of the managed network.
671677

672678
```python
673679
ws = ml_client.workspaces.get()
@@ -761,7 +767,7 @@ __Inbound__ service tag rules:
761767
To allow installation of __Python packages for training and deployment__, add outbound _FQDN_ rules to allow traffic to the following host names:
762768

763769
> [!NOTE]
764-
> This is not a complete list of the hosts required for all Python resources on the internet, only the most commonly used. For example, if you need access to a GitHub repository or other host, you must identify and add the required hosts for that scenario.
770+
> This isn't a complete list of the hosts required for all Python resources on the internet, only the most commonly used. For example, if you need access to a GitHub repository or other host, you must identify and add the required hosts for that scenario.
765771

766772
| __Host name__ | __Purpose__ |
767773
| ---- | ---- |
@@ -779,7 +785,7 @@ Visual Studio Code relies on specific hosts and ports to establish a remote conn
779785
The hosts in this section are used to install Visual Studio Code packages to establish a remote connection between Visual Studio Code and the compute instances for your project.
780786

781787
> [!NOTE]
782-
> This is not a complete list of the hosts required for all Visual Studio Code resources on the internet, only the most commonly used. For example, if you need access to a GitHub repository or other host, you must identify and add the required hosts for that scenario. For a complete list of host names, see [Network Connections in Visual Studio Code](https://code.visualstudio.com/docs/setup/network).
788+
> This isn't a complete list of the hosts required for all Visual Studio Code resources on the internet, only the most commonly used. For example, if you need access to a GitHub repository or other host, you must identify and add the required hosts for that scenario. For a complete list of host names, see [Network Connections in Visual Studio Code](https://code.visualstudio.com/docs/setup/network).
783789

784790
| __Host name__ | __Purpose__ |
785791
| ---- | ---- |
@@ -847,7 +853,7 @@ When you create a private endpoint for hub dependency resources, such as Azure S
847853
A private endpoint is automatically created for a connection if the target resource is an Azure resource listed previously. A valid target ID is expected for the private endpoint. A valid target ID for the connection can be the Azure Resource Manager ID of a parent resource. The target ID is also expected in the target of the connection or in `metadata.resourceid`. For more on connections, see [How to add a new connection in Azure AI Foundry portal](connections-add.md).
848854

849855
> [!IMPORTANT]
850-
> As of March 31st 2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure AI Foundry hub's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This does not impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, please ensure the role is assigned to the hub's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your hub's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
856+
> As of March 31st 2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure AI Foundry hub's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This doesn't impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, please ensure the role is assigned to the hub's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your hub's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
851857

852858
## Select an Azure Firewall version for allowed only approved outbound (Preview)
853859

@@ -899,7 +905,7 @@ The hub managed virtual network feature is free. However, you're charged for the
899905
* FQDN outbound rules - FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. A standard version of Azure Firewall is used by default. For information on selecting the basic version, see [Select an Azure Firewall version](#select-an-azure-firewall-version-for-allowed-only-approved-outbound-preview). Azure Firewall is provisioned per hub.
900906

901907
> [!IMPORTANT]
902-
> The firewall isn't created until you add an outbound FQDN rule. If you don't use FQDN rules, you will not be charged for Azure Firewall. For more information on pricing, see [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall/).
908+
> The firewall isn't created until you add an outbound FQDN rule. If you don't use FQDN rules, you won't be charged for Azure Firewall. For more information on pricing, see [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall/).
903909

904910
## Related content
905911

0 commit comments

Comments
 (0)