Skip to content

Commit 2c96c03

Browse files
committed
removing limitations related to this work
1 parent ec1fdf2 commit 2c96c03

File tree

1 file changed

+0
-17
lines changed

1 file changed

+0
-17
lines changed

articles/ai-studio/how-to/configure-managed-network.md

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ We have two network isolation aspects. One is the network isolation to access an
2424
You need to configure following network isolation configurations.
2525

2626
- Choose network isolation mode. You have two options: allow internet outbound mode or allow only approved outbound mode.
27-
- Create private endpoint outbound rules to your private Azure resources. Private Azure AI Search isn't supported yet.
2827
- If you use Visual Studio Code integration with allow only approved outbound mode, create FQDN outbound rules described in the [use Visual Studio Code](#scenario-use-visual-studio-code) section.
2928
- If you use HuggingFace models in Models with allow only approved outbound mode, create FQDN outbound rules described in the [use HuggingFace models](#scenario-use-huggingface-models) section.
3029
- If you use one of the open-source models with allow only approved outbound mode, create FQDN outbound rules described in the [curated by Azure AI](#scenario-curated-by-azure-ai) section.
@@ -44,10 +43,6 @@ There are three different configuration modes for outbound traffic from the mana
4443
<sup>1</sup> You can use outbound rules with _allow only approved outbound_ mode to achieve the same result as using allow internet outbound. The differences are:
4544

4645
* Always use private endpoints to access Azure resources.
47-
48-
> [!IMPORTANT]
49-
> While you can create a private endpoint for Azure AI Search, the connected services must allow public networking. For more information, see [Connectivity to other services](#connectivity-to-other-services).
50-
5146
* You must add rules for each outbound connection you need to allow.
5247
* Adding FQDN outbound rules __increase your costs__ as this rule type uses Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](#pricing).
5348
* The default rules for _allow only approved outbound_ are designed to minimize the risk of data exfiltration. Any outbound rules you add might increase your risk.
@@ -151,15 +146,6 @@ Before following the steps in this article, make sure you have the following pre
151146
* FQDN outbound rules only support ports 80 and 443.
152147
* When using a compute instance with a managed network, use the `az ml compute connect-ssh` command to connect to the compute using SSH.
153148

154-
### Connectivity to other services
155-
156-
* Azure AI Search should be public with your provisioned private Azure AI Studio hub.
157-
* The "Add your data" feature in the Azure AI Studio playground doesn't support using a virtual network or private endpoint on the following resources:
158-
* Azure AI Search
159-
* Azure OpenAI
160-
* Storage resource
161-
162-
163149
## Configure a managed virtual network to allow internet outbound
164150

165151
> [!TIP]
@@ -843,9 +829,6 @@ Private endpoints are currently supported for the following Azure services:
843829
* Azure Storage (all sub resource types)
844830

845831

846-
> [!IMPORTANT]
847-
> While you can create a private endpoint for Azure AI services and Azure AI Search, the connected services must allow public networking. For more information, see [Connectivity to other services](#connectivity-to-other-services).
848-
849832
When you create a private endpoint, you provide the _resource type_ and _subresource_ that the endpoint connects to. Some resources have multiple types and subresources. For more information, see [what is a private endpoint](/azure/private-link/private-endpoint-overview).
850833

851834
When you create a private endpoint for hub dependency resources, such as Azure Storage, Azure Container Registry, and Azure Key Vault, the resource can be in a different Azure subscription. However, the resource must be in the same tenant as the hub.

0 commit comments

Comments
 (0)