You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-studio/how-to/configure-managed-network.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -621,18 +621,18 @@ The managed virtual network is automatically provisioned when you create a compu
621
621
622
622
To reduce the wait time and avoid potential timeout errors, we recommend manually provisioning the managed network. Then wait until the provisioning completes before you create a compute instance.
623
623
624
-
Alternatively, you can use the `provision_network_now` flag to provision the managed network as part of hub creation. This flag isin preview.
624
+
Alternatively, you can use the `provision_network_now` flag to provision the managed network as part of hub creation.
625
625
626
626
> [!NOTE]
627
627
> To create an online deployment, you must manually provision the managed network, or create a compute instance first which will automatically provision it.
628
628
629
629
# [Azure portal](#tab/portal)
630
630
631
-
During hub creation, select __Provision managed network proactively at creation__ to provision the managed network. Charges are incurred from network resources, such as private endpoints, once the virtual network is provisioned. This configuration option is only available during workspace creation, andisin preview.
631
+
During hub creation, select __Provision managed network proactively at creation__ to provision the managed network. Charges are incurred from network resources, such as private endpoints, once the virtual network is provisioned. This configuration option is only available during workspace creation.
632
632
633
633
# [Azure CLI](#tab/azure-cli)
634
634
635
-
The following example shows how to provision a managed virtual network during hub creation. The `--provision-network-now` flag isin preview.
635
+
The following example shows how to provision a managed virtual network during hub creation.
636
636
637
637
```azurecli
638
638
az ml workspace create -n myworkspace -g my_resource_group --kind hub --managed-network AllowInternetOutbound --provision-network-now true
@@ -652,7 +652,7 @@ az ml workspace show -n my_ai_hub_name -g my_resource_group --query managed_netw
652
652
653
653
# [Python SDK](#tab/python)
654
654
655
-
The following example shows how to provision a managed virtual network during hub creation. The `--provision-network-now` flag isin preview.
655
+
The following example shows how to provision a managed virtual network during hub creation.
656
656
657
657
```azurecli
658
658
az ml workspace create -n myworkspace -g my_resource_group --managed-network AllowInternetOutbound --provision-network-now true
@@ -849,7 +849,7 @@ A private endpoint is automatically created for a connection if the target resou
849
849
> [!IMPORTANT]
850
850
> As of March 31st2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure AI Foundry hub's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This does not impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, please ensure the role is assigned to the hub's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your hub's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
851
851
852
-
## Select an Azure Firewall version for allowed only approved outbound (Preview)
852
+
## Select an Azure Firewall version for allowed only approved outbound
853
853
854
854
An Azure Firewall is deployed if an FQDN outbound rule is created whilein the _allow only approved outbound_ mode. Charges for the Azure Firewall are included in your billing. By default, a __Standard__ version of AzureFirewall is created. Optionally, you can select to use a __Basic__ version. You can change the firewall version used as needed. To figure out which version is best for you, visit [Choose the right Azure Firewall version](/azure/firewall/choose-firewall-sku).
The hub managed virtual network feature is free. However, you're charged for the following resources that are used by the managed virtual network:
897
897
898
898
* Azure Private Link - Private endpoints used to secure communications between the managed virtual network and Azure resources relies on Azure Private Link. For more information on pricing, see [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
899
-
*FQDN outbound rules -FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. A standard version of Azure Firewall is used by default. For information on selecting the basic version, see [Select an Azure Firewall version](#select-an-azure-firewall-version-for-allowed-only-approved-outbound-preview). Azure Firewall is provisioned per hub.
899
+
*FQDN outbound rules -FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. A standard version of Azure Firewall is used by default. For information on selecting the basic version, see [Select an Azure Firewall version](#select-an-azure-firewall-version-for-allowed-only-approved-outbound). Azure Firewall is provisioned per hub.
900
900
901
901
> [!IMPORTANT]
902
902
> The firewall isn't created until you add an outbound FQDN rule. If you don't use FQDN rules, you will not be charged for Azure Firewall. For more information on pricing, see [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall/).
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-managed-network.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -826,14 +826,14 @@ The managed virtual network is automatically provisioned when you create a compu
826
826
827
827
To reduce the wait time and avoid potential timeout errors, we recommend manually provisioning the managed network. Then wait until the provisioning completes before you create a compute instance.
828
828
829
-
Alternatively, you can use the `provision_network_now` flag to provision the managed network as part of workspace creation. This flag is in preview.
829
+
Alternatively, you can use the `provision_network_now` flag to provision the managed network as part of workspace creation.
830
830
831
831
> [!NOTE]
832
832
> To create an online deployment, you must manually provision the managed network, or create a compute instance first which will automatically provision it.
833
833
834
834
# [Azure CLI](#tab/azure-cli)
835
835
836
-
The following example shows how to provision a managed virtual network during workspace creation. The `--provision-network-now` flag is in preview.
836
+
The following example shows how to provision a managed virtual network during workspace creation.
837
837
838
838
```azurecli
839
839
az ml workspace create -n myworkspace -g my_resource_group --managed-network AllowInternetOutbound --provision-network-now
@@ -856,7 +856,7 @@ az ml workspace show -n my_workspace_name -g my_resource_group --query managed_n
856
856
857
857
# [Python SDK](#tab/python)
858
858
859
-
To provision the managed network during workspace creation, set the `provision_network_now` flag to `True`. This flag is in preview.
859
+
To provision the managed network during workspace creation, set the `provision_network_now` flag to `True`.
During workspace creation, select __Provision managed network proactively at creation__ to provision the managed network. Charges are incurred from network resources, such as private endpoints, once the virtual network is provisioned. This configuration option is only available during workspace creation, and is in preview.
886
+
During workspace creation, select __Provision managed network proactively at creation__ to provision the managed network. Charges are incurred from network resources, such as private endpoints, once the virtual network is provisioned. This configuration option is only available during workspace creation.
887
887
888
888
---
889
889
@@ -1122,7 +1122,7 @@ When you create a private endpoint for Azure Machine Learning dependency resourc
1122
1122
> [!IMPORTANT]
1123
1123
> When configuring private endpoints for an Azure Machine Learning managed VNet, the private endpoints are only created when created when the first _compute is created_ or when managed VNet provisioning is forced. For more information on forcing the managed VNet provisioning, see [Configure for serverless Spark jobs](#manually-provision-a-managed-vnet).
1124
1124
1125
-
## Select an Azure Firewall version for allowed only approved outbound (Preview)
1125
+
## Select an Azure Firewall version for allowed only approved outbound
1126
1126
1127
1127
An Azure Firewall is deployed if an FQDN outbound rule is created while in the _allow only approved outbound_ mode. Charges for the Azure Firewall are included in your billing. By default, a __Standard__ version of AzureFirewall is created. Optionally, you can select to use a __Basic__ version. You can change the firewall version used as needed. To figure out which version is best for you, visit [Choose the right Azure Firewall version](/azure/firewall/choose-firewall-sku).
The Azure Machine Learning managed virtual network feature is free. However, you're charged for the following resources that are used by the managed virtual network:
1170
1170
1171
1171
* Azure Private Link - Private endpoints used to secure communications between the managed virtual network and Azure resources relies on Azure Private Link. For more information on pricing, see [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
1172
-
* FQDN outbound rules - FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are added to your billing. A standard version of Azure Firewall is used by default. For information on selecting the basic version, see [Select an Azure Firewall version](#select-an-azure-firewall-version-for-allowed-only-approved-outbound-preview).
1172
+
* FQDN outbound rules - FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are added to your billing. A standard version of Azure Firewall is used by default. For information on selecting the basic version, see [Select an Azure Firewall version](#select-an-azure-firewall-version-for-allowed-only-approved-outbound).
1173
1173
1174
1174
> [!IMPORTANT]
1175
1175
> The firewall isn't created until you add an outbound FQDN rule. For more information on pricing, see [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall/) and view prices for the _standard_ version.
0 commit comments