Skip to content

Commit 677adba

Browse files
Merge pull request #37 from Blackmist/264624-uuf-vnet
improvements from UUF
2 parents 89c02c5 + c6a9ab1 commit 677adba

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/machine-learning/how-to-managed-network.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.subservice: enterprise-readiness
88
ms.reviewer: None
99
ms.author: larryfr
1010
author: Blackmist
11-
ms.date: 04/11/2024
11+
ms.date: 08/29/2024
1212
ms.topic: how-to
1313
ms.custom:
1414
- build-2023
@@ -142,7 +142,7 @@ Before following the steps in this article, make sure you have the following pre
142142
resource_group = "<RESOURCE_GROUP>"
143143
144144
# get a handle to the subscription
145-
ml_client = MLClient(DefaultAzureCredential(), subscription_id, resource_group)
145+
ml_client = MLClient(DefaultAzureCredential(), subscription_id=subscription_id, resource_group_name=resource_group)
146146
```
147147
148148
# [Azure portal](#tab/portal)
@@ -294,7 +294,7 @@ To configure a managed VNet that allows internet outbound communications, use th
294294

295295
```python
296296
# Get the existing workspace
297-
ml_client = MLClient(DefaultAzureCredential(), subscription_id, resource_group, "myworkspace")
297+
ml_client = MLClient(DefaultAzureCredential(), subscription_id=subscription_id, resource_group_name=resource_group, workspace_name="myworkspace")
298298
ws = ml_client.workspaces.get()
299299
300300
# Basic managed VNet configuration
@@ -568,7 +568,7 @@ To configure a managed VNet that allows only approved outbound communications, u
568568

569569
```python
570570
# Get the existing workspace
571-
ml_client = MLClient(DefaultAzureCredential(), subscription_id, resource_group, "myworkspace")
571+
ml_client = MLClient(DefaultAzureCredential(), subscription_id=subscription_id, resource_group_name=resource_group, workspace_name="myworkspace")
572572
ws = ml_client.workspaces.get()
573573
574574
# Basic managed VNet configuration
@@ -793,7 +793,7 @@ To enable the [serverless Spark jobs](how-to-submit-spark-jobs.md) for the manag
793793

794794
```python
795795
# Connect to a workspace named "myworkspace"
796-
ml_client = MLClient(DefaultAzureCredential(), subscription_id, resource_group, workspace_name="myworkspace")
796+
ml_client = MLClient(DefaultAzureCredential(), subscription_id=subscription_id, resource_group_name=resource_group, workspace_name="myworkspace")
797797
798798
# whether to provision Spark vnet as well
799799
include_spark = True
@@ -839,7 +839,7 @@ The following example shows how to provision a managed VNet:
839839

840840
```python
841841
# Connect to a workspace named "myworkspace"
842-
ml_client = MLClient(DefaultAzureCredential(), subscription_id, resource_group, workspace_name="myworkspace")
842+
ml_client = MLClient(DefaultAzureCredential(), subscription_id=subscription_id, resource_group_name=resource_group, workspace_name="myworkspace")
843843
844844
# whether to provision Spark vnet as well
845845
include_spark = True
@@ -889,7 +889,7 @@ resource_group = "<your resource group name>"
889889
workspace = "<your workspace name>"
890890
891891
ml_client = MLClient(
892-
DefaultAzureCredential(), subscription_id, resource_group, workspace
892+
DefaultAzureCredential(), subscription_id=subscription_id, resource_group_name=resource_group, workspace_name=workspace
893893
)
894894
895895
# Get workspace info
@@ -936,7 +936,7 @@ The following example demonstrates how to manage outbound rules for a workspace
936936

937937
```python
938938
# Connect to the workspace
939-
ml_client = MLClient(DefaultAzureCredential(), subscription_id, resource_group, workspace_name="myworkspace")
939+
ml_client = MLClient(DefaultAzureCredential(), subscription_id=subscription_id, resource_group_name=resource_group, workspace_name="myworkspace")
940940
941941
# Specify the rule name
942942
rule_name = "<some-rule-name>"

0 commit comments

Comments
 (0)