Skip to content

Commit 6ee615c

Browse files
authored
Merge pull request #790 from MicrosoftDocs/main
10/11/2024 PM Publish
2 parents fbfbaca + 3ffda5f commit 6ee615c

File tree

9 files changed

+16
-24
lines changed

9 files changed

+16
-24
lines changed

articles/ai-services/encryption/cognitive-services-encryption-keys-portal.md

Lines changed: 1 addition & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -27,20 +27,6 @@ Azure AI is built on top of multiple Azure services. While the data is stored se
2727
* unwrap key
2828
* get
2929

30-
For example, the managed identity for Azure Cosmos DB would need to have those permissions to the key vault.
31-
32-
## How metadata is stored
33-
34-
The following services are used by Azure AI to store metadata for your Azure AI resource and projects:
35-
36-
|Service|What it's used for|Example|
37-
|-----|-----|-----|
38-
|Azure Cosmos DB|Stores metadata for your Azure AI projects and tools|Flow creation timestamps, deployment tags, evaluation metrics|
39-
|Azure AI Search|Stores indices that are used to help query your AI studio content.|An index based off your model deployment names|
40-
|Azure Storage Account|Stores artifacts created by Azure AI projects and tools|Fine-tuned models|
41-
42-
All of the above services are encrypted using the same key at the time that you create your Azure AI resource for the first time, and are set up in a managed resource group in your subscription once for every Azure AI resource and set of projects associated with it. Your Azure AI resource and projects read and write data using managed identity. Managed identities are granted access to the resources using a role assignment (Azure role-based access control) on the data resources. The encryption key you provide is used to encrypt data that is stored on Microsoft-managed resources. It's also used to create indices for Azure AI Search, which are created at runtime.
43-
4430
## Customer-managed keys
4531

4632
When you don't use a customer-managed key, Microsoft creates and manages these resources in a Microsoft owned Azure subscription and uses a Microsoft-managed key to encrypt the data.
@@ -53,14 +39,13 @@ When you use a customer-managed key, these resources are _in your Azure subscrip
5339
These Microsoft-managed resources are located in a new Azure resource group is created in your subscription. This group is in addition to the resource group for your project. This resource group contains the Microsoft-managed resources that your key is used with. The resource group is named using the formula of `<Azure AI resource group name><GUID>`. It isn't possible to change the naming of the resources in this managed resource group.
5440

5541
> [!TIP]
56-
> * The [Request Units](/azure/cosmos-db/request-units) for the Azure Cosmos DB automatically scale as needed.
5742
> * If your AI resource uses a private endpoint, this resource group will also contain a Microsoft-managed Azure Virtual Network. This VNet is used to secure communications between the managed services and the project. You cannot provide your own VNet for use with the Microsoft-managed resources. You also cannot modify the virtual network. For example, you cannot change the IP address range that it uses.
5843
5944
> [!IMPORTANT]
6045
> If your subscription does not have enough quota for these services, a failure will occur.
6146
6247
> [!WARNING]
63-
> Don't delete the managed resource group that contains this Azure Cosmos DB instance, or any of the resources automatically created in this group. If you need to delete the resource group or Microsoft-managed services in it, you must delete the Azure AI resources that uses it. The resource group resources are deleted when the associated AI resource is deleted.
48+
> Don't delete the managed resource group any of the resources automatically created in this group. If you need to delete the resource group or Microsoft-managed services in it, you must delete the Azure AI resources that uses it. The resource group resources are deleted when the associated AI resource is deleted.
6449
6550
The process to enable Customer-Managed Keys with Azure Key Vault for Azure AI services varies by product. Use these links for service-specific instructions:
6651

articles/ai-services/openai/quotas-limits.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.custom:
1010
- ignite-2023
1111
- references_regions
1212
ms.topic: conceptual
13-
ms.date: 10/10/2024
13+
ms.date: 10/11/2024
1414
ms.author: mbullwin
1515
---
1616

@@ -62,6 +62,17 @@ The following sections provide you with a quick guide to the default quotas and
6262

6363
## o1-preview & o1-mini rate limits
6464

65+
> [!IMPORTANT]
66+
> The ratio of RPM/TPM for quota with o1-series models works differently than older chat completions models:
67+
>
68+
> - **Older chat models:** 1 unit of capacity = 6 RPM and 1,000 TPM.
69+
> - **o1-preview:** 1 unit of capacity = 1 RPM and 6,000 TPM.
70+
> - **o1-mini:** 1 unit of capacity = 1 RPM per 10,000 TPM.
71+
>
72+
> This is particularly important for programmatic model deployment as this change in RPM/TPM ratio can result in accidental under allocation of quota if one is still assuming the 1:1000 ratio followed by older chat completion models.
73+
>
74+
> There is a known issue with the [quota/usages API](/rest/api/aiservices/accountmanagement/usages/list?view=rest-aiservices-accountmanagement-2024-06-01-preview&tabs=HTTP&preserve-view=true) where it assumes the old ratio applies to the new o1-series models. The API returns the correct base capacity number, but does not apply the correct ratio for the accurate calculation of TPM.
75+
6576
### o1-preview & o1-mini global standard
6677

6778
| Model|Tier| Quota Limit in tokens per minute (TPM) | Requests per minute |

articles/ai-studio/concepts/rbac-ai-studio.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,6 @@ author: Blackmist
1616

1717
# Role-based access control in Azure AI Studio
1818

19-
[!INCLUDE [Feature preview](~/reusable-content/ce-skilling/azure/includes/ai-studio/includes/feature-preview.md)]
20-
2119
In this article, you learn how to manage access (authorization) to an Azure AI Studio hub. Azure role-based access control (Azure RBAC) is used to manage access to Azure resources, such as the ability to create new resources or use existing ones. Users in your Microsoft Entra ID are assigned specific roles, which grant access to resources. Azure provides both built-in roles and the ability to create custom roles.
2220

2321
> [!WARNING]

articles/ai-studio/how-to/configure-managed-network.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,6 @@ zone_pivot_groups: azure-ai-studio-sdk-cli
1515

1616
# How to configure a managed network for Azure AI Studio hubs
1717

18-
[!INCLUDE [Feature preview](~/reusable-content/ce-skilling/azure/includes/ai-studio/includes/feature-preview.md)]
19-
2018
We have two network isolation aspects. One is the network isolation to access an Azure AI Studio hub. Another is the network isolation of computing resources for both your hub and project (such as compute instance, serverless and managed online endpoint.) This document explains the latter highlighted in the diagram. You can use hub built-in network isolation to protect your computing resources.
2119

2220
:::image type="content" source="../media/how-to/network/azure-ai-network-outbound.svg" alt-text="Diagram of hub network isolation." lightbox="../media/how-to/network/azure-ai-network-outbound.png":::
@@ -145,6 +143,7 @@ Before following the steps in this article, make sure you have the following pre
145143
* Using FQDN outbound rules increases the cost of the managed virtual network because FQDN rules use Azure Firewall. For more information, see [Pricing](#pricing).
146144
* FQDN outbound rules only support ports 80 and 443.
147145
* When using a compute instance with a managed network, use the `az ml compute connect-ssh` command to connect to the compute using SSH.
146+
* If your managed network is configured to __allow only approved outbound__, you cannot use an FQDN rule to access Azure Storage Accounts. You must use a private endpoint instead.
148147

149148
## Configure a managed virtual network to allow internet outbound
150149

articles/ai-studio/how-to/configure-private-link.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,6 @@ author: Blackmist
1515

1616
# How to configure a private link for Azure AI Studio hubs
1717

18-
[!INCLUDE [Feature preview](~/reusable-content/ce-skilling/azure/includes/ai-studio/includes/feature-preview.md)]
19-
2018
We have two network isolation aspects. One is the network isolation to access an Azure AI Studio hub. Another is the network isolation of computing resources in your hub and projects such as compute instances, serverless, and managed online endpoints. This article explains the former highlighted in the diagram. You can use private link to establish the private connection to your hub and its default resources. This article is for Azure AI Studio (hub and projects). For information on Azure AI services, see the [Azure AI services documentation](/azure/ai-services/cognitive-services-virtual-networks).
2119

2220
:::image type="content" source="../media/how-to/network/azure-ai-network-inbound.svg" alt-text="Diagram of AI Studio hub network isolation." lightbox="../media/how-to/network/azure-ai-network-inbound.png":::

articles/machine-learning/how-to-managed-network.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1116,6 +1116,7 @@ The Azure Machine Learning managed VNet feature is free. However, you're charged
11161116
* When using Managed Vnet, you can't deploy compute resources inside your custom Vnet. Compute resources can only be created inside the managed Vnet.
11171117
* Managed network isolation cannot establish a private connection from the managed virtual network to a user's on-premises resources.
11181118
For the list of supported private connections, see [Private Endpoints](/azure/machine-learning/how-to-managed-network?view=azureml-api-2&tabs=azure-cli&preserve-view=true#private-endpoints).
1119+
* If your managed network is configured to __allow only approved outbound__, you cannot use an FQDN rule to access Azure Storage Accounts. You must use a private endpoint instead.
11191120

11201121
### Migration of compute resources
11211122

articles/machine-learning/how-to-secure-rag-workflows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.topic: how-to
1313
ms.custom:
1414
- prompt-flow
1515
- ignite-2023
16-
- code02
16+
- code03
1717
---
1818

1919
# Secure your RAG workflows with network isolation (preview)
62.9 KB
Loading
43.5 KB
Loading

0 commit comments

Comments
 (0)