Skip to content

Commit 75dfc09

Browse files
Merge pull request #5134 from Blackmist/364450-uuf
addressing customer feedback
2 parents 4b1ea2c + d907b93 commit 75dfc09

File tree

1 file changed

+10
-12
lines changed

1 file changed

+10
-12
lines changed

articles/machine-learning/how-to-configure-private-link.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.custom: devx-track-azurecli, sdkv2, FY25Q1-Linter, ignite-2024
1010
ms.author: larryfr
1111
author: Blackmist
1212
ms.reviewer: meerakurup
13-
ms.date: 09/05/2024
13+
ms.date: 05/22/2025
1414
# Customer Intent: As an admin, I want to understand how to use private links to secure communications between my Azure Machine Learning workspace and my virtual network.
1515
---
1616

@@ -24,7 +24,7 @@ In this document, you learn how to configure a private endpoint for your Azure M
2424
Azure Private Link enables you to restrict connections to your workspace to an Azure Virtual Network. You restrict a workspace to only accept connections from a virtual network by creating a private endpoint. The private endpoint is a set of private IP addresses within your virtual network. You can then limit access to your workspace to only occur over the private IP addresses. A private endpoint helps reduce the risk of data exfiltration. To learn more about private endpoints, see the [Azure Private Link](/azure/private-link/private-link-overview) article.
2525

2626
> [!WARNING]
27-
> Securing a workspace with private endpoints does not ensure end-to-end security by itself. You must secure all of the individual components of your solution. For example, if you use a private endpoint for the workspace, but your Azure Storage Account is not behind the VNet, traffic between the workspace and storage does not use the VNet for security.
27+
> Securing a workspace with private endpoints doesn't ensure end-to-end security by itself. You must secure all of the individual components of your solution. For example, if you use a private endpoint for the workspace, but your Azure Storage Account isn't behind the VNet, traffic between the workspace and storage doesn't use the VNet for security.
2828
>
2929
> For more information on securing resources used by Azure Machine Learning, see the following articles:
3030
>
@@ -40,7 +40,7 @@ Azure Private Link enables you to restrict connections to your workspace to an A
4040
* You must have an existing virtual network to create the private endpoint in.
4141

4242
> [!WARNING]
43-
> Do not use the 172.17.0.0/16 IP address range for your VNet. This is the default subnet range used by the Docker bridge network, and will result in errors if used for your VNet. Other ranges may also conflict depending on what you want to connect to the virtual network. For example, if you plan to connect your on premises network to the VNet, and your on-premises network also uses the 172.16.0.0/16 range. Ultimately, it is up to __you__ to plan your network infrastructure.
43+
> Don't use the 172.17.0.0/16 IP address range for your VNet. This is the default subnet range used by the Docker bridge network, and results in errors if used for your VNet. Other ranges might also conflict depending on what you want to connect to the virtual network. For example, if you plan to connect your on premises network to the VNet, and your on-premises network also uses the 172.16.0.0/16 range. Ultimately, it's up to __you__ to plan your network infrastructure.
4444
4545
* [Disable network policies for private endpoints](/azure/private-link/disable-private-endpoint-network-policy) before adding the private endpoint.
4646

@@ -72,10 +72,10 @@ Use one of the following methods to create a workspace with a private endpoint.
7272
When you use the Azure CLI [extension 2.0 CLI for machine learning](how-to-configure-cli.md), a YAML document is used to configure the workspace. The following example demonstrates creating a new workspace using a YAML configuration:
7373

7474
> [!TIP]
75-
> When you use a private link, your workspace cannot use Azure Container Registry tasks compute for image building. Instead, the workspace defaults to using a [serverless compute cluster](how-to-use-serverless-compute.md) to build images. This works only when the workspace-deependent resources such as the storage account and container registry are not under any network restrictions (private endpoint). If your workspace dependencies are under network restrictions, use the `image_build_compute` property to specify a compute cluster to use for image building.
75+
> When you use a private link, your workspace can't use Azure Container Registry tasks compute for image building. Instead, the workspace defaults to using a [serverless compute cluster](how-to-use-serverless-compute.md) to build images. This works only when the workspace-deependent resources such as the storage account and container registry aren't under any network restrictions (private endpoint). If your workspace dependencies are under network restrictions, use the `image_build_compute` property to specify a compute cluster to use for image building.
7676
> The `image_build_compute` property in this configuration specifies a CPU compute cluster name to use for Docker image environment building. You can also specify whether the private link workspace should be accessible over the internet using the `public_network_access` property.
7777
>
78-
> In this example, the compute referenced by `image_build_compute` will need to be created before building images.
78+
> In this example, the compute referenced by `image_build_compute` needs to be created before building images.
7979
8080
:::code language="YAML" source="~/azureml-examples-main/cli/resources/workspace/privatelink.yml":::
8181

@@ -151,7 +151,7 @@ Use one of the following methods to add a private endpoint to an existing worksp
151151

152152
> [!WARNING]
153153
>
154-
> If you have any existing compute targets associated with this workspace, and they are not behind the same virtual network that the private endpoint is created in, they will not work.
154+
> If you have any existing compute targets associated with this workspace, and they aren't behind the same virtual network that the private endpoint is created in, they won't work.
155155
156156
# [Azure CLI](#tab/cli)
157157
[!INCLUDE [CLI v2](includes/machine-learning-cli-v2.md)]
@@ -271,7 +271,7 @@ To enable public access, use the following steps:
271271
> There are two possible properties that you can configure:
272272
> * `allow_public_access_when_behind_vnet` - used by the Python SDK v1
273273
> * `public_network_access` - used by the CLI and Python SDK v2
274-
> Each property overrides the other. For example, setting `public_network_access` will override any previous setting to `allow_public_access_when_behind_vnet`.
274+
> Each property overrides the other. For example, setting `public_network_access` overrides any previous setting to `allow_public_access_when_behind_vnet`.
275275
>
276276
> Microsoft recommends using `public_network_access` to enable or disable public access to a workspace.
277277
@@ -380,7 +380,7 @@ Azure Machine Learning supports multiple private endpoints for a workspace. Mult
380380
* [Azure Data Factory managed virtual network](/azure/data-factory/managed-virtual-network-private-endpoint).
381381
382382
> [!IMPORTANT]
383-
> [Synapse's data exfiltration protection](/azure/synapse-analytics/security/workspace-data-exfiltration-protection) is not supported with Azure Machine Learning.
383+
> [Synapse's data exfiltration protection](/azure/synapse-analytics/security/workspace-data-exfiltration-protection) isn't supported with Azure Machine Learning.
384384
385385
> [!IMPORTANT]
386386
> Each VNet that contains a private endpoint for the workspace must also be able to access the Azure Storage Account, Azure Key Vault, and Azure Container Registry used by the workspace. For example, you might create a private endpoint for the services in each VNet.
@@ -421,9 +421,7 @@ If you want to create an isolated Azure Kubernetes Service used by the workspace
421421
422422
### Scenario: Managed online endpoints with access from selected IP addresses
423423
424-
Enabling inbound access from selected IP addresses is affected by the ingress setting on your managed online endpoints. If public ingress is enabled on your managed online endpoint, then you can't enable selected IP addresses on our workspace.
425-
426-
The following table shows the possible configurations for your workspace and managed online endpoint network configurations, and how it affects both. For more information, see [Network isolation with managed online endpoints](concept-secure-online-endpoint.md).
424+
Enabling inbound access from selected IP addresses is affected by the ingress setting on your managed online endpoints. The following table shows the possible configurations for your workspace and managed online endpoint network configurations, and how it affects both. For more information, see [Network isolation with managed online endpoints](concept-secure-online-endpoint.md).
427425
428426
| Workspace</br>public network access | Managed online endpoint</br>public network access | Does the workspace</br>respect the selected IPs? | Does the online endpoint</br>respect the selected IPs? |
429427
| --- | --- | --- | --- |
@@ -433,7 +431,7 @@ The following table shows the possible configurations for your workspace and man
433431
| Enabled from selected IPs | Enabled | Yes | Yes |
434432
435433
> [!NOTE]
436-
> If the workspace public network access configuration is changed from selected IPs to disabled, the managed online enedpoints will continue to respect the selected IPs. If you do not want thee selected IPs applied to your online endpoints, remove the addresses before selecting __Disabled__ for the workspace in the Azure portal. The Python SDK and Azure CLI support this change after or before.
434+
> If the workspace public network access configuration is changed from selected IPs to disabled, the managed online enedpoints continue to respect the selected IPs. If you don't want the selected IPs applied to your online endpoints, remove the addresses before selecting __Disabled__ for the workspace in the Azure portal. The Python SDK and Azure CLI support this change after or before.
437435
438436
### Scenario: Batch endpoints with access from selected IP addresses
439437

0 commit comments

Comments
 (0)