Skip to content

Commit 9df9f0f

Browse files
Merge pull request #2779 from Blackmist/fresh-370724
freshness
2 parents e7418b8 + 57195a9 commit 9df9f0f

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/machine-learning/concept-secure-network-traffic-flow.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: conceptual
99
ms.author: larryfr
1010
author: Blackmist
1111
ms.reviewer: meerakurup
12-
ms.date: 01/16/2024
12+
ms.date: 02/06/2025
1313
monikerRange: 'azureml-api-2 || azureml-api-1'
1414
---
1515

@@ -46,7 +46,7 @@ This article assumes the following configuration:
4646

4747
## Inbound and outbound requirements
4848

49-
| Scenario | Required inbound | Required outbound | Additional configuration |
49+
| Scenario | Required inbound | Required outbound | Extra configuration |
5050
| ----- | ----- | ----- | ----- |
5151
| [Access a workspace from the studio](#scenario-access-a-workspace-from-the-studio) | Not applicable | <ul><li>Microsoft Entra ID</li><li>Azure Front Door</li><li>Azure Machine Learning</li></ul> | You might need to use a custom DNS server. For more information, see [Use your workspace with a custom DNS server](how-to-custom-dns.md). |
5252
| [Use AutoML, the designer, the dataset, and the datastore from the studio](#scenario-use-automl-the-designer-the-dataset-and-the-datastore-from-the-studio) | Not applicable | Not applicable | <ul><li>Configure the workspace service principal</li><li>Allow access from trusted Azure services</li></ul>For more information, see [Secure an Azure Machine Learning workspace with virtual networks](how-to-secure-workspace-vnet.md#secure-azure-storage-accounts). |
@@ -153,7 +153,7 @@ The [legacy network isolation method for securing outbound communication](concep
153153
For information on the required outbound configuration for Azure Kubernetes Service, see [Secure an Azure Machine Learning inferencing environment with virtual networks](how-to-secure-inferencing-vnet.md).
154154

155155
> [!NOTE]
156-
> The Azure Kubernetes Service load balancer is not the same as the load balancer that Azure Machine Learning creates. If you want to host your model as a secured application that's available only on the virtual network, use the internal load balancer that Azure Machine Learning creates. If you want to allow public access, use the public load balancer that Azure Machine Learning creates.
156+
> The Azure Kubernetes Service load balancer isn't the same as the load balancer that Azure Machine Learning creates. If you want to host your model as a secured application that's available only on the virtual network, use the internal load balancer that Azure Machine Learning creates. If you want to allow public access, use the public load balancer that Azure Machine Learning creates.
157157
158158
If your model requires extra inbound or outbound connectivity, such as to an external data source, use a network security group or your firewall to allow the traffic.
159159

@@ -170,6 +170,6 @@ If you provide your own Docker images, such as on a container registry that you
170170

171171
## Next steps
172172

173-
Now that you've learned how network traffic flows in a secured configuration, learn more about securing Azure Machine Learning in a virtual network by reading the [overview article about virtual network isolation and privacy](how-to-network-security-overview.md).
173+
Now that you understand how network traffic flows in a secured configuration, learn more about securing Azure Machine Learning in a virtual network by reading the [overview article about virtual network isolation and privacy](how-to-network-security-overview.md).
174174

175175
For information on best practices, see the [Azure Machine Learning best practices for enterprise security](/azure/cloud-adoption-framework/ready/azure-best-practices/ai-machine-learning-enterprise-security) article.

0 commit comments

Comments
 (0)