You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -155,7 +155,7 @@ Before following the steps in this article, make sure you have the following pre
155
155
## Configure a managed virtual network to allow internet outbound
156
156
157
157
> [!TIP]
158
-
> The creation of the managed virtual network is deferred until a compute resource is created or provisioning is manually started. When allowing automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network.
158
+
> The creation of the managed VNet is deferred until a compute resource is created or provisioning is manually started. When you allow automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network.
159
159
160
160
# [Azure portal](#tab/portal)
161
161
@@ -338,7 +338,7 @@ To configure a managed virtual network that allows internet outbound communicati
338
338
## Configure a managed virtual network to allow only approved outbound
339
339
340
340
> [!TIP]
341
-
> The managed virtual network is automatically provisioned when you create a compute resource. When allowing automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network. If you configured FQDN outbound rules, the first FQDN rule adds around __10 minutes__ to the provisioning time.
341
+
> The managed VNet is automatically provisioned when you create a compute resource. When you allow automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network. If you configured FQDN outbound rules, the first FQDN rule adds around __10 minutes__ to the provisioning time.
342
342
343
343
# [Azure portal](#tab/portal)
344
344
@@ -627,18 +627,18 @@ The managed virtual network is automatically provisioned when you create a compu
627
627
628
628
To reduce the wait time and avoid potential timeout errors, we recommend manually provisioning the managed network. Then wait until the provisioning completes before you create a compute instance.
629
629
630
-
Alternatively, you can use the `provision_network_now` flag to provision the managed network as part of hub creation. This flag isin preview.
630
+
Alternatively, you can use the `provision_network_now` flag to provision the managed network as part of hub creation.
631
631
632
632
> [!NOTE]
633
633
> To create an online deployment, you must manually provision the managed network, or create a compute instance first. Creating a compute instance automatically provision it.
634
634
635
635
# [Azure portal](#tab/portal)
636
636
637
-
During hub creation, select __Provision managed network proactively at creation__ to provision the managed network. Charges are incurred from network resources, such as private endpoints, once the virtual network is provisioned. This configuration option is only available during workspace creation, andisin preview.
637
+
During hub creation, select __Provision managed network proactively at creation__ to provision the managed network. Charges are incurred from network resources, such as private endpoints, once the virtual network is provisioned. This configuration option is only available during workspace creation.
638
638
639
639
# [Azure CLI](#tab/azure-cli)
640
640
641
-
The following example shows how to provision a managed virtual network during hub creation. The `--provision-network-now` flag isin preview.
641
+
The following example shows how to provision a managed virtual network during hub creation.
642
642
643
643
```azurecli
644
644
az ml workspace create -n myworkspace -g my_resource_group --kind hub --managed-network AllowInternetOutbound --provision-network-now true
@@ -658,7 +658,7 @@ az ml workspace show -n my_ai_hub_name -g my_resource_group --query managed_netw
658
658
659
659
# [Python SDK](#tab/python)
660
660
661
-
The following example shows how to provision a managed virtual network during hub creation. The `--provision-network-now` flag isin preview.
661
+
The following example shows how to provision a managed virtual network during hub creation.
662
662
663
663
```azurecli
664
664
az ml workspace create -n myworkspace -g my_resource_group --managed-network AllowInternetOutbound --provision-network-now true
@@ -853,9 +853,9 @@ When you create a private endpoint for hub dependency resources, such as Azure S
853
853
A private endpoint is automatically created for a connection if the target resource is an Azure resource listed previously. A valid target IDis expected for the private endpoint. A valid target IDfor the connection can be the Azure Resource Manager ID of a parent resource. The target IDis also expected in the target of the connection orin`metadata.resourceid`. For more on connections, see [How to add a new connection in Azure AI Foundry portal](connections-add.md).
854
854
855
855
> [!IMPORTANT]
856
-
> As of March 31st2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure AI Foundry hub's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This doesn't impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, please ensure the role is assigned to the hub's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your hub's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
856
+
> As of March 31st2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure AI Foundry hub's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This doesn't impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, ensure the role is assigned to the hub's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your hub's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
857
857
858
-
## Select an Azure Firewall version for allowed only approved outbound (Preview)
858
+
## Select an Azure Firewall version for allowed only approved outbound
859
859
860
860
An Azure Firewall is deployed if an FQDN outbound rule is created whilein the _allow only approved outbound_ mode. Charges for the Azure Firewall are included in your billing. By default, a __Standard__ version of AzureFirewall is created. Optionally, you can select to use a __Basic__ version. You can change the firewall version used as needed. To figure out which version is best for you, visit [Choose the right Azure Firewall version](/azure/firewall/choose-firewall-sku).
The hub managed virtual network feature is free. However, you're charged for the following resources that are used by the managed virtual network:
903
903
904
904
* Azure Private Link - Private endpoints used to secure communications between the managed virtual network and Azure resources relies on Azure Private Link. For more information on pricing, see [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
905
-
*FQDN outbound rules -FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. A standard version of Azure Firewall is used by default. For information on selecting the basic version, see [Select an Azure Firewall version](#select-an-azure-firewall-version-for-allowed-only-approved-outbound-preview). Azure Firewall is provisioned per hub.
905
+
*FQDN outbound rules -FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. A standard version of Azure Firewall is used by default. For information on selecting the basic version, see [Select an Azure Firewall version](#select-an-azure-firewall-version-for-allowed-only-approved-outbound). Azure Firewall is provisioned per hub.
906
906
907
907
> [!IMPORTANT]
908
908
> The firewall isn't created until you add an outbound FQDN rule. If you don't use FQDN rules, you won't be charged for Azure Firewall. For more information on pricing, see [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall/).
0 commit comments