Skip to content

Commit adeb81e

Browse files
Merge pull request #3108 from Blackmist/377304-ga
removing preview tag
2 parents 07a20c8 + f028f12 commit adeb81e

File tree

2 files changed

+34
-34
lines changed

2 files changed

+34
-34
lines changed

articles/ai-studio/how-to/configure-managed-network.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: scottpolly
66
ms.service: azure-ai-foundry
77
ms.custom: ignite-2023, build-2024, devx-track-azurecli, ignite-2024
88
ms.topic: how-to
9-
ms.date: 02/24/2025
9+
ms.date: 02/27/2025
1010
ms.reviewer: meerakurup
1111
ms.author: larryfr
1212
author: Blackmist
@@ -155,7 +155,7 @@ Before following the steps in this article, make sure you have the following pre
155155
## Configure a managed virtual network to allow internet outbound
156156

157157
> [!TIP]
158-
> The creation of the managed virtual network is deferred until a compute resource is created or provisioning is manually started. When allowing automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network.
158+
> The creation of the managed VNet is deferred until a compute resource is created or provisioning is manually started. When you allow automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network.
159159

160160
# [Azure portal](#tab/portal)
161161

@@ -338,7 +338,7 @@ To configure a managed virtual network that allows internet outbound communicati
338338
## Configure a managed virtual network to allow only approved outbound
339339

340340
> [!TIP]
341-
> The managed virtual network is automatically provisioned when you create a compute resource. When allowing automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network. If you configured FQDN outbound rules, the first FQDN rule adds around __10 minutes__ to the provisioning time.
341+
> The managed VNet is automatically provisioned when you create a compute resource. When you allow automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network. If you configured FQDN outbound rules, the first FQDN rule adds around __10 minutes__ to the provisioning time.
342342

343343
# [Azure portal](#tab/portal)
344344

@@ -627,18 +627,18 @@ The managed virtual network is automatically provisioned when you create a compu
627627

628628
To reduce the wait time and avoid potential timeout errors, we recommend manually provisioning the managed network. Then wait until the provisioning completes before you create a compute instance.
629629

630-
Alternatively, you can use the `provision_network_now` flag to provision the managed network as part of hub creation. This flag is in preview.
630+
Alternatively, you can use the `provision_network_now` flag to provision the managed network as part of hub creation.
631631

632632
> [!NOTE]
633633
> To create an online deployment, you must manually provision the managed network, or create a compute instance first. Creating a compute instance automatically provision it.
634634

635635
# [Azure portal](#tab/portal)
636636

637-
During hub creation, select __Provision managed network proactively at creation__ to provision the managed network. Charges are incurred from network resources, such as private endpoints, once the virtual network is provisioned. This configuration option is only available during workspace creation, and is in preview.
637+
During hub creation, select __Provision managed network proactively at creation__ to provision the managed network. Charges are incurred from network resources, such as private endpoints, once the virtual network is provisioned. This configuration option is only available during workspace creation.
638638

639639
# [Azure CLI](#tab/azure-cli)
640640

641-
The following example shows how to provision a managed virtual network during hub creation. The `--provision-network-now` flag is in preview.
641+
The following example shows how to provision a managed virtual network during hub creation.
642642

643643
```azurecli
644644
az ml workspace create -n myworkspace -g my_resource_group --kind hub --managed-network AllowInternetOutbound --provision-network-now true
@@ -658,7 +658,7 @@ az ml workspace show -n my_ai_hub_name -g my_resource_group --query managed_netw
658658

659659
# [Python SDK](#tab/python)
660660

661-
The following example shows how to provision a managed virtual network during hub creation. The `--provision-network-now` flag is in preview.
661+
The following example shows how to provision a managed virtual network during hub creation.
662662

663663
```azurecli
664664
az ml workspace create -n myworkspace -g my_resource_group --managed-network AllowInternetOutbound --provision-network-now true
@@ -853,9 +853,9 @@ When you create a private endpoint for hub dependency resources, such as Azure S
853853
A private endpoint is automatically created for a connection if the target resource is an Azure resource listed previously. A valid target ID is expected for the private endpoint. A valid target ID for the connection can be the Azure Resource Manager ID of a parent resource. The target ID is also expected in the target of the connection or in `metadata.resourceid`. For more on connections, see [How to add a new connection in Azure AI Foundry portal](connections-add.md).
854854

855855
> [!IMPORTANT]
856-
> As of March 31st 2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure AI Foundry hub's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This doesn't impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, please ensure the role is assigned to the hub's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your hub's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
856+
> As of March 31st 2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure AI Foundry hub's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This doesn't impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, ensure the role is assigned to the hub's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your hub's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
857857

858-
## Select an Azure Firewall version for allowed only approved outbound (Preview)
858+
## Select an Azure Firewall version for allowed only approved outbound
859859

860860
An Azure Firewall is deployed if an FQDN outbound rule is created while in the _allow only approved outbound_ mode. Charges for the Azure Firewall are included in your billing. By default, a __Standard__ version of AzureFirewall is created. Optionally, you can select to use a __Basic__ version. You can change the firewall version used as needed. To figure out which version is best for you, visit [Choose the right Azure Firewall version](/azure/firewall/choose-firewall-sku).
861861

@@ -902,7 +902,7 @@ network = ManagedNetwork(isolation_mode=IsolationMode.ALLOW_INTERNET_OUTBOUND,
902902
The hub managed virtual network feature is free. However, you're charged for the following resources that are used by the managed virtual network:
903903

904904
* Azure Private Link - Private endpoints used to secure communications between the managed virtual network and Azure resources relies on Azure Private Link. For more information on pricing, see [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
905-
* FQDN outbound rules - FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. A standard version of Azure Firewall is used by default. For information on selecting the basic version, see [Select an Azure Firewall version](#select-an-azure-firewall-version-for-allowed-only-approved-outbound-preview). Azure Firewall is provisioned per hub.
905+
* FQDN outbound rules - FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. A standard version of Azure Firewall is used by default. For information on selecting the basic version, see [Select an Azure Firewall version](#select-an-azure-firewall-version-for-allowed-only-approved-outbound). Azure Firewall is provisioned per hub.
906906

907907
> [!IMPORTANT]
908908
> The firewall isn't created until you add an outbound FQDN rule. If you don't use FQDN rules, you won't be charged for Azure Firewall. For more information on pricing, see [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall/).

0 commit comments

Comments
 (0)