Skip to content

Commit d38aa63

Browse files
committed
updates from PM
1 parent cf75472 commit d38aa63

File tree

2 files changed

+32
-13
lines changed

2 files changed

+32
-13
lines changed

articles/ai-studio/how-to/access-on-premises-resources.md

Lines changed: 27 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure an Azure AI Studio managed network to secure
55
manager: scottpolly
66
ms.service: azure-ai-studio
77
ms.topic: how-to
8-
ms.date: 10/22/2024
8+
ms.date: 10/24/2024
99
ms.reviewer: meerakurup
1010
ms.author: larryfr
1111
author: Blackmist
@@ -16,7 +16,7 @@ author: Blackmist
1616

1717
To access your non-Azure resources located in a different virtual network or located entirely on-premises from your Azure AI Studio's managed virtual network, an Application Gateway must be configured. Through this Application Gateway, full end to end access can be configured to your resources.
1818

19-
Azure Application Gateway is a load balancer that makes routing decisions based on the URL of an HTTPS request. Azure Machine Learning supports using an application gateway to securely communicate with the following resources. For more on Application Gateway, see [What is Azure Application Gateway](/azure/application-gateway/overview).
19+
Azure Application Gateway is a load balancer that makes routing decisions based on the URL of an HTTPS request. Azure Machine Learning supports using an application gateway to securely communicate with non-Azure resources. For more on Application Gateway, see [What is Azure Application Gateway](/azure/application-gateway/overview).
2020

2121
To access on-premises or custom virtual network resources from the managed virtual network, you configure an Application Gateway on your Azure virtual network. The application gateway is used for inbound access to the AI Studio's hub. Once configured, you then create a private endpoint from the Azure AI Studio hub's managed virtual network to the Application Gateway. With the private endpoint, the full end to end path is secured and not routed through the Internet.
2222

@@ -30,7 +30,7 @@ To access on-premises or custom virtual network resources from the managed virtu
3030

3131
## Supported resources
3232

33-
Application Gateway is verified to support a private connection from the managed virtual network to:
33+
Application Gateway supports any backend target resource that uses HTTP or HTTPS protocol. Connections to the following resources from the managed virtual network are verified:
3434
- Jfrog Artifactory
3535
- Snowflake Database
3636
- Private APIs
@@ -43,7 +43,7 @@ Follow the [Quickstart: Direct web traffic using the portal](/azure/application-
4343

4444
- Ensure your Application Gateway is in the same region as the selected Azure Virtual Network.
4545
- Azure AI Studio only supports IPv4 for Application Gateway.
46-
- With your Azure Virtual Network, one subnet can only be associated with one Application Gateway.
46+
- With your Azure Virtual Network, select one dedicated subnet for your Application Gateway. No other resources can be deployed in this subnet.
4747

4848
1. From the __Frontends__ tab, Application Gateway doesn’t support private Frontend IP address only so Public IP addresses need to be selected or a new one created. Private IP addresses for the resources that the gateway connects to can be added within the range of the subnet you selected on the Basics tab.
4949

@@ -56,7 +56,15 @@ Follow the [Quickstart: Direct web traffic using the portal](/azure/application-
5656
- If you want end-to-end TLS encryption, select HTTPS listener and upload your own certificate for Application Gateway to decrypt request received by listener. For more information, see [Enabling end to end TLS on Azure Application Gateway](/azure/application-gateway/ssl-overview#end-to-end-tls-encryption).
5757
- If you want a fully private backend target without any public network access, DO NOT setup a listener on the public frontend IP address and its associated routing rule. Application Gateway only forwards requests that listeners receive at the specific port. If you want to avoid adding public frontend IP listener by mistake, see [Network security rules](/azure/application-gateway/configuration-infrastructure#network-security-groups) to fully lock down public network access.
5858

59-
- In the __Backend targets__ section, if you want to use HTTPS and Backend server’s certificate is NOT issued by a well-known CA, you must upload the Root certificate (.CER) of the backend server. For more on configuring with a root certificate, see Configure end-to-end TLS encryption using the portal.
59+
- In the __Backend targets__ section, if you want to use HTTPS and Backend server’s certificate is NOT issued by a well-known CA, you must upload the Root certificate (.CER) of the backend server. For more on configuring with a root certificate, see [Configure end-to-end TLS encryption using the portal](/azure/application-gateway/end-to-end-ssl-portal).
60+
61+
1. Once the Application Gateway resource is created, navigate to the new Application Gateway resource in the Azure portal. Under __Settings__, select, __Private link__ to enable a virtual network to privately access the Application Gateway through a private endpoint connection. The Private link configuration isn't created by default.
62+
63+
- Select __+ Add__ to add the Private Link configuration, and then use the following values to create the configuration:
64+
- Name: Provide a name for your private link configuration
65+
- Private link subnet: Select a subnet in your virtual network.
66+
- Frontend IP Configuration: `appGwPrivateFrontendIpIPv4`
67+
- To verify the Private link is set up correctly, navigate to the __Private endpoint connections__ tab and select __+ Private endpoint__. On the __Resource__ tab, the __Target sub-resource__ should be the name of your private Frontend IP configuration, `appGwPrivateFrontendIpIPv4`. If no value appears in the __Target sub-resource__, then the Application Gateway listener wasn't configured correctly.
6068

6169
## Configure private link
6270

@@ -67,19 +75,21 @@ Follow the [Quickstart: Direct web traffic using the portal](/azure/application-
6775
- Destination Type: Private Endpoint
6876
- Subscription and Resource Group: Select the Subscription and Resource Group where your Application Gateway is deployed
6977
- Resource Type: `Microsoft.Network/applicationGateways`
70-
- Resource name: `appgateway`
78+
- Resource name: The name of your Application Gateway resource.
7179
- Sub resource: `appGwPrivateFrontendIpIPv4`
7280
- FQDNs: These FQDNs are the aliases that you want to use inside the Azure AI Studio. They're resolved to the managed private endpoint’s private IP address targeting Application Gateway. You might include multiple FQDNs depending on how many resources you would like to connect to with the Application Gateway.
7381

7482
> [!NOTE]
7583
> If you are using HTTPS listener with certificate uploaded, make sure the FQDN alias matches with the certificate's CN (Common Name) or SAN (Subject Alternative Name) otherwise HTTPS call will fail with SNI (Server Name Indication).
76-
> The Application Gateway subresource name comes from the Application Gateway Listener which can be deleted after creation. ***
84+
> The provided FQDNs must have at least three labels in the name to properly create the private DNS zone of thee private endpoint for Application Gateway.
85+
> The FQDNs field is editable after the private endpoint creation through SDK or CLI. The field is not editable in the Azure portal.
86+
> Dyname sub-resource naming is not supported for the private Frontend IP configuration. The Frontend IP name must be `appGwPrivateFrontendIpIPv4`.
7787
7888
### Configure using Python SDK and Azure CLI
7989

8090
To create a private endpoint to Application Gateway with SDK, see [Azure SDK for Python](/python/api/azure-ai-ml/azure.ai.ml.entities.privateendpointdestination).
8191

82-
To create a private endpoint to Application Gateway with the Azure CLI, see [Configure a managed network](configure-managed-network.md?tabs=azure-cli).
92+
To create a private endpoint to Application Gateway with the Azure CLI, use the `az ml workspace outbound-rule set` command. Set properties as needed for your configuration. For more information, see [Configure a managed network](configure-managed-network.md?tabs=azure-cli).
8393

8494
## Limitations
8595

@@ -88,6 +98,15 @@ To create a private endpoint to Application Gateway with the Azure CLI, see [Con
8898
- The Snowflake JDBC driver uses HTTPS calls, but different drivers might have different implementations. Check if your resource uses HTTP(S) protocol or not.
8999
- For more information on limitations, see [Frequently asked questions about Application Gateway](/azure/application-gateway/application-gateway-faq).
90100

101+
## Application Gateway Errors
102+
103+
For errors related to the Application Gateway connection to your backend resources, follow the existing Application Gateway documentation based on the errors you receive:
104+
105+
- [Troubleshoot backend health issues in Application Gateway](/azure/application-gateway/application-gateway-backend-health-troubleshooting)
106+
- [Troubleshooting bad gateway errors in Application Gateway](/azure/application-gateway/application-gateway-troubleshooting-502)
107+
- [HTTP response codes in Application Gateway](/azure/application-gateway/http-response-codes)
108+
- [Understanding disabled listeners](/azure/application-gateway/disabled-listeners)
109+
91110
## Related content
92111

93112
- [Managed virtual network isolation](configure-managed-network.md)

articles/machine-learning/how-to-access-on-premises-resources.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure an Azure Machine Learning's managed network
55
manager: scottpolly
66
ms.service: azure-machine-learning
77
ms.topic: how-to
8-
ms.date: 10/22/2024
8+
ms.date: 10/24/2024
99
ms.reviewer: meerakurup
1010
ms.author: larryfr
1111
author: Blackmist
@@ -30,7 +30,7 @@ To access on-premises or custom virtual network resources from the managed virtu
3030

3131
## Supported resources
3232

33-
Application Gateway supports any backend target resource that uses HTTP or HTTPS protocol. It's verified to support a private connection from the managed virtual network to:
33+
Application Gateway supports any backend target resource that uses HTTP or HTTPS protocol. Connections to the following resources from the managed virtual network are verified:
3434
- Jfrog Artifactory
3535
- Snowflake Database
3636
- Private APIs
@@ -58,13 +58,13 @@ Follow the [Quickstart: Direct web traffic using the portal](/azure/application-
5858

5959
- In the __Backend targets__ section, if you want to use HTTPS and Backend server’s certificate is NOT issued by a well-known CA, you must upload the Root certificate (.CER) of the backend server. For more on configuring with a root certificate, see [Configure end-to-end TLS encryption using the portal](/azure/application-gateway/end-to-end-ssl-portal).
6060

61-
1. Once the Application Gateway resource is created, navigate to the new Application Gateway resource in the Azure portal. Under __Settings__, select, __Private link__ to enable the a virtual network to privately access the Application Gateway through a private endpoint connection. The Private link configuration is not created by default.
61+
1. Once the Application Gateway resource is created, navigate to the new Application Gateway resource in the Azure portal. Under __Settings__, select, __Private link__ to enable a virtual network to privately access the Application Gateway through a private endpoint connection. The Private link configuration isn't created by default.
6262

6363
- Select __+ Add__ to add the Private Link configuration, and then use the following values to create the configuration:
6464
- Name: Provide a name for your private link configuration
6565
- Private link subnet: Select a subnet in your virtual network.
6666
- Frontend IP Configuration: `appGwPrivateFrontendIpIPv4`
67-
- To verify the Private link is set up correctly, navigate to the __Private endpoint connections__ tab and select __+ Private endpoint__. On the __Resource__ tab, the __Target sub-resource__ should be the name of your private Frontend IP configuration, `appGwPrivateFrontendIpIPv4`. If no value appears in the __Target sub-resource__ then the Application Gateway listener was not configured correctly.
67+
- To verify the Private link is set up correctly, navigate to the __Private endpoint connections__ tab and select __+ Private endpoint__. On the __Resource__ tab, the __Target sub-resource__ should be the name of your private Frontend IP configuration, `appGwPrivateFrontendIpIPv4`. If no value appears in the Target sub-resource,__ then the Application Gateway listener wasn't configured correctly.
6868

6969
## Configure private link
7070

@@ -89,7 +89,7 @@ Follow the [Quickstart: Direct web traffic using the portal](/azure/application-
8989

9090
To create a private endpoint to Application Gateway with SDK, see [Azure SDK for Python](/python/api/azure-ai-ml/azure.ai.ml.entities.privateendpointdestination).
9191

92-
To create a private endpoint to Application Gateway with the Azure CLI, use the `az ml workspace outbound-rule set` command. Set additional properties as needed for your configuration. For more information, see [Configure a managed network](how-to-managed-network.md?tabs=azure-cli).
92+
To create a private endpoint to Application Gateway with the Azure CLI, use the `az ml workspace outbound-rule set` command. Set properties as needed for your configuration. For more information, see [Configure a managed network](how-to-managed-network.md?tabs=azure-cli).
9393

9494
## Limitations
9595

0 commit comments

Comments
 (0)