Skip to content

Commit f3c5e3a

Browse files
committed
writing
1 parent ebc29e9 commit f3c5e3a

File tree

1 file changed

+37
-15
lines changed

1 file changed

+37
-15
lines changed

articles/machine-learning/concept-network-isolation-configurations.md

Lines changed: 37 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -17,37 +17,59 @@ ms.date: 09/19/2024
1717

1818
For your workspaces, Azure Machine Learning offers two types of outbound network isolation configurations: managed network isolation and custom network isolation. Both offer full network isolation support with its benefits and limitations. This document covers feature support and limitations on both network isolation configurations for you to decide what is best for your needs.
1919

20-
Managed network isolation relies on managed virtual networks, which is a fully managed feature of Azure Machine Learning. Managed network isolation is ideal for users who want to use Azure Machine Learning with minimal configuration and management overhead. Custom network isolation relies on you creating and managing an Azure Virtual Network, which is ideal for customers looking for maximal control over their network configuration.
21-
2220
## Enterprise security needs
2321

24-
Cloud computing enables enterprises to scale up their data and machine learning capabilities, but it also poses new challenges and risks for security and compliance. Enterprises need to ensure that their cloud infrastructure is protected from unauthorized access, tampering, or leakage of data and models. They also need to adhere to the regulations and standards that apply to their industry and domain.
22+
Cloud computing enables you to scale up your data and machine learning capabilities, but it also poses new challenges and risks for security and compliance. You need to ensure that your cloud infrastructure is protected from unauthorized access, tampering, or leakage of data and models. You might also need to adhere to the regulations and standards that apply to your industry and domain.
2523

2624
Typical Enterprise requirements include:
2725

28-
- Use network isolation boundary with virtual network to have inbound and outbound control and to have private connection to private azure resources.
26+
- Use network isolation boundary with virtual network to have inbound and outbound control and to have private connection to private Azure resources.
2927
- Avoid exposure to the internet with no public IP solutions and private endpoints.
3028
- Use virtual network appliances to have better network security capabilities such as firewalling, intrusion detection, vulnerability management, web filtering.
31-
- Network architecture for AzureML can be integrated with existing network architecture.
29+
- Network architecture for Azure Machine Learning can be integrated with existing network architecture.
30+
31+
## What are managed and custom network isolation configurations?
3232

33-
## What is a managed or custom virtual network
33+
__Managed network isolation__ relies on managed virtual networks, which is a fully managed feature of Azure Machine Learning. Managed network isolation is ideal if you want to use Azure Machine Learning with minimal configuration and management overhead.
3434

35-
[Describe a main idea.]
35+
__Custom network isolation__ relies on you creating and managing an Azure Virtual Network. This configuration is ideal if you're looking for maximal control over your network configuration.
3636

3737
## When to use managed or custom virtual networks
3838

39-
[Describe a main idea.]
39+
Use managed virtual network when…
40+
- You're new user to Azure Machine Learning with standard network isolation requirements
41+
- You're a company with standard network isolation requirements
42+
- You require on-premises access to resources with HTTP(s) endpoints
43+
- You don't have many non-Azure dependencies set up yet
44+
- You require using Azure Machine Learning managed online endpoints and serverless spark computes
45+
- You have fewer management requirements for networking in your organization
4046

41-
<!-- Required: Main ideas - H2
47+
Use custom virtual network when…
48+
- You're a company with heavy network isolation requirements
49+
- You have many non-Azure dependencies previously set-up and need to access Azure Machine Learning
50+
- You have on-premises databases with no HTTP(s) endpoints
51+
- You require using your own Firewall and virtual network logging and monitoring of outbound network traffic
52+
- You want to use Azure Kubernetes Services (AKS) for inference workloads
4253

43-
Use one or more H2 sections to describe the main ideas
44-
of the concept.
54+
The following table provides a comparison of the benefits and limitations of managed and custom virtual networks:
4555

46-
Follow each H2 heading with a sentence about how
47-
the section contributes to the whole. Then, describe
48-
the concept's critical features as you define what it is.
56+
| | Custom virtual network | Managed virtual network |
57+
| --- | --- | --- |
58+
| __Benefits__ | - You can tailor networking to your existing set-up</br>- Bring your own non-Azure resources with Azure Machine Learning</br>- Connect to on-premises resources | - Minimize set-up and maintenance overhead</br>- Supports managed online endpoints</br>- Supports serverless spark</br>- Gets new features first |
59+
| __Limitations__ | - New feature support might be delayed</br>- Managed online endpoints NOT supported</br>- Serverless spark NOT supported</br>- Foundational models NOT supported</br>- No code MLFlow NOT supported</br>- Implementation complexity</br>- Maintenance overhead | - Cost implications of the Azure Firewall and FQDN rules</br>- Logging of the virtual network, firewall, and NSG rules NOT supported</br>- Access to non-HTTP(s) endpoint resources NOT supported |
4960

50-
-->
61+
### Custom virtual network limitations
62+
63+
- __New features support might be delayed__: Efforts for improving our network isolation offerings are focused on managed instead of custom virtual network. Therefore, new feature asks are prioritized on managed over custom virtual network.
64+
- __Managed online endpoints isn't supported__: Managed online endpoints don't support custom virtual network. Workspace managed virtual network must be enabled to secure your managed online endpoints. You can secure managed online endpoints with legacy network isolation method. But, we strongly recommend that you use workspace managed network isolation. For more information, visit [Managed online endpoints](concept-online-endpoints.md).
65+
- __Serverless spark compute isn't supported__: Serverless Spark computes aren't supported in a custom virtual network. Workspace managed virtual network supports Serverless Spark because Azure Synapse only uses managed virtual network set-up. For more information, visit [Configured Serverless Spark](apache-spark-azure-ml-concepts.md#serverless-spark-compute).
66+
- __Implementation complexity and maintenance overhead__: With custom virtual network set-up, all the complexity of setting up a virtual network, subnet, private endpoints, and more falls on the user. Maintenance of the network and computes fall on the user.
67+
68+
### Managed virtual network limitations
69+
70+
- __Cost implications with Azure Firewall and FQDN rules__: An Azure Firewall is provisioned on behalf of the user only when a user-defined FQDN outbound rule is created. The Azure Firewall is the Standard SKU Firewall and incurs costs that are added to your billing. For more information, visit [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall).
71+
- __Logging and monitoring of managed virtual network NOT supported__: The managed virtual network doesn't support virtual network flow, NSG flow, or Firewall logs. This limitation is because the managed virtual network is deployed in a Microsoft tenant and can't be sent to your subscription.
72+
- __Access to non-Azure, non-HTTP(S) resources isn't supported__: The managed virtual network doesn't allow for access to non-Azure, non-HTTP(S) resources. To access HTTP(s) resources on-premises, private support through Azure Application Gateway is supported. For more information on Application Gateway set-up for on-premises access, visit [Configure Outbound Access to non-Azure Resources].
5173

5274
## Related content
5375

0 commit comments

Comments
 (0)