Skip to content

Commit f4ef9df

Browse files
authored
Merge pull request #1605 from Blackmist/ip-filter-rollback
Ip filter rollback
2 parents 2b848c0 + a39b9ab commit f4ef9df

File tree

2 files changed

+1
-76
lines changed

2 files changed

+1
-76
lines changed

articles/ai-studio/how-to/configure-managed-network.md

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: scottpolly
66
ms.service: azure-ai-studio
77
ms.custom: ignite-2023, build-2024, devx-track-azurecli
88
ms.topic: how-to
9-
ms.date: 5/21/2024
9+
ms.date: 11/19/2024
1010
ms.reviewer: meerakurup
1111
ms.author: larryfr
1212
author: Blackmist
@@ -817,18 +817,6 @@ pypi.org
817817
*.pytorch.org
818818
pytorch.org
819819

820-
### Scenario: Enable access from selected IP Addresses
821-
822-
If you want to enable access from specific IP addresses, use the following actions:
823-
824-
1. Enable public network access to the Azure AI Studio Hub. For more information, see [public network access enabled](configure-private-link.md#enable-public-access).
825-
1. Add your IP addresses to the firewall for Azure AI Studio. For more information, see [enable access only from IP ranges](configure-private-link.md#enable-public-access-only-from-internet-ip-ranges).
826-
827-
> [!NOTE]
828-
> Only IPv4 addresses are supported.
829-
830-
For more information, see [Configure private link](configure-private-link.md#enable-public-access-only-from-internet-ip-ranges).
831-
832820
## Private endpoints
833821

834822
Private endpoints are currently supported for the following Azure services:

articles/ai-studio/how-to/configure-private-link.md

Lines changed: 0 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -234,69 +234,6 @@ az extension add --name ml
234234

235235
---
236236

237-
## Enable Public Access only from internet IP ranges
238-
239-
You can use IP network rules to allow access to your AI Studio hub and projects from specific public internet IP address ranges by creating IP network rules. Each Azure AI Studio hub supports up to 200 rules. These rules grant access to specific internet-based services and on-premises networks and block general internet traffic.
240-
241-
> [!WARNING]
242-
> * You can only use IPv4 addresses.
243-
> * To use this feature with Azure Machine Learning managed virtual network, see [Configure managed virtual network](configure-managed-network.md#scenario-enable-access-from-selected-ip-addresses).
244-
> * If you are using serverless endpoints, your public network access is either enabled or disabled depending on the setting of your hub's public network access. For more information, visit [Serverless API endpoints](deploy-models-serverless.md#network-isolation).
245-
246-
# [Portal](#tab/azure-portal)
247-
248-
1. From the [Azure portal](https://portal.azure.com), select your Azure AI Studio hub.
249-
1. From the left side of the page, select __Networking__ and then select the __Public access__ tab.
250-
1. Select __Enabled from selected IP addresses__, input address ranges and then select __Save__.
251-
252-
:::image type="content" source="../media/how-to/network/workspace-public-access-ip-ranges.png" alt-text="Screenshot of the UI to enable access from internet IP ranges.":::
253-
254-
# [Azure CLI](#tab/cli)
255-
256-
Use the `az ml workspace network-rule` Azure CLI command to manage public access from an IP address or address range:
257-
258-
> [!TIP]
259-
> The configurations for the selected IP addresses are stored in the workspace's properties, under `network_acls`:
260-
> ```yml
261-
> properties:
262-
> # ...
263-
> network_acls:
264-
> description: "The network ACLS for this workspace, enforced when public_network_access is set to Enabled."
265-
> $ref: "3/defintions/networkAcls"
266-
> ```
267-
268-
- __List IP network rules__: `az ml workspace network-rule list --resource-group "myresourcegroup" --workspace-name "myWS" --query ipRules`
269-
- __Add a rule for a single IP address__: `az ml workspace network-rule add --resource-group "myresourcegroup" --workspace-name "myWS" --ip-address "16.17.18.19"`
270-
- __Add a rule for an IP address range__: `az ml workspace network-rule add --resource-group "myresourcegroup" --workspace-name "myWS" --ip-address "16.17.18.0/24"`
271-
- __Remove a rule for a single IP address__: `az ml workspace network-rule remove --resource-group "myresourcegroup" --workspace-name "myWS" --ip-address "16.17.18.19"`
272-
- __Remove a rule for an IP address range__: `az ml workspace network-rule remove --resource-group "myresourcegroup" --workspace-name "myWS" --ip-address "16.17.18.0/24"`
273-
274-
---
275-
276-
You can also use the [Workspace](/python/api/azure-ai-ml/azure.ai.ml.entities.workspace) class from the Azure Machine Learning [Python SDK](/python/api/overview/azure/ai-ml-readme) to define which IP addresses are allowed inbound access:
277-
278-
```python
279-
Workspace(
280-
public_network_access = "Enabled",
281-
network_rule_set = NetworkRuleSet(default_action = "Allow", bypass = "AzureServices", resource_access_rules = None, ip_rules = yourIPAddress,)
282-
```
283-
284-
### Restrictions for IP network rules
285-
286-
The following restrictions apply to IP address ranges:
287-
288-
- IP network rules are allowed only for _public internet_ IP addresses.
289-
290-
[Reserved IP address ranges](https://en.wikipedia.org/wiki/Reserved_IP_addresses) aren't allowed in IP rules such as private addresses that start with 10, 172.16 to 172.31, and 192.168.
291-
292-
- You must provide allowed internet address ranges by using [CIDR notation](https://tools.ietf.org/html/rfc4632) in the form 16.17.18.0/24 or as individual IP addresses like 16.17.18.19.
293-
294-
- Only IPv4 addresses are supported for configuration of storage firewall rules.
295-
296-
- When this feature is enabled, you can test public endpoints using any client tool such as Curl, but the Endpoint Test tool in the portal isn't supported.
297-
298-
- You can only set the IP addresses for the workspace after the workspace has been created.
299-
300237
## Managed identity configuration
301238

302239
A manged identity configuration is required if you make your storage account private. Our services need to read/write data in your private storage account using [Allow Azure services on the trusted services list to access this storage account](/azure/storage/common/storage-network-security#grant-access-to-trusted-azure-services) with following managed identity configurations. Enable the system assigned managed identity of Azure AI Service and Azure AI Search, then configure role-based access control for each managed identity.

0 commit comments

Comments
 (0)