You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Multiple doc updates due to IcMs in recent days.
* Allowlist microsoft managed PEs
* deletion without locks
* service tag description and table
* Reader role on PE from custom vnet to storage
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-managed-network.md
+21-17Lines changed: 21 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,6 +70,8 @@ If you want to use the integrated notebook or create datasets in the default sto
70
70
71
71
Part of Azure Machine Learning studio runs locally in the client's web browser, and communicates directly with the default storage for the workspace. Creating a private endpoint or service endpoint (for the default storage account) in the client's virtual network ensures that the client can communicate with the storage account.
72
72
73
+
If the workspace associated Azure storage account has public network access disabled, ensure the private endpoint created in the client virtual network is granted the Reader role to your workspace managed identity. This applies to both blog and file storage private endpoints. The role is not required for the private endpoint created by the managed virtual network.
74
+
73
75
For more information on creating a private endpoint or service endpoint, see the [Connect privately to a storage account](/azure/storage/common/storage-private-endpoints) and [Service Endpoints](/azure/virtual-network/virtual-network-service-endpoints-overview) articles.
> These rules are automatically added to the managed VNet.
998
-
999
998
__Private endpoints__:
1000
999
* When the isolation mode for the managed virtual network is `Allow internet outbound`, private endpoint outbound rules are automatically created as required rules from the managed virtual network for the workspace and associated resources __with public network access disabled__ (Key Vault, Storage Account, Container Registry, Azure Machine Learning workspace).
1001
1000
* When the isolation mode for the managed virtual network is `Allow only approved outbound`, private endpoint outbound rules are automatically created as required rules from the managed virtual network for the workspace and associated resources __regardless of public network access mode for those resources__ (Key Vault, Storage Account, Container Registry, Azure Machine Learning workspace).
1001
+
* These rules are automatically added to the managed virtual network.
1002
+
1003
+
For Azure Machine Learning to run normally, there are a set of required service tags, required in either a managed or custom virtual network set-up. There are no alternatives to replacing certain required service tags. Below is a table of each required service tag and its purpose within Azure Machine Learning.
1004
+
1005
+
| Service tag rule | Inbound or Outbound | Purpose |
1006
+
| ----------- | ----- | ----- |
1007
+
| `AzureMachineLearning` | Inbound | Create, update, and delete of Azure Machine Learning compute instance/cluster. |
1008
+
| `AzureMachineLearning`| Outbound | Using Azure Machine Learning services. Python intellisense in notebooks uses port 18881. Creating, updating, and deleting an Azure Machine Learning compute instance uses port 5831. |
1009
+
| `AzureActiveDirectory` | Outbound | Authentication using Microsoft Entra ID. |
1010
+
| `BatchNodeManagement.region` | Outbound | Communication with Azure Batch back-end for Azure Machine Learning compute instances/clusters. |
1011
+
| `AzureResourceManager` | Outbound | Creation of Azure resources with Azure Machine Learning, Azure CLI, and Azure Machine Learning SDK. |
| `MicrosoftContainerRegistry` | Outbound | Access docker images provided by Microsoft. Setup of the Azure Machine Learning router for Azure Kubernetes Service. |
1014
+
| `AzureMonitor` | Outbound | Used to log monitoring and metrics to Azure Monitor. Only needed if you haven't secured Azure Monitor for the workspace. This outbound is also used to log information for support incidents. |
1015
+
| `VirtualNetwork` | Outbound | Required when private endpoints are present in the virtual network or peered virtual networks. |
1002
1016
1003
-
__Outbound__ service tag rules:
1004
-
1005
-
* `AzureActiveDirectory`
1006
-
* `AzureMachineLearning`
1007
-
* `BatchNodeManagement.region`
1008
-
* `AzureResourceManager`
1009
-
* `AzureFrontDoor.FirstParty`
1010
-
* `MicrosoftContainerRegistry`
1011
-
* `AzureMonitor`
1012
-
1013
-
__Inbound__ service tag rules:
1014
-
* `AzureMachineLearning`
1017
+
> [!NOTE]
1018
+
> Service tags as the ONLY security boundary is not sufficient. For tenant level isolation, use private endpoints when possible.
1015
1019
1016
1020
## List of scenario specific outbound rules
1017
1021
@@ -1172,10 +1176,9 @@ The Azure Machine Learning managed virtual network feature is free. However, you
1172
1176
1173
1177
## Limitations
1174
1178
1175
-
* Azure AI Foundry doesn't support using your own Azure Virtual Network to secure the hub, project, or compute resources. You can only use the managed network feature to secure these resources.
1176
1179
* Once you enable managed virtual network isolation of your workspace (either allow internet outbound or allow only approved outbound), you can't disable it.
1177
1180
* Managed virtual network uses private endpoint connection to access your private resources. You can't have a private endpoint and a service endpoint at the same time for your Azure resources, such as a storage account. We recommend using private endpoints in all scenarios.
1178
-
* The managed virtual network is deleted when the workspace is deleted.
1181
+
* The managed virtual network is deleted when the workspace is deleted. When deleting Azure Machine Learning resources in your Azure subscription, disable any resource locks or locks which prevent deletion of resources you created, or were created by Microsoft for the managed virtual network.
1179
1182
* Data exfiltration protection is automatically enabled for the only approved outbound mode. If you add other outbound rules, such as to FQDNs, Microsoft can't guarantee that you're protected from data exfiltration to those outbound destinations.
1180
1183
* Creating a compute cluster in a different region than the workspace isn't supported when using a managed virtual network.
1181
1184
* Kubernetes and attached VMs aren't supported in an Azure Machine Learning managed virtual network.
@@ -1186,6 +1189,7 @@ The Azure Machine Learning managed virtual network feature is free. However, you
1186
1189
* Managed network isolation can't establish a private connection from the managed virtual network to a user's on-premises resources.
1187
1190
For the list of supported private connections, see [Private Endpoints](/azure/machine-learning/how-to-managed-network?view=azureml-api-2&tabs=azure-cli&preserve-view=true#private-endpoints).
1188
1191
* If your managed network is configured to __allow only approved outbound__, you can't use an FQDN rule to access Azure Storage Accounts. You must use a private endpoint instead.
1192
+
* Ensure to allowlist Microsoft-managed private endpoints created for the managed virtual network in your custom policy.
0 commit comments