Skip to content

Commit 03db683

Browse files
Merge pull request #261525 from ssalgadodev/patch-48
Update how-to-network-isolation-model-catalog.md
2 parents 877cc4c + 8c21a2a commit 03db683

File tree

1 file changed

+16
-8
lines changed

1 file changed

+16
-8
lines changed

articles/machine-learning/how-to-network-isolation-model-catalog.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ ms.date: 12/15/2023
1414

1515
# Use Model Catalog collections with workspace managed virtual network
1616

17-
In this article, you learn how you can use the various collections in the Model Catalog within an isolated network.
17+
In this article, you learn how to use the various collections in the Model Catalog within an isolated network.
1818

19-
Workspace [managed virtual network](./how-to-network-isolation-planning.md) is the recommended way to support network isolation with the Model Catalog. It provides easily configuration to secure your workspace. After you enable managed virtual network in the workspace level, resources related to workspace in the same virtual network, will use the same network setting in the workspace level. You can also configure the workspace to use private endpoint to access other Azure resources such as Azure OpenAI. Furthermore, you can configure FQDN rule to approve outbound to non-Azure resources, whose relevance you learn in the rest of this article. See [how to Workspace managed network isolation](./how-to-managed-network.md) to enable workspace managed virtual network.
19+
Workspace [managed virtual network](./how-to-network-isolation-planning.md) is the recommended way to support network isolation with the Model Catalog. It provides easily configuration to secure your workspace. After you enable managed virtual network in the workspace level, resources related to workspace in the same virtual network, will use the same network setting in the workspace level. You can also configure the workspace to use private endpoint to access other Azure resources such as Azure OpenAI. Furthermore, you can configure FQDN rule to approve outbound to non-Azure resources, which is required to use some of the collections in the Model Catalog. See [how to Workspace managed network isolation](./how-to-managed-network.md) to enable workspace managed virtual network.
2020

2121
The creation of the managed virtual network is deferred until a compute resource is created or provisioning is manually started. You can use following command to manually trigger network provisioning.
2222
```bash
@@ -36,21 +36,25 @@ az ml workspace provision-network --subscription <sub_id> -g <resource_group_nam
3636
* [ExpressRoute](https://azure.microsoft.com/products/expressroute/) - Connects on-premises networks into the cloud over a private connection. Connection is made using a connectivity provider.
3737

3838
* [Azure Bastion](/azure/bastion/bastion-overview) - In this scenario, you create an Azure Virtual Machine (sometimes called a jump box) inside the virtual network. You then connect to the VM using Azure Bastion. Bastion allows you to connect to the VM using either an RDP or SSH session from your local web browser. You then use the jump box as your development environment. Since it is inside the virtual network, it can directly access the workspace.
39-
3. Since the workspace managed virtual network can access internet in this configuration, you can work with all the Collections in the Model Catalog from within the workspace.
4039

41-
## Workspace managed virtual network to allow only approved outbound
40+
Since the workspace managed virtual network can access internet in this configuration, you can work with all the Collections in the Model Catalog from within the workspace.
4241

43-
1. Configure a workspace with managed virtual network to allow only approved outbound by following the steps listed [here](./how-to-managed-network.md#configure-a-managed-virtual-network-to-allow-only-approved-outbound).
44-
2. If you choose to set the public network access to the workspace to disabled, you can connect to the workspace using one of the methods as listed in Scenario 1.
42+
## Workspace managed virtual network to allow only approved outbound
4543

44+
1. Configure a workspace by following [Workspace managed network isolation](./how-to-managed-network.md#configure-a-managed-virtual-network-to-allow-only-approved-outbound). In step 3 of the tutorial when selecting **Workspace managed outbound access**, select **Allow Only Approved Outbound**.
45+
2. If you set the public network access to the workspace to disabled, you can connect to the workspace using one of the methods as listed [in step 2 of the allow internet outbound section of this tutorial](#workspace-managed-virtual-network-to-allow-internet-outbound).
46+
3. The workspace manages virtual network is set to an allow only configuration. You must add a corresponding user-defined outbound rule to allow all the relevant FQDNs.
47+
1. Follow this link for a list of FQDNs required for the [Curated by Azure AI collection](#language-models-in-curated-by-azure-ai-collection).
48+
2. Follow this link for a list of FQDNs required for the [Hugging Face collection](#work-with-hugging-face-collection).
4649

4750
## Work with open source models curated by Azure Machine Learning
4851

49-
Workspace managed virtual network to allow only approved outbound uses a Service Endpoint Policy to Azure Machine Learning managed storage accounts, to help access the models in the collections curated by Azure Machine Learning in an out-of-the-box manner. This mode of workspace configuration also has default outbound to Microsoft Container Registry where the docker image used to deploy the models is present.
52+
Workspace managed virtual network to allow only approved outbound uses a Service Endpoint Policy to Azure Machine Learning managed storage accounts, to help access the models in the collections curated by Azure Machine Learning in an out-of-the-box manner. This mode of workspace configuration also has default outbound to the Microsoft Container Registry that contains the docker image used to deploy the models.
5053

5154
### Language models in 'Curated by Azure AI' collection
5255

53-
Today, these models involve dynamic installation of dependencies at runtime. Therefore, users should add user defined outbound rules for the following FQDNs at the workspace level:
56+
These models involve dynamic installation of dependencies at runtime. To add a user defined outbound rule, follow step four of
57+
To use the Curated by Azure AI collection, users should add user defined outbound rules for the following FQDNs at the workspace level:
5458

5559
* `*.anaconda.org`
5660
* `*.anaconda.com`
@@ -60,6 +64,8 @@ Today, these models involve dynamic installation of dependencies at runtime. The
6064
* `*.pytorch.org`
6165
* `pytorch.org`
6266

67+
Follow Step 4 in the [managed virtual network tutorial](./how-to-managed-network.md#configure-a-managed-virtual-network-to-allow-only-approved-outbound) to add the corresponding user-defined outbound rules.
68+
6369
> [!WARNING]
6470
> FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](./how-to-managed-network.md#pricing).
6571
@@ -81,6 +87,8 @@ Users need to add the following outbound FQDNs rules for Hugging Face Hub, Docke
8187
* `cdn-lfs.huggingface.co`
8288
* `cdn.auth0.com`
8389

90+
Follow Step 4 in the [managed virtual network tutorial](./how-to-managed-network.md#configure-a-managed-virtual-network-to-allow-only-approved-outbound) to add the corresponding user-defined outbound rules.
91+
8492
## Next steps
8593

8694
* Learn how-to [troubleshoot managed virtual network](./how-to-troubleshoot-managed-network.md)

0 commit comments

Comments
 (0)