Skip to content

Commit 0ba2f9d

Browse files
author
Larry Franks
committed
adding note
1 parent c79254d commit 0ba2f9d

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

articles/machine-learning/how-to-secure-training-vnet.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,11 @@ In this article you learn how to secure the following training compute resources
8484

8585
* One network security group (NSG). This NSG contains the following rules, which are specific to compute cluster and compute instance:
8686

87+
> [!IMPORTANT]
88+
> Azure Machine Learning compute cluster and instance rely on Azure Batch. In addition to the subnet level NSGs, NSGs are also created at the network interface (NIC) level. When evaluating network traffic, it is evaluated against *union* of subnet and NIC level NSG.
89+
>
90+
> Use caution when modifying these NSGs, as it is possible to break communication between the cluster/instance and Azure Batch. For more information, see [Network security groups: Batch default](/azure/batch/batch-virtual-network#network-security-groups-batch-default).
91+
8792
* Allow inbound TCP traffic on ports 29876-29877 from the `BatchNodeManagement` service tag.
8893
* Allow inbound TCP traffic on port 44224 from the `AzureMachineLearning` service tag.
8994

0 commit comments

Comments
 (0)