Skip to content

Commit 15df7e6

Browse files
authored
Merge pull request #173187 from Blackmist/public-workspace-storage-ip
Adding new scenario
2 parents 11bab4c + 3cb3c74 commit 15df7e6

File tree

1 file changed

+29
-7
lines changed

1 file changed

+29
-7
lines changed

articles/machine-learning/how-to-network-security-overview.md

Lines changed: 29 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -45,14 +45,16 @@ The following table compares how services access different parts of an Azure Mac
4545
| Scenario | Workspace | Associated resources | Training compute environment | Inferencing compute environment |
4646
|-|-|-|-|-|-|
4747
|**No virtual network**| Public IP | Public IP | Public IP | Public IP |
48-
|**Secure resources in a virtual network**| Private IP (private endpoint) | Public IP (service endpoint) <br> **- or -** <br> Private IP (private endpoint) | Public IP | Private IP |
48+
|**Public workspace, all other resources in a virtual network** | Public IP | Public IP (service endpoint) <br> **- or -** <br> Private IP (private endpoint) | Private IP | Private IP |
49+
|**Secure resources in a virtual network**| Private IP (private endpoint) | Public IP (service endpoint) <br> **- or -** <br> Private IP (private endpoint) | Private IP | Private IP |
4950

5051
* **Workspace** - Create a private endpoint for your workspace. The private endpoint connects the workspace to the vnet through several private IP addresses.
52+
* **Public access** - You can optionally enable public access for a secured workspace.
5153
* **Associated resource** - Use service endpoints or private endpoints to connect to workspace resources like Azure storage, Azure Key Vault. For Azure Container Services, use a private endpoint.
5254
* **Service endpoints** provide the identity of your virtual network to the Azure service. Once you enable service endpoints in your virtual network, you can add a virtual network rule to secure the Azure service resources to your virtual network. Service endpoints use public IP addresses.
5355
* **Private endpoints** are network interfaces that securely connect you to a service powered by Azure Private Link. Private endpoint uses a private IP address from your VNet, effectively bringing the service into your VNet.
54-
* **Training compute access** - Access training compute targets like Azure Machine Learning Compute Instance and Azure Machine Learning Compute Clusters securely with public IP addresses.
55-
* **Inferencing compute access** - Access Azure Kubernetes Services (AKS) compute clusters with private IP addresses.
56+
* **Training compute access** - Access training compute targets like Azure Machine Learning Compute Instance and Azure Machine Learning Compute Clusters with public IP addresses (preview).
57+
* **Inference compute access** - Access Azure Kubernetes Services (AKS) compute clusters with private IP addresses.
5658

5759

5860
The next sections show you how to secure the network scenario described above. To secure your network, you must:
@@ -62,11 +64,31 @@ The next sections show you how to secure the network scenario described above. T
6264
1. Secure the [**inferencing environment**](#secure-the-inferencing-environment).
6365
1. Optionally: [**enable studio functionality**](#optional-enable-studio-functionality).
6466
1. Configure [**firewall settings**](#configure-firewall-settings).
65-
1. Configure [DNS name resolution](#custom-dns).
67+
1. Configure [**DNS name resolution**](#custom-dns).
68+
69+
## Public workspace and secured resources
70+
71+
If you want to access the workspace over the public internet while keeping all the associated resources secured in a virtual network, use the following steps:
72+
73+
1. Create an [Azure Virtual Networks](../virtual-network/virtual-networks-overview.md) that will contain the resources used by the workspace.
74+
1. Use __one__ of the following options to create a publicly accessible workspace:
75+
76+
* Create an Azure Machine Learning workspace that __does not__ use the virtual network. For more information, see [Manage Azure Machine Learning workspaces](how-to-manage-workspace.md).
77+
* Create a [Private Link-enabled workspace](how-to-secure-workspace-vnet.md#secure-the-workspace-with-private-endpoint) to enable communication between your VNet and workspace. Then [enable public access to the workspace](#optional-enable-public-access).
78+
79+
1. Add the following services to the virtual network by using _either_ a __service endpoint__ or a __private endpoint__. Also allow trusted Microsoft services to access these services:
80+
81+
| Service | Endpoint information | Allow trusted information |
82+
| ----- | ----- | ----- |
83+
| __Azure Key Vault__| [Service endpoint](../key-vault/general/overview-vnet-service-endpoints.md)</br>[Private endpoint](../key-vault/general/private-link-service.md) | [Allow trusted Microsoft services to bypass this firewall](how-to-secure-workspace-vnet.md#secure-azure-key-vault) |
84+
| __Azure Storage Account__ | [Service and private endpoint](how-to-secure-workspace-vnet.md?tabs=se#secure-azure-storage-accounts)</br>[Private endpoint](how-to-secure-workspace-vnet.md?tabs=pe#secure-azure-storage-accounts) | [Grant access to trusted Azure services](../storage/common/storage-network-security.md#grant-access-to-trusted-azure-services) |
85+
| __Azure Container Registry__ | [Private endpoint](../container-registry/container-registry-private-link.md) | [Allow trusted services](../container-registry/allow-access-trusted-services.md) |
86+
6687
## Secure the workspace and associated resources
6788

6889
Use the following steps to secure your workspace and associated resources. These steps allow your services to communicate in the virtual network.
6990

91+
1. Create an [Azure Virtual Networks](../virtual-network/virtual-networks-overview.md) that will contain the workspace and other resources.
7092
1. Create a [Private Link-enabled workspace](how-to-secure-workspace-vnet.md#secure-the-workspace-with-private-endpoint) to enable communication between your VNet and workspace.
7193
1. Add the following services to the virtual network by using _either_ a __service endpoint__ or a __private endpoint__. Also allow trusted Microsoft services to access these services:
7294

@@ -142,11 +164,11 @@ The following network diagram shows a secured Azure Machine Learning workspace w
142164

143165
You can secure the workspace behind a VNet using a private endpoint and still allow access over the public internet. The initial configuration is the same as [securing the workspace and associated resources](#secure-the-workspace-and-associated-resources).
144166

145-
After securing the workspace with a private endpoint, you then [Enable public access](how-to-configure-private-link.md#enable-public-access). After this, you can access the workspace from both the public internet and the VNet.
167+
After securing the workspace with a private endpoint, use the following steps to enable clients to develop remotely using either the SDK or Azure Machine Learning studio:
146168

147-
### Limitations
169+
1. [Enable public access](how-to-configure-private-link.md#enable-public-access) to the workspace.
170+
1. [Configure the Azure Storage firewall](/azure/storage/common/storage-network-security?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json#grant-access-from-an-internet-ip-range) to allow communication with the IP address of clients that connect over the public internet.
148171

149-
- If you use Azure Machine Learning studio over the public internet, some features such as the designer may fail to access your data. This happens when the data is stored on a service that is secured behind the VNet. For example, an Azure Storage Account.
150172
## Optional: enable studio functionality
151173

152174
[Secure the workspace](#secure-the-workspace-and-associated-resources) > [Secure the training environment](#secure-the-training-environment) > [Secure the inferencing environment](#secure-the-inferencing-environment) > **Enable studio functionality** > [Configure firewall settings](#configure-firewall-settings)

0 commit comments

Comments
 (0)