You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-secure-training-vnet.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,7 +100,7 @@ In this article you learn how to secure the following training compute resources
100
100
> If you have been using compute instances or compute clusters configured for no public IP without opting-in to the preview, you will need to delete and recreate them after January 20 (when the feature is generally available).
101
101
>
102
102
> If you were previously using the preview of no public IP, you may also need to modify what traffic you allow inbound and outbound, as the requirements have changed for general availability:
103
-
> * Outbound requirements - Two additional outbounds:
103
+
> * Outbound requirements - Two additional outbound, which are only used for the management of compute instances and clusters. The destination of these service tags are owned by Microsoft:
104
104
> -`AzureMachineLearning` service tag on UDP port 5831.
105
105
> -`BatchNodeManagement` service tag on TCP port 443.
Copy file name to clipboardExpand all lines: articles/machine-learning/v1/how-to-secure-training-vnet.md
+43Lines changed: 43 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,6 +106,49 @@ For more information on using Azure Databricks in a virtual network, see [Deploy
106
106
107
107
## Compute instance/cluster with no public IP
108
108
109
+
> [!IMPORTANT]
110
+
> If you have been using compute instances or compute clusters configured for no public IP without opting-in to the preview, you will need to delete and recreate them after January 20 (when the feature is generally available).
111
+
>
112
+
> If you were previously using the preview of no public IP, you may also need to modify what traffic you allow inbound and outbound, as the requirements have changed for general availability:
113
+
> * Outbound requirements - Two additional outbound, which are only used for the management of compute instances and clusters. The destination of these service tags are owned by Microsoft:
114
+
> -`AzureMachineLearning` service tag on UDP port 5831.
115
+
> -`BatchNodeManagement` service tag on TCP port 443.
116
+
117
+
The following configurations are in addition to those listed in the [Prerequisites](#prerequisites) section, and are specific to **creating** a compute instances/clusters configured for no public IP:
118
+
119
+
+ Your workspace must use a private endpoint to connect to the VNet. For more information, see [Configure a private endpoint for Azure Machine Learning workspace](how-to-configure-private-link.md).
120
+
121
+
+ In your VNet, allow **outbound** traffic to the following service tags or fully qualified domain names (FQDN):
122
+
123
+
| Service tag | Protocol | Port | Notes |
124
+
| ----- |:-----:|:-----:| ----- |
125
+
|`AzureMachineLearning`| TCP<br>UDP | 443/8787/18881<br>5831 | Communication with the Azure Machine Learning service.|
126
+
|`BatchNodeManagement.<region>`| ANY | 443| Replace `<region>` with the Azure region that contains your Azure Machine learning workspace. Communication with Azure Batch. Compute instance and compute cluster are implemented using the Azure Batch service.|
127
+
|`Storage.<region>`| TCP | 443 | Replace `<region>` with the Azure region that contains your Azure Machine learning workspace. This service tag is used to communicate with the Azure Storage account used by Azure Batch. |
128
+
129
+
> [!IMPORTANT]
130
+
> The outbound access to `Storage.<region>` could potentially be used to exfiltrate data from your workspace. By using a Service Endpoint Policy, you can mitigate this vulnerability. For more information, see the [Azure Machine Learning data exfiltration prevention](../how-to-prevent-data-loss-exfiltration.md) article.
131
+
132
+
| FQDN | Protocol | Port | Notes |
133
+
| ---- |:----:|:----:| ---- |
134
+
|`<region>.tundra.azureml.ms`| UDP | 5831 | Replace `<region>` with the Azure region that contains your Azure Machine learning workspace. |
135
+
|`graph.windows.net`| TCP | 443 | Communication with the Microsoft Graph API.|
136
+
|`*.instances.azureml.ms`| TCP | 443/8787/18881 | Communication with Azure Machine Learning. |
137
+
|`<region>.batch.azure.com`| ANY | 443 | Replace `<region>` with the Azure region that contains your Azure Machine learning workspace. Communication with Azure Batch. |
138
+
|`<region>.service.batch.com`| ANY | 443 | Replace `<region>` with the Azure region that contains your Azure Machine learning workspace. Communication with Azure Batch. |
139
+
|`*.blob.core.windows.net`| TCP | 443 | Communication with Azure Blob storage. |
140
+
|`*.queue.core.windows.net`| TCP | 443 | Communication with Azure Queue storage. |
141
+
|`*.table.core.windows.net`| TCP | 443 | Communication with Azure Table storage. |
142
+
143
+
144
+
+ Create either a firewall and outbound rules or a NAT gateway and network service groups to allow outbound traffic. Since the compute has no public IP address, it can't communicate with resources on the public internet without this configuration. For example, it wouldn't be able to communicate with Azure Active Directory or Azure Resource Manager. Installing Python packages from public sources would also require this configuration.
145
+
146
+
For more information on the outbound traffic that is used by Azure Machine Learning, see the following articles:
147
+
-[Configure inbound and outbound network traffic](../how-to-access-azureml-behind-firewall.md).
0 commit comments