Skip to content

Commit 2f71de7

Browse files
authored
Merge pull request #228181 from Blackmist/secure-monitor
Azure Monitor/Application Insights with network isolation
2 parents e5e4318 + e75ec6e commit 2f71de7

12 files changed

+69
-19
lines changed

articles/machine-learning/how-to-access-azureml-behind-firewall.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ __Outbound traffic__
7979
| `AzureFrontDoor.FrontEnd`</br>* Not needed in Azure China. | 443 | Global entry point for [Azure Machine Learning studio](https://ml.azure.com). Store images and environments for AutoML. |
8080
| `MicrosoftContainerRegistry.<region>` | 443 | Access docker images provided by Microsoft. |
8181
| `Frontdoor.FirstParty` | 443 | Access docker images provided by Microsoft. |
82-
| `AzureMonitor` | 443 | Used to log monitoring and metrics to Azure Monitor. |
82+
| `AzureMonitor` | 443 | Used to log monitoring and metrics to Azure Monitor. Only needed if you haven't [secured Azure Monitor](how-to-secure-workspace-vnet.md#secure-azure-monitor-and-application-insights) for the workspace. </br>* This outbound is also used to log information for support incidents. |
8383

8484
> [!IMPORTANT]
8585
> If a compute instance or compute cluster is configured for no public IP, they can't access the public internet by default. However, they do need to communicate with the resources listed above. To enable outbound communication, you have two possible options:
@@ -425,7 +425,7 @@ For information on restricting access to models deployed to AKS, see [Restrict e
425425

426426
__Monitoring, metrics, and diagnostics__
427427

428-
To support logging of metrics and other monitoring information to Azure Monitor and Application Insights, allow outbound traffic to the following hosts:
428+
If you haven't [secured Azure Monitor](how-to-secure-workspace-vnet.md#secure-azure-monitor-and-application-insights) for the workspace, you must allow outbound traffic to the following hosts:
429429

430430
> [!NOTE]
431431
> The information logged to these hosts is also used by Microsoft Support to be able to diagnose any problems you run into with your workspace.

articles/machine-learning/how-to-secure-workspace-vnet.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -320,6 +320,17 @@ Azure Container Registry can be configured to use a private endpoint. Use the fo
320320
> [!TIP]
321321
> When ACR is behind a VNet, you can also [disable public access](../container-registry/container-registry-access-selected-networks.md#disable-public-network-access) to it.
322322
323+
## Secure Azure Monitor and Application Insights
324+
325+
To enable network isolation for Azure Monitor and the Application Insights instance for the workspace, use the following steps:
326+
327+
1. Upgrade the Application Insights instance for your workspace. For steps on how to upgrade, see [Migrate to workspace-based Application Insights resources](/azure/azure-monitor/app/convert-classic-resource).
328+
329+
> [!TIP]
330+
> New workspaces create a workspace-based Application Insights resource by default.
331+
332+
1. Create an Azure Monitor Private Link Scope and add the Application Insights instance from step 1 to the scope. For steps on how to do this, see [Configure your Azure Monitor private link](/azure/azure-monitor/logs/private-link-configure).
333+
323334
## Securely connect to your workspace
324335
325336
[!INCLUDE [machine-learning-connect-secure-workspace](../../includes/machine-learning-connect-secure-workspace.md)]
90.5 KB
Loading
47.6 KB
Loading
24.5 KB
Loading
44.3 KB
Loading
57.9 KB
Loading
47.1 KB
Loading
44.7 KB
Loading
49.5 KB
Loading

0 commit comments

Comments
 (0)