Skip to content

Commit 36504a7

Browse files
Merge pull request #209324 from Blackmist/npip-compute-image-build
incorporating feedback
2 parents aac9948 + 22dea63 commit 36504a7

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/machine-learning/how-to-secure-training-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ In this article you learn how to secure the following training compute resources
115115
116116
* If you create a compute instance and plan to use the no public IP address configuration, your Azure Machine Learning workspace's managed identity must be assigned the __Reader__ role for the virtual network that contains the workspace. For more information on assigning roles, see [Steps to assign an Azure role](../role-based-access-control/role-assignments-steps.md).
117117

118-
* If you have configured Azure Container Registry for your workspace behind the virtual network, you must use a compute cluster to build Docker images. You can't use a compute cluster with the no public IP address configuration. For more information, see [Enable Azure Container Registry](how-to-secure-workspace-vnet.md#enable-azure-container-registry-acr).
118+
* If you have configured Azure Container Registry for your workspace behind the virtual network, you must use a compute cluster to build Docker images. If you use a compute cluster configured for no public IP address, you must provide some method for the cluster to access the public internet. Internet access is required when accessing images stored on the Microsoft Container Registry, packages installed on Pypi, Conda, etc. For more information, see [Enable Azure Container Registry](how-to-secure-workspace-vnet.md#enable-azure-container-registry-acr).
119119

120120
* If the Azure Storage Accounts for the workspace are also in the virtual network, use the following guidance on subnet limitations:
121121

articles/machine-learning/how-to-secure-workspace-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -255,7 +255,7 @@ Azure Container Registry can be configured to use a private endpoint. Use the fo
255255
> [!IMPORTANT]
256256
> The following limitations apply When using a compute cluster for image builds:
257257
> * Only a CPU SKU is supported.
258-
> * You can't use a compute cluster configured for no public IP address.
258+
> * If you use a compute cluster configured for no public IP address, you must provide some way for the cluster to access the public internet. Internet access is required when accessing images stored on the Microsoft Container Registry, packages installed on Pypi, Conda, etc. You need to configure User Defined Routing (UDR) to reach to a public IP to access the internet. For example, you can use the public IP of your firewall, or you can use [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) with a public IP. For more information, see [How to securely train in a VNet](how-to-secure-training-vnet.md).
259259
260260
# [Azure CLI](#tab/cli)
261261

0 commit comments

Comments
 (0)