Skip to content

Commit 3ae9d3e

Browse files
authored
Merge pull request #174010 from Blackmist/resource-instance-rules
Adding info for resource instance rules for storage accounts
2 parents 0dd7de7 + b0d14d1 commit 3ae9d3e

File tree

5 files changed

+27
-19
lines changed

5 files changed

+27
-19
lines changed

articles/machine-learning/concept-secure-network-traffic-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Data profiling depends on the Azure Machine Learning managed service being able
8787
> [!TIP]
8888
> You can provide a service principal when creating the workspace. If you do not, one is created for you and will have the same name as your workspace.
8989
90-
To allow access to the storage account, configure the storage account to __Allow Azure services on the trusted services list to access this storage account__. This setting allows the managed service to access storage through the Azure data center network.
90+
To allow access to the storage account, configure the storage account to allow a __resource instance__ for your workspace or select the __Allow Azure services on the trusted services list to access this storage account__. This setting allows the managed service to access storage through the Azure data center network.
9191

9292
Next, add the service principal for the workspace to the __Reader__ role to the private endpoint of the storage account. This role is used to verify the workspace and storage subnet information. If they are the same, access is allowed. Finally, the service principal also requires __Blob data contributor__ access to the storage account.
9393

articles/machine-learning/how-to-network-security-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.subservice: enterprise-readiness
88
ms.reviewer: larryfr
99
ms.author: peterlu
1010
author: peterclu
11-
ms.date: 09/24/2021
11+
ms.date: 09/29/2021
1212
ms.topic: how-to
1313
ms.custom: devx-track-python, references_regions, contperf-fy21q1,contperf-fy21q4,FY21Q4-aml-seo-hack, security
1414
---
@@ -73,7 +73,7 @@ Use the following steps to secure your workspace and associated resources. These
7373
| Service | Endpoint information | Allow trusted information |
7474
| ----- | ----- | ----- |
7575
| __Azure Key Vault__| [Service endpoint](../key-vault/general/overview-vnet-service-endpoints.md)</br>[Private endpoint](../key-vault/general/private-link-service.md) | [Allow trusted Microsoft services to bypass this firewall](how-to-secure-workspace-vnet.md#secure-azure-key-vault) |
76-
| __Azure Storage Account__ | [Service and private endpoint](how-to-secure-workspace-vnet.md?tabs=se#secure-azure-storage-accounts)</br>[Private endpoint](how-to-secure-workspace-vnet.md?tabs=pe#secure-azure-storage-accounts) | [Grant access to trusted Azure services](../storage/common/storage-network-security.md#grant-access-to-trusted-azure-services) |
76+
| __Azure Storage Account__ | [Service and private endpoint](how-to-secure-workspace-vnet.md?tabs=se#secure-azure-storage-accounts)</br>[Private endpoint](how-to-secure-workspace-vnet.md?tabs=pe#secure-azure-storage-accounts) | [Grant access from Azure resource instances](../storage/common/storage-network-security.md#grant-access-from-azure-resource-instances-preview)</br>**or**</br>[Grant access to trusted Azure services](../storage/common/storage-network-security.md#grant-access-to-trusted-azure-services) |
7777
| __Azure Container Registry__ | [Private endpoint](../container-registry/container-registry-private-link.md) | [Allow trusted services](../container-registry/allow-access-trusted-services.md) |
7878

7979

articles/machine-learning/how-to-secure-training-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ In this article you learn how to secure the following training compute resources
107107
* If you plan to use the __SDK__, the storage account can be in a different subnet.
108108

109109
> [!NOTE]
110-
> Selecting the checkbox for "Allow trusted Microsoft services to access this account" is not sufficient to allow communication from the compute.
110+
> Adding a resource instance for your workspace or selecting the checkbox for "Allow trusted Microsoft services to access this account" is not sufficient to allow communication from the compute.
111111
112112
* When your workspace uses a private endpoint, the compute instance can only be accessed from inside the virtual network. If you use a custom DNS or hosts file, add an entry for `<instance-name>.<region>.instances.azureml.ms`. Map this entry to the private IP address of the workspace private endpoint. For more information, see the [custom DNS](./how-to-custom-dns.md) article.
113113
* Virtual network service endpoint policies don't work for compute cluster/instance system storage accounts.

articles/machine-learning/how-to-secure-workspace-vnet.md

Lines changed: 23 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -101,18 +101,28 @@ Azure Machine Learning supports storage accounts configured to use either a priv
101101

102102
# [Private endpoint](#tab/pe)
103103

104-
> [!TIP]
105-
> You must configure two private endpoints for your default storage account:
106-
> * A private endpoint with a **blob** target subresource.
107-
> * A private endpoint with a **file** target subresource (fileshare).
108-
>
109-
> If you plan to use [ParallelRunStep](./tutorial-pipeline-batch-scoring-classification.md) in your pipeline, you must also configure private endpoints with **queue** and **table** target subresources. ParallelRunStep uses queue and table for task scheduling and dispatching.
104+
1. In the Azure portal, select the Azure Storage Account.
105+
1. Use the information in [Use private endpoints for Azure Storage](../storage/common/storage-private-endpoints.md#creating-a-private-endpoint) to add private endpoints for the following storage sub-resources:
110106

111-
:::image type="content" source="./media/how-to-enable-studio-virtual-network/configure-storage-private-endpoint.png" alt-text="Screenshot showing private endpoint configuration page with blob and file options":::
107+
* **Blob**
108+
* **File**
109+
* **Queue** - Only needed if you plan to use [ParallelRunStep](./tutorial-pipeline-batch-scoring-classification.md) in an Azure Machine Learning pipeline.
110+
* **Table** - Only needed if you plan to use [ParallelRunStep](./tutorial-pipeline-batch-scoring-classification.md) in an Azure Machine Learning pipeline.
112111

113-
To configure a private endpoint for a storage account that is **not** the default storage, select the **Target subresource** type that corresponds to the storage account you want to add.
112+
:::image type="content" source="./media/how-to-enable-studio-virtual-network/configure-storage-private-endpoint.png" alt-text="Screenshot showing private endpoint configuration page with blob and file options":::
114113

115-
For more information, see [Use private endpoints for Azure Storage](../storage/common/storage-private-endpoints.md)
114+
> [!TIP]
115+
> When configuring a storage account that is **not** the default storage, select the **Target subresource** type that corresponds to the storage account you want to add.
116+
117+
1. After creating the private endpoints for thee sub-resources, select the __Firewalls and virtual networks__ tab under __Networking__ for the storage account.
118+
1. Select __Selected networks__, and then under __Resource instances__, select `Microsoft.MachineLearningServices/Workspace` as the __Resource type__. Select your workspace using __Instance name__. For more information, see [Trusted access based on system-assigned managed identity](/azure/storage/common/storage-network-security#trusted-access-based-on-system-assigned-managed-identity).
119+
120+
> [!TIP]
121+
> Alternatively, you can select __Allow Azure services on the trusted services list to access this storage account__ to more broadly allow access from trusted services. For more information, see [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md#trusted-microsoft-services).
122+
123+
:::image type="content" source="./media/how-to-enable-virtual-network/storage-firewalls-and-virtual-networks-no-vnet.png" alt-text="The networking area on the Azure Storage page in the Azure portal when using private endpoint":::
124+
125+
1. Select __Save__ to save the configuration.
116126

117127
> [!TIP]
118128
> When using a private endpoint, you can also disable public access. For more information, see [disallow public read access](../storage/blobs/anonymous-read-access-configure.md#allow-or-disallow-public-read-access-for-a-storage-account).
@@ -130,14 +140,12 @@ For more information, see [Use private endpoints for Azure Storage](../storage/c
130140
131141
1. Under __Resource instances__, select `Microsoft.MachineLearningServices/Workspace` as the __Resource type__ and select your workspace using __Instance name__. For more information, see [Trusted access based on system-assigned managed identity](/azure/storage/common/storage-network-security#trusted-access-based-on-system-assigned-managed-identity).
132142

133-
1. Under __Exceptions__, select __Allow Azure services on the trusted services list to access this storage account__.
134-
135-
* Resources of some services, **registered in your subscription**, can access the storage account **in the same subscription** for select operations. For example, writing logs or creating backups.
136-
* Resources of some services can be granted explicit access to your storage account by __assigning an Azure role__ to its system-assigned managed identity.
143+
> [!TIP]
144+
> Alternatively, you can select __Allow Azure services on the trusted services list to access this storage account__ to more broadly allow access from trusted services. For more information, see [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md#trusted-microsoft-services).
137145
138-
For more information, see [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md#trusted-microsoft-services).
146+
:::image type="content" source="./media/how-to-enable-virtual-network/storage-firewalls-and-virtual-networks.png" alt-text="The networking area on the Azure Storage page in the Azure portal":::
139147

140-
:::image type="content" source="./media/how-to-enable-virtual-network/storage-firewalls-and-virtual-networks.png" alt-text="The networking area on the Azure Storage page in the Azure portal":::
148+
1. Select __Save__ to save the configuration.
141149

142150
> [!TIP]
143151
> When using a service endpoint, you can also disable public access. For more information, see [disallow public read access](../storage/blobs/anonymous-read-access-configure.md#allow-or-disallow-public-read-access-for-a-storage-account).
89.7 KB
Loading

0 commit comments

Comments
 (0)