Skip to content

Commit 781c160

Browse files
committed
initial updates for UDP doc changes
add outbound port to required public internet access table. etc.
1 parent 82f4e26 commit 781c160

File tree

2 files changed

+28
-27
lines changed

2 files changed

+28
-27
lines changed

articles/machine-learning/how-to-prevent-data-loss-exfiltration.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,31 @@ Use the form at [https://forms.office.com/r/1TraBek7LV](https://forms.office.com
4646
> [!TIP]
4747
> It may take one to two weeks to allowlist your subscription.
4848
49-
## 2. Allow inbound and outbound network traffic
49+
## 2. Create the service endpoint policy
50+
51+
1. From the [Azure portal](https://portal.azure.com), add a new __Service Endpoint Policy__. On the __Basics__ tab, provide the required information and then select __Next__.
52+
1. On the __Policy definitions__ tab, perform the following actions:
53+
1. Select __+ Add a resource__, and then provide the following information:
54+
55+
<!-- > [!TIP]
56+
> * At least one storage account resource must be listed in the policy.
57+
> * If you are adding multiple storage accounts, and the _default storage account_ for your workspace is configured with a private endpoint, you do not need to include it in the policy. -->
58+
59+
* __Service__: Microsoft.Storage
60+
* __Scope__: Select the scope as __Single account__ to limit the network traffic to one storage account.
61+
* __Subscription__: The Azure subscription that contains the storage account.
62+
* __Resource group__: The resource group that contains the storage account.
63+
* __Resource__: The default storage account of your workspace.
64+
65+
Select __Add__ to add the resource information.
66+
1. Select __+ Add an alias__, and then select `/services/Azure/MachineLearning` as the __Server Alias__ value. Select __Add__ to add the alias.
67+
68+
> [!NOTE]
69+
> The Azure CLI and Azure PowerShell do not provide support for adding an alias to the policy.
70+
71+
1. Select __Review + Create__, and then select __Create__.
72+
73+
## 3. Allow inbound and outbound network traffic
5074

5175
### Inbound
5276

@@ -87,36 +111,12 @@ __Allow__ outbound traffic over __TCP port 443__ to the following FQDNs. Replace
87111

88112
For more information, see [How to secure training environments](how-to-secure-training-vnet.md) and [Configure inbound and outbound network traffic](how-to-access-azureml-behind-firewall.md).
89113

90-
## 3. Enable storage endpoint for the subnet
114+
## 4. Enable storage endpoint for the subnet
91115

92116
1. From the [Azure portal](https://portal.azure.com), select the __Azure Virtual Network__ for your Azure ML workspace.
93117
1. From the left of the page, select __Subnets__ and then select the subnet that contains your compute cluster/instance resources.
94118
1. In the form that appears, expand the __Services__ dropdown and then __enable Microsoft.Storage__. Select __Save__ to save these changes.
95-
96-
## 4. Create the service endpoint policy
97-
98-
1. From the [Azure portal](https://portal.azure.com), add a new __Service Endpoint Policy__. On the __Basics__ tab, provide the required information and then select __Next__.
99-
1. On the __Policy definitions__ tab, perform the following actions:
100-
1. Select __+ Add a resource__, and then provide the following information:
101-
102-
> [!TIP]
103-
> * At least one storage account resource must be listed in the policy.
104-
> * If you are adding multiple storage accounts, and the _default storage account_ for your workspace is configured with a private endpoint, you do not need to include it in the policy.
105-
106-
* __Service__: Microsoft.Storage
107-
* __Scope__: Select the scope. For example, select __Single account__ if you want to limit the network traffic to one storage account.
108-
* __Subscription__: The Azure subscription that contains the storage account.
109-
* __Resource group__: The resource group that contains the storage account.
110-
* __Resource__: The storage account.
111-
112-
Select __Add__ to add the resource information.
113-
1. Select __+ Add an alias__, and then select `/services/Azure/MachineLearning` as the __Server Alias__ value. Select __Add__ to add the alias.
114-
115-
> [!NOTE]
116-
> The Azure CLI and Azure PowerShell do not provide support for adding an alias to the policy.
117-
118-
1. Select __Review + Create__, and then select __Create__.
119-
119+
1. Apply the service endpoint policy to your workspace subnet.
120120

121121
## 5. Curated environments
122122

includes/machine-learning-public-internet-access.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ Azure Machine Learning requires both inbound and outbound access to the public i
2525
| Outbound | 443 | MicrosoftContainerRegistry.region</br>**Note** that this tag has a dependency on the **AzureFrontDoor.FirstParty** tag | Access docker images provided by Microsoft. Setup of the Azure Machine Learning router for Azure Kubernetes Service. |
2626
| Outbound | 443 | AzureMonitor | Used to log monitoring and metrics to App Insights and Azure Monitor. |
2727
| Outbound | 443 | Keyvault.region | Access the key vault for the Azure Batch service. Only needed if your workspace was created with the [hbi_workspace](/python/api/azureml-core/azureml.core.workspace%28class%29#create-name--auth-none--subscription-id-none--resource-group-none--location-none--create-resource-group-true--sku--basic---friendly-name-none--storage-account-none--key-vault-none--app-insights-none--container-registry-none--cmk-keyvault-none--resource-cmk-uri-none--hbi-workspace-false--default-cpu-compute-target-none--default-gpu-compute-target-none--exist-ok-false--show-output-true-) flag enabled. |
28+
| Outbound | 5831 | AzureMachineLearning | Communication with Azure Machine Learning for compute instances. |
2829

2930
> [!TIP]
3031
> If you need the IP addresses instead of service tags, use one of the following options:

0 commit comments

Comments
 (0)