You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-prevent-data-loss-exfiltration.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
9
9
ms.author: jhirono
10
10
author: jhirono
11
11
ms.reviewer: larryfr
12
-
ms.date: 04/14/2023
12
+
ms.date: 01/31/2024
13
13
ms.custom: engagement-fy23, build-2023
14
14
monikerRange: 'azureml-api-2 || azureml-api-1'
15
15
---
@@ -32,7 +32,7 @@ Azure Machine Learning has several inbound and outbound dependencies. Some of th
32
32
-`automlresources-prod.azureedge.net`
33
33
34
34
> [!TIP]
35
-
> The information in this article is primarily about using an Azure Virtual Network. Azure Machine Learning can also use a **managed virtual networks** (preview). With a managed virtual network, Azure Machine Learning handles the job of network isolation for your workspace and managed computes.
35
+
> The information in this article is primarily about using an Azure Virtual Network. Azure Machine Learning can also use a **managed virtual networks**. With a managed virtual network, Azure Machine Learning handles the job of network isolation for your workspace and managed computes.
36
36
>
37
37
> To address data exfiltration concerns, managed virtual networks allow you to restrict egress to only approved outbound traffic. For more information, see [Workspace managed network isolation](how-to-managed-network.md).
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-secure-inferencing-vnet.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
9
9
ms.reviewer: larryfr
10
10
ms.author: jhirono
11
11
author: jhirono
12
-
ms.date: 09/06/2022
12
+
ms.date: 01/31/2024
13
13
---
14
14
15
15
# Secure an Azure Machine Learning inferencing environment with virtual networks
@@ -19,7 +19,7 @@ In this article, you learn how to secure inferencing environments (online endpoi
19
19
* Azure Machine Learning managed online endpoints
20
20
21
21
> [!TIP]
22
-
> Microsoft recommends using an Azure Machine Learning **managed virtual networks**(preview) instead of the steps in this article when securing managed online endpoints. With a managed virtual network, Azure Machine Learning handles the job of network isolation for your workspace and managed computes. You can also add private endpoints for resources needed by the workspace, such as Azure Storage Account. For more information, see [Workspace managed network isolation](how-to-managed-network.md).
22
+
> Microsoft recommends using an Azure Machine Learning **managed virtual networks** instead of the steps in this article when securing managed online endpoints. With a managed virtual network, Azure Machine Learning handles the job of network isolation for your workspace and managed computes. You can also add private endpoints for resources needed by the workspace, such as Azure Storage Account. For more information, see [Workspace managed network isolation](how-to-managed-network.md).
@@ -72,11 +72,11 @@ When your Azure Machine Learning workspace is configured with a private endpoint
72
72
To add AKS in a virtual network to your workspace, use the following steps:
73
73
74
74
1. Sign in to [Azure Machine Learning studio](https://ml.azure.com/), and then select your subscription and workspace.
75
-
1. Select __Compute__ on the left, __Inference clusters__ from the center, and then select __+ New__.
75
+
1. Select __Compute__ on the left, __Inference clusters__ from the center, and then select __+ New__. Finally, select __AksCompute__.
76
76
77
77
:::image type="content" source="./media/how-to-secure-inferencing-vnet/create-inference.png" alt-text="Screenshot of create inference cluster dialog.":::
78
78
79
-
1. From the __Create inference cluster__dialog, select __Create new__ and the VM size to use for the cluster. Finally, select __Next__.
79
+
1. From the __Create AksCompute__dialog, select __Create new__, the __Location__ and the VM size to use for the cluster. Finally, select __Next__.
80
80
81
81
:::image type="content" source="./media/how-to-secure-inferencing-vnet/create-inference-vm.png" alt-text="Screenshot of VM settings.":::
82
82
@@ -101,7 +101,7 @@ To add AKS in a virtual network to your workspace, use the following steps:
101
101
> [!IMPORTANT]
102
102
> Keep the default outbound rules for the NSG. For more information, see the default security rules in [Security groups](../../virtual-network/network-security-groups-overview.md#default-security-rules).
103
103
104
-
](./media/how-to-secure-inferencing-vnet/aks-vnet-inbound-nsg-scoring.png#lightbox)
104
+
:::image type="content" source="./media/how-to-secure-inferencing-vnet/aks-vnet-inbound-nsg-scoring.png" alt-text="Screenshot that shows an inbound security rule." lightbox="./media/how-to-secure-inferencing-vnet/aks-vnet-inbound-nsg-scoring.png":::
105
105
106
106
> [!IMPORTANT]
107
107
> The IP address shown in the image for the scoring endpoint will be different for your deployments. While the same IP is shared by all deployments to one AKS cluster, each AKS cluster will have a different IP address.
0 commit comments