Skip to content

Commit 7e41683

Browse files
Merge pull request #273978 from Blackmist/vnet-clarification
highlighting some limitations
2 parents c6f5657 + 355deb8 commit 7e41683

File tree

1 file changed

+22
-12
lines changed

1 file changed

+22
-12
lines changed

articles/ai-studio/how-to/configure-managed-network.md

Lines changed: 22 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,10 @@ There are three different configuration modes for outbound traffic from the mana
4343
<sup>1</sup> You can use outbound rules with _allow only approved outbound_ mode to achieve the same result as using allow internet outbound. The differences are:
4444

4545
* Always use private endpoints to access Azure resources.
46+
47+
> [!IMPORTANT]
48+
> While you can create a private endpoint for Azure AI services and Azure AI Search, the connected services must allow public networking. For more information, see [Connectivity to other services](#connectivity-to-other-services).
49+
4650
* You must add rules for each outbound connection you need to allow.
4751
* Adding FQDN outbound rules __increase your costs__ as this rule type uses Azure Firewall.
4852
* The default rules for _allow only approved outbound_ are designed to minimize the risk of data exfiltration. Any outbound rules you add might increase your risk.
@@ -60,6 +64,21 @@ The following diagram shows a managed VNet configured to __allow only approved o
6064
6165
:::image type="content" source="../media/how-to/network/only-approved-outbound.svg" alt-text="Diagram of managed VNet isolation configured for allow only approved outbound." lightbox="../media/how-to/network/only-approved-outbound.png":::
6266

67+
## Limitations
68+
69+
* Azure AI Studio currently doesn't support bring your own virtual network, it only supports managed VNet isolation.
70+
* Once you enable managed VNet isolation of your Azure AI, you can't disable it.
71+
* Managed VNet uses private endpoint connection to access your private resources. You can't have a private endpoint and a service endpoint at the same time for your Azure resources, such as a storage account. We recommend using private endpoints in all scenarios.
72+
* The managed VNet is deleted when the Azure AI is deleted.
73+
* Data exfiltration protection is automatically enabled for the only approved outbound mode. If you add other outbound rules, such as to FQDNs, Microsoft can't guarantee that you're protected from data exfiltration to those outbound destinations.
74+
* Using FQDN outbound rules increases the cost of the managed VNet because FQDN rules use Azure Firewall. For more information, see [Pricing](#pricing).
75+
* When using a compute instance with a managed network, you can't connect to the compute instance using SSH.
76+
77+
### Connectivity to other services
78+
79+
* Azure AI services provisioned with Azure AI hub and Azure AI Search attached with Azure AI hub should be public.
80+
* The "Add your data" feature in the Azure AI Studio playground doesn't support private storage account.
81+
6382
## Configure a managed virtual network to allow internet outbound
6483

6584
> [!TIP]
@@ -306,6 +325,9 @@ Private endpoints are currently supported for the following Azure services:
306325
* Azure Database for MySQL
307326
* Azure SQL Managed Instance
308327

328+
> [!IMPORTANT]
329+
> While you can create a private endpoint for Azure AI services and Azure AI Search, the connected services must allow public networking. For more information, see [Connectivity to other services](#connectivity-to-other-services).
330+
309331
When you create a private endpoint, you provide the _resource type_ and _subresource_ that the endpoint connects to. Some resources have multiple types and subresources. For more information, see [what is a private endpoint](/azure/private-link/private-endpoint-overview).
310332

311333
When you create a private endpoint for Azure AI hub dependency resources, such as Azure Storage, Azure Container Registry, and Azure Key Vault, the resource can be in a different Azure subscription. However, the resource must be in the same tenant as the Azure AI hub.
@@ -321,15 +343,3 @@ The Azure AI hub managed VNet feature is free. However, you're charged for the f
321343

322344
> [!IMPORTANT]
323345
> The firewall isn't created until you add an outbound FQDN rule. If you don't use FQDN rules, you will not be charged for Azure Firewall. For more information on pricing, see [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall/).
324-
325-
## Limitations
326-
327-
* Azure AI Studio currently doesn't support bring your own virtual network, it only supports managed VNet isolation.
328-
* Azure AI services provisioned with Azure AI hub and Azure AI Search attached with Azure AI hub should be public.
329-
* The "Add your data" feature in the Azure AI Studio playground doesn't support private storage account.
330-
* Once you enable managed VNet isolation of your Azure AI, you can't disable it.
331-
* Managed VNet uses private endpoint connection to access your private resources. You can't have a private endpoint and a service endpoint at the same time for your Azure resources, such as a storage account. We recommend using private endpoints in all scenarios.
332-
* The managed VNet is deleted when the Azure AI is deleted.
333-
* Data exfiltration protection is automatically enabled for the only approved outbound mode. If you add other outbound rules, such as to FQDNs, Microsoft can't guarantee that you're protected from data exfiltration to those outbound destinations.
334-
* Using FQDN outbound rules increases the cost of the managed VNet because FQDN rules use Azure Firewall. For more information, see [Pricing](#pricing).
335-
* When using a compute instance with a managed network, you can't connect to the compute instance using SSH.

0 commit comments

Comments
 (0)