Skip to content

Commit 87047a6

Browse files
author
Larry Franks
committed
fixes
1 parent bb021f2 commit 87047a6

File tree

3 files changed

+22
-13
lines changed

3 files changed

+22
-13
lines changed

articles/machine-learning/how-to-prevent-data-loss-exfiltration.md

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -36,10 +36,6 @@ Azure Machine Learning has several inbound and outbound dependencies. Some of th
3636
* An Azure Machine Learning workspace with a private endpoint that connects to the VNet.
3737
* The storage account used by the workspace must also connect to the VNet using a private endpoint.
3838

39-
## Limitations
40-
41-
* If you have an Azure Machine Learning compute instance configured for __no public IP__ that was created _before_ October 15th, you must delete and recreate it after step 1 (opt in) below if you want to use data loss exfiltration protection with it. Older compute instances configured for no public IP were created using a different back-end infrastructure. Deleting and recreating the compute instance after opt in to the preview.
42-
4339
## 1. Opt in to the preview
4440

4541
> [!IMPORTANT]
@@ -50,18 +46,28 @@ Use the form at [https://forms.office.com/r/1TraBek7LV](https://forms.office.com
5046
> [!TIP]
5147
> It may take one to two weeks to allowlist your subscription.
5248
53-
## 2. Allow outbound network traffic
49+
## 2. Allow inbound and outbound network traffic
50+
51+
### Inbound
52+
53+
> [!IMPORTANT]
54+
> The following information __modifies__ the guidance provided in the [Inbound traffic](how-to-secure-training-vnet.md#inbound-traffic) section of the "Secure training environment with virtual networks" article.
55+
56+
When using Azure Machine Learning __compute instance__ _with a public IP address_, allow inbound traffic from Azure Batch management (service tag `BatchNodeManagement.<region>`). A compute instance _with no public IP_ (preview) __doesn't__ require this inbound communication.
57+
58+
### Outbound
5459

5560
> [!IMPORTANT]
5661
> The following information is __in addition__ to the guidance provided in the [Secure training environment with virtual networks](how-to-secure-training-vnet.md) and [Configure inbound and outbound network traffic](how-to-access-azureml-behind-firewall.md) articles.
5762
5863
Select the configuration that you're using:
5964

60-
# [Network security group](#tab/nsg)
65+
# [Service tag routes](#tab/servicetag)
6166

62-
__Allow__ outbound traffic over __TCP port 443__ to the following service tags. Replace `<region>` with the Azure region that contains your compute cluster or instance:
67+
__Allow__ outbound traffic to the following __service tags__. Replace `<region>` with the Azure region that contains your compute cluster or instance:
6368

6469
* `BatchNodeManagement.<region>`
70+
* `AzureMachineLearning`
6571
* `Storage.<region>` - A Service Endpoint Policy will be applied in a later step to limit outbound traffic.
6672

6773
# [Firewall](#tab/firewall)
@@ -79,6 +85,8 @@ __Allow__ outbound traffic over __TCP port 443__ to the following FQDNs. Replace
7985
8086
---
8187

88+
For more information, see [How to secure training environments](how-to-secure-training-vnet.md) and [Configure inbound and outbound network traffic](how-to-access-azureml-behind-firewall.md).
89+
8290
## 3. Enable storage endpoint for the subnet
8391

8492
1. From the [Azure portal](https://portal.azure.com), select the __Azure Virtual Network__ for your Azure ML workspace.

articles/machine-learning/how-to-secure-training-vnet.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -120,12 +120,11 @@ In this article you learn how to secure the following training compute resources
120120
* If you create a compute instance and plan to use the no public IP address configuration, your Azure Machine Learning workspace's managed identity must be assigned the __Reader__ role for the virtual network that contains the workspace. For more information on assigning roles, see [Steps to assign an Azure role](../role-based-access-control/role-assignments-steps.md).
121121

122122
> [!IMPORTANT]
123-
> On October TBD, the public preview for no public IP configuration for compute cluster and compute instance moved to a new architecture. This new architecture removes limitations, such as the requirement for inbound access from the Azure Batch management and Azure Machine Learning services. However, the new architecture requires you to opt-in. Before opting in to this preview, you must have created a workspace and a compute instance on the subscription you plan to use. You can delete the compute instance and/or workspace after creating them.
123+
> Using the __no public IP__ configuration requires you to opt-in to this preview. Before opting in, you must have created a workspace and a compute instance on the subscription you plan to use. You can delete the compute instance and/or workspace after creating them.
124124
>
125125
> Use the form at [https://forms.office.com/r/0Rw6mXTT07](https://forms.office.com/r/0Rw6mXTT07) to opt in to this Azure Machine Learning preview. Microsoft will contact you once your subscription has been allowlisted to the preview. It may take one to two weeks to allowlist your subscription.
126-
127-
> [!TIP]
128-
> If you have existing compute instances configured for no public IP, you will need to delete and recreate them after your subscription has been allowlisted to take advantage of the new architecture. For existing compute clusters configured for no public IP, once the cluster has been reduced to 0 nodes (requires the minimum nodes to be configured as 0), it will take advantage of the new architecture the next time nodes are allocated after the subscription is allowlisted.
126+
>
127+
> If you have been using compute instances configured for no public IP without opting-in to the preview using the form, you will need to delete and recreate them after your subscription has been allowlisted to take advantage of the new architecture and region availability. For existing compute clusters configured for no public IP, once the cluster has been reduced to 0 nodes (requires the minimum nodes to be configured as 0), it will take advantage of the new architecture the next time nodes are allocated after the subscription is allowlisted.
129128
130129

131130
* If you have configured Azure Container Registry for your workspace behind the virtual network, you must use a compute cluster to build Docker images. If you use a compute cluster configured for no public IP address, you must provide some method for the cluster to access the public internet. Internet access is required when accessing images stored on the Microsoft Container Registry, packages installed on Pypi, Conda, etc. For more information, see [Enable Azure Container Registry](how-to-secure-workspace-vnet.md#enable-azure-container-registry-acr).

includes/machine-learning-no-public-ip-availibility.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,9 @@ ms.author: sgilley
77
---
88

99
> [!NOTE]
10-
> Support for compute instances and compute clusters without public IP addresses is currently available and in public preview for the following regions:
10+
> Once your Azure subscription has been allowlisted for the no public IP preview, support for compute instances and compute clusters without public IP addresses is currently available and in public preview for the following regions:
1111
> **Public**: France Central, East Asia, South East Asia, West Central US, South Central US, West US 2, West US 3, East US, East US 2, North Europe, West Europe, Central US, North Central US, West US, Australia East, Australia Southeast, Japan East, Japan West, Brazil Southeast, Brazil South, Canada Central, Canada East, Central India, South India, Korea Central, Korea South, Sweden Central, Sweden South, Switzerland North, Switzerland West, UK West, UK South, UAE North, Germany West Central, Norway East, South Africa North.
1212
> **Government**: USGov Arizona, USGov Virginia, USGov Texas.
13-
> **Azure China**: China North 3.
13+
> **Azure China**: China North 3.
14+
>
15+
> If you have been using the no public IP preview without using the opt-in form, you can use the following regions: France Central, East Asia, West Central US, South Central US, West US 2, East US, North Europe, East US 2, Central US, West Europe, North Central US, West US, Australia East, Japan East, Japan West.

0 commit comments

Comments
 (0)