You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-enable-virtual-network.md
+20-14Lines changed: 20 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ This article also provides detailed information about *advanced security setting
42
42
43
43
To use an Azure storage account for the workspace in a virtual network, use the following steps:
44
44
45
-
1. Create a compute resource (for example, a Machine Learning cluster) behind a virtual network, or attach a compute resource to the workspace (for example, an HDInsight cluster, virtual machine, or Azure Kubernetes Service cluster). The compute resource can be for experimentation or model deployment.
45
+
1. Create a compute resource (for example, a Machine Learning compute instance or cluster) behind a virtual network, or attach a compute resource to the workspace (for example, an HDInsight cluster, virtual machine, or Azure Kubernetes Service cluster). The compute resource can be for experimentation or model deployment.
46
46
47
47
For more information, see the [Use a Machine Learning compute](#amlcompute), [Use a virtual machine or HDInsight cluster](#vmorhdi), and [Use Azure Kubernetes Service](#aksvnet) sections in this article.
48
48
@@ -59,7 +59,7 @@ To use an Azure storage account for the workspace in a virtual network, use the
59
59
- Under __Virtual networks__, select the __Add existing virtual network__ link. This action adds the virtual network where your compute resides (see step 1).
60
60
61
61
> [!IMPORTANT]
62
-
> The storage account must be in the same virtual network as the clusters used for training or inference.
62
+
> The storage account must be in the same virtual network as the compute instances or clusters used for training or inference.
63
63
64
64
- Select the __Allow trusted Microsoft services to access this storage account__ check box.
65
65
@@ -86,6 +86,7 @@ The key vault instance that's associated with the workspace is used by Azure Mac
86
86
* Connection strings to data stores
87
87
88
88
To use Azure Machine Learning experimentation capabilities with Azure Key Vault behind a virtual network, use the following steps:
89
+
89
90
1. Go to the key vault that's associated with the workspace.
90
91
91
92
[](./media/how-to-enable-virtual-network/workspace-key-vault.png#lightbox)
@@ -103,18 +104,22 @@ To use Azure Machine Learning experimentation capabilities with Azure Key Vault
103
104
104
105
<aid="amlcompute"></a>
105
106
106
-
## Use a Machine Learning Compute
107
+
## <aname="compute-instance"></a>Use a Machine Learning Compute
108
+
109
+
> [!NOTE]
110
+
> Compute instances (preview) are currently available only for workspaces with a region of **North Central US** or **UK South**, with support for other regions coming soon.
111
+
> Use one of these regions to create a compute instance that can be added to virtual network.
107
112
108
-
To use an Azure Machine Learning compute cluster in a virtual network, the following network requirements must be met:
113
+
To use an Azure Machine Learning compute instance or compute cluster in a virtual network, the following network requirements must be met:
109
114
110
115
> [!div class="checklist"]
111
116
> * The virtual network must be in the same subscription and region as the Azure Machine Learning workspace.
112
-
> * The subnet that's specified for the compute cluster must have enough unassigned IP addresses to accommodate the number of VMs that are targeted. If the subnet doesn't have enough unassigned IP addresses, a compute cluster will be partially allocated.
117
+
> * The subnet that's specified for the compute instance or cluster must have enough unassigned IP addresses to accommodate the number of VMs that are targeted. If the subnet doesn't have enough unassigned IP addresses, a compute cluster will be partially allocated.
113
118
> * Check to see whether your security policies or locks on the virtual network's subscription or resource group restrict permissions to manage the virtual network. If you plan to secure the virtual network by restricting traffic, leave some ports open for the compute service. For more information, see the [Required ports](#mlcports) section.
114
-
> * If you're going to put multiple compute clusters in one virtual network, you might need to request a quota increase for one or more of your resources.
115
-
> * If the Azure Storage Account(s) for the workspace are also secured in a virtual network, they must be in the same virtual network as the Azure Machine Learning compute cluster.
119
+
> * If you're going to put multiple compute instances or clusters in one virtual network, you might need to request a quota increase for one or more of your resources.
120
+
> * If the Azure Storage Account(s) for the workspace are also secured in a virtual network, they must be in the same virtual network as the Azure Machine Learning compute instance or cluster. If you are creating a compute instance in the same virtual network, you would need to detach the storage account(s) from the virtual network, create the compute instance in the virtual network, and then attach the storage account(s) back to the virtual network.
116
121
117
-
The Machine Learning compute cluster automatically allocates additional networking resources in the resource group that contains the virtual network. For each compute cluster, the service allocates the following resources:
122
+
The Machine Learning compute instance or cluster automatically allocates additional networking resources in the resource group that contains the virtual network. For each compute instance or cluster, the service allocates the following resources:
118
123
119
124
* One network security group
120
125
* One public IP address
@@ -137,6 +142,8 @@ Machine Learning Compute currently uses the Azure Batch service to provision VMs
137
142
138
143
- Outbound traffic on any port to the internet.
139
144
145
+
- For compute instance inbound TCP traffic on port 44224 from a __Service Tag__ of __AzureMachineLearning__.
146
+
140
147
Exercise caution if you modify or add inbound or outbound rules in Batch-configured NSGs. If an NSG blocks communication to the compute nodes, the compute service sets the state of the compute nodes to unusable.
141
148
142
149
You don't need to specify NSGs at the subnet level, because the Azure Batch service configures its own NSGs. However, if the specified subnet has associated NSGs or a firewall, configure the inbound and outbound security rules as mentioned earlier.
@@ -149,22 +156,23 @@ The NSG rule configuration in the Azure portal is shown in the following images:
149
156
150
157
### <aid="limiting-outbound-from-vnet"></a> Limit outbound connectivity from the virtual network
151
158
152
-
If you don't want to use the default outbound rules and you do want to limit the outbound access of your virtual network, do the following actions:
159
+
If you don't want to use the default outbound rules and you do want to limit the outbound access of your virtual network, use the following steps:
153
160
154
161
- Deny outbound internet connection by using the NSG rules.
155
162
156
-
- Limit outbound traffic to the following resources:
163
+
- Limit outbound traffic to the following items:
157
164
- Azure Storage, by using __Service Tag__ of __Storage.Region_Name__ (for example, Storage.EastUS)
158
165
- Azure Container Registry, by using __Service Tag__ of __AzureContainerRegistry.Region_Name__ (for example, AzureContainerRegistry.EastUS)
159
166
- Azure Machine Learning, by using __Service Tag__ of __AzureMachineLearning__
167
+
- In case of compute instance, Azure Cloud, by using __Service Tag__ of __AzureCloud.Region_Name__ (for example, AzureCloud.NorthCentralUS)
160
168
161
169
The NSG rule configuration in the Azure portal is shown in the following image:
162
170
163
171
[](./media/how-to-enable-virtual-network/limited-outbound-nsg-exp.png#lightbox)
164
172
165
173
### User-defined routes for forced tunneling
166
174
167
-
If you're using forced tunneling with Machine Learning Compute, add [user-defined routes (UDRs)](https://docs.microsoft.com/azure/virtual-network/virtual-networks-udr-overview) to the subnet that contains the compute resource.
175
+
If you're using forced tunneling with the Machine Learning Compute, add [user-defined routes (UDRs)](https://docs.microsoft.com/azure/virtual-network/virtual-networks-udr-overview) to the subnet that contains the compute resource.
168
176
169
177
* Establish a UDR for each IP address that's used by the Azure Batch service in the region where your resources exist. These UDRs enable the Batch service to communicate with compute nodes for task scheduling. To get a list of IP addresses of the Batch service, use one of the following methods:
170
178
@@ -365,7 +373,7 @@ A private IP address is enabled by configuring AKS to use an _internal load bala
365
373
> [!IMPORTANT]
366
374
> You cannot enable private IP when creating the Azure Kubernetes Service cluster. It must be enabled as an update to an existing cluster.
367
375
368
-
The following code snippet demonstrates how to **create a new AKS cluster**, and then update it to use a private IP/internal load balancer
376
+
The following code snippet demonstrates how to **create a new AKS cluster**, and then update it to use a private IP/internal load balancer:
369
377
370
378
```python
371
379
import azureml.core
@@ -399,7 +407,6 @@ except:
399
407
aks_target.update(update_config)
400
408
# Wait for the operation to complete
401
409
aks_target.wait_for_completion(show_output=True)
402
-
403
410
```
404
411
405
412
__Azure CLI__
@@ -453,4 +460,3 @@ For more information on configuring a network rule, see [Deploy and configure Az
453
460
*[Set up training environments](how-to-set-up-training-targets.md)
454
461
*[Where to deploy models](how-to-deploy-and-where.md)
455
462
*[Securely deploy models with SSL](how-to-secure-web-service.md)
0 commit comments