Skip to content

Commit 9895ef5

Browse files
author
Larry Franks
committed
reverting some changes out
1 parent dccffa1 commit 9895ef5

File tree

1 file changed

+20
-14
lines changed

1 file changed

+20
-14
lines changed

articles/machine-learning/how-to-enable-virtual-network.md

Lines changed: 20 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ This article also provides detailed information about *advanced security setting
4242

4343
To use an Azure storage account for the workspace in a virtual network, use the following steps:
4444

45-
1. Create a compute resource (for example, a Machine Learning cluster) behind a virtual network, or attach a compute resource to the workspace (for example, an HDInsight cluster, virtual machine, or Azure Kubernetes Service cluster). The compute resource can be for experimentation or model deployment.
45+
1. Create a compute resource (for example, a Machine Learning compute instance or cluster) behind a virtual network, or attach a compute resource to the workspace (for example, an HDInsight cluster, virtual machine, or Azure Kubernetes Service cluster). The compute resource can be for experimentation or model deployment.
4646

4747
For more information, see the [Use a Machine Learning compute](#amlcompute), [Use a virtual machine or HDInsight cluster](#vmorhdi), and [Use Azure Kubernetes Service](#aksvnet) sections in this article.
4848

@@ -59,7 +59,7 @@ To use an Azure storage account for the workspace in a virtual network, use the
5959
- Under __Virtual networks__, select the __Add existing virtual network__ link. This action adds the virtual network where your compute resides (see step 1).
6060

6161
> [!IMPORTANT]
62-
> The storage account must be in the same virtual network as the clusters used for training or inference.
62+
> The storage account must be in the same virtual network as the compute instances or clusters used for training or inference.
6363
6464
- Select the __Allow trusted Microsoft services to access this storage account__ check box.
6565

@@ -86,6 +86,7 @@ The key vault instance that's associated with the workspace is used by Azure Mac
8686
* Connection strings to data stores
8787

8888
To use Azure Machine Learning experimentation capabilities with Azure Key Vault behind a virtual network, use the following steps:
89+
8990
1. Go to the key vault that's associated with the workspace.
9091

9192
[![The key vault that's associated with the Azure Machine Learning workspace](./media/how-to-enable-virtual-network/workspace-key-vault.png)](./media/how-to-enable-virtual-network/workspace-key-vault.png#lightbox)
@@ -103,18 +104,22 @@ To use Azure Machine Learning experimentation capabilities with Azure Key Vault
103104

104105
<a id="amlcompute"></a>
105106

106-
## Use a Machine Learning Compute
107+
## <a name="compute-instance"></a>Use a Machine Learning Compute
108+
109+
> [!NOTE]
110+
> Compute instances (preview) are currently available only for workspaces with a region of **North Central US** or **UK South**, with support for other regions coming soon.
111+
> Use one of these regions to create a compute instance that can be added to virtual network.
107112
108-
To use an Azure Machine Learning compute cluster in a virtual network, the following network requirements must be met:
113+
To use an Azure Machine Learning compute instance or compute cluster in a virtual network, the following network requirements must be met:
109114

110115
> [!div class="checklist"]
111116
> * The virtual network must be in the same subscription and region as the Azure Machine Learning workspace.
112-
> * The subnet that's specified for the compute cluster must have enough unassigned IP addresses to accommodate the number of VMs that are targeted. If the subnet doesn't have enough unassigned IP addresses, a compute cluster will be partially allocated.
117+
> * The subnet that's specified for the compute instance or cluster must have enough unassigned IP addresses to accommodate the number of VMs that are targeted. If the subnet doesn't have enough unassigned IP addresses, a compute cluster will be partially allocated.
113118
> * Check to see whether your security policies or locks on the virtual network's subscription or resource group restrict permissions to manage the virtual network. If you plan to secure the virtual network by restricting traffic, leave some ports open for the compute service. For more information, see the [Required ports](#mlcports) section.
114-
> * If you're going to put multiple compute clusters in one virtual network, you might need to request a quota increase for one or more of your resources.
115-
> * If the Azure Storage Account(s) for the workspace are also secured in a virtual network, they must be in the same virtual network as the Azure Machine Learning compute cluster.
119+
> * If you're going to put multiple compute instances or clusters in one virtual network, you might need to request a quota increase for one or more of your resources.
120+
> * If the Azure Storage Account(s) for the workspace are also secured in a virtual network, they must be in the same virtual network as the Azure Machine Learning compute instance or cluster. If you are creating a compute instance in the same virtual network, you would need to detach the storage account(s) from the virtual network, create the compute instance in the virtual network, and then attach the storage account(s) back to the virtual network.
116121
117-
The Machine Learning compute cluster automatically allocates additional networking resources in the resource group that contains the virtual network. For each compute cluster, the service allocates the following resources:
122+
The Machine Learning compute instance or cluster automatically allocates additional networking resources in the resource group that contains the virtual network. For each compute instance or cluster, the service allocates the following resources:
118123

119124
* One network security group
120125
* One public IP address
@@ -137,6 +142,8 @@ Machine Learning Compute currently uses the Azure Batch service to provision VMs
137142

138143
- Outbound traffic on any port to the internet.
139144

145+
- For compute instance inbound TCP traffic on port 44224 from a __Service Tag__ of __AzureMachineLearning__.
146+
140147
Exercise caution if you modify or add inbound or outbound rules in Batch-configured NSGs. If an NSG blocks communication to the compute nodes, the compute service sets the state of the compute nodes to unusable.
141148

142149
You don't need to specify NSGs at the subnet level, because the Azure Batch service configures its own NSGs. However, if the specified subnet has associated NSGs or a firewall, configure the inbound and outbound security rules as mentioned earlier.
@@ -149,22 +156,23 @@ The NSG rule configuration in the Azure portal is shown in the following images:
149156

150157
### <a id="limiting-outbound-from-vnet"></a> Limit outbound connectivity from the virtual network
151158

152-
If you don't want to use the default outbound rules and you do want to limit the outbound access of your virtual network, do the following actions:
159+
If you don't want to use the default outbound rules and you do want to limit the outbound access of your virtual network, use the following steps:
153160

154161
- Deny outbound internet connection by using the NSG rules.
155162

156-
- Limit outbound traffic to the following resources:
163+
- Limit outbound traffic to the following items:
157164
- Azure Storage, by using __Service Tag__ of __Storage.Region_Name__ (for example, Storage.EastUS)
158165
- Azure Container Registry, by using __Service Tag__ of __AzureContainerRegistry.Region_Name__ (for example, AzureContainerRegistry.EastUS)
159166
- Azure Machine Learning, by using __Service Tag__ of __AzureMachineLearning__
167+
- In case of compute instance, Azure Cloud, by using __Service Tag__ of __AzureCloud.Region_Name__ (for example, AzureCloud.NorthCentralUS)
160168

161169
The NSG rule configuration in the Azure portal is shown in the following image:
162170

163171
[![The outbound NSG rules for Machine Learning Compute](./media/how-to-enable-virtual-network/limited-outbound-nsg-exp.png)](./media/how-to-enable-virtual-network/limited-outbound-nsg-exp.png#lightbox)
164172

165173
### User-defined routes for forced tunneling
166174

167-
If you're using forced tunneling with Machine Learning Compute, add [user-defined routes (UDRs)](https://docs.microsoft.com/azure/virtual-network/virtual-networks-udr-overview) to the subnet that contains the compute resource.
175+
If you're using forced tunneling with the Machine Learning Compute, add [user-defined routes (UDRs)](https://docs.microsoft.com/azure/virtual-network/virtual-networks-udr-overview) to the subnet that contains the compute resource.
168176

169177
* Establish a UDR for each IP address that's used by the Azure Batch service in the region where your resources exist. These UDRs enable the Batch service to communicate with compute nodes for task scheduling. To get a list of IP addresses of the Batch service, use one of the following methods:
170178

@@ -365,7 +373,7 @@ A private IP address is enabled by configuring AKS to use an _internal load bala
365373
> [!IMPORTANT]
366374
> You cannot enable private IP when creating the Azure Kubernetes Service cluster. It must be enabled as an update to an existing cluster.
367375
368-
The following code snippet demonstrates how to **create a new AKS cluster**, and then update it to use a private IP/internal load balancer
376+
The following code snippet demonstrates how to **create a new AKS cluster**, and then update it to use a private IP/internal load balancer:
369377

370378
```python
371379
import azureml.core
@@ -399,7 +407,6 @@ except:
399407
aks_target.update(update_config)
400408
# Wait for the operation to complete
401409
aks_target.wait_for_completion(show_output = True)
402-
403410
```
404411

405412
__Azure CLI__
@@ -453,4 +460,3 @@ For more information on configuring a network rule, see [Deploy and configure Az
453460
* [Set up training environments](how-to-set-up-training-targets.md)
454461
* [Where to deploy models](how-to-deploy-and-where.md)
455462
* [Securely deploy models with SSL](how-to-secure-web-service.md)
456-

0 commit comments

Comments
 (0)