Skip to content

Commit 9e04177

Browse files
Merge pull request #223252 from dem108/patch-15
Clarify limitation with network isolation with MCR
2 parents 80a1568 + 4c07924 commit 9e04177

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/machine-learning/how-to-secure-online-endpoint.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
99
ms.reviewer: mopeakande
1010
author: dem108
1111
ms.author: sehan
12-
ms.date: 12/08/2022
12+
ms.date: 01/06/2023
1313
ms.custom: event-tier1-build-2022
1414
---
1515

@@ -117,11 +117,14 @@ When `public_network_access` is `Disabled`, inbound scoring requests are receive
117117
118118
## Outbound (resource access)
119119

120-
To restrict communication between a deployment and external resources, including the Azure resources it uses, set the deployment's `egress_public_network_access` flag to `disabled`. Use this flag to ensure that the download of the model, code, and images needed by your deployment are secured with a private endpoint. Note that disabling the flag alone is not enoughyour workspace must also have a private link that allows access to Azure resources via a private endpoint. See the [Prerequisites](#prerequisites) for more details.
120+
To restrict communication between a deployment and external resources, including the Azure resources it uses, set the deployment's `egress_public_network_access` flag to `disabled`. Use this flag to ensure that the download of the model, code, and images needed by your deployment are secured with a private endpoint. Note that disabling the flag alone is not enoughyour workspace must also have a private link that allows access to Azure resources via a private endpoint. See the [Prerequisites](#prerequisites) for more details.
121121

122122
> [!WARNING]
123123
> You cannot update (enable or disable) the `egress_public_network_access` flag after creating the deployment. Attempting to change the flag while updating the deployment will fail with an error.
124124
125+
> [!NOTE]
126+
> For online deployments with `egress_public_network_access` flag set to `disabled`, access from the deployments to Microsoft Container Registry (MCR) is restricted. If you want to leverage container images from MCR (such as when using curated environment or mlflow no-code deployment), recommendation is to push the images into the Azure Container Registry (ACR) which is attached with the workspace. The images in this ACR is accessible to secured deployments via the private endpoints which are automatically created on behalf of you when you set `egress_public_network_access` flag to `disabled`. For a quick example, please refer to this [custom container example](https://github.com/Azure/azureml-examples/tree/main/cli/endpoints/online/custom-container/minimal/single-model).
127+
125128
# [Azure CLI](#tab/cli)
126129

127130
```azurecli

0 commit comments

Comments
 (0)