Skip to content

Commit afd8ca9

Browse files
authored
Elaborate on supported / unsupported cases
For instance, model assets on different storage account
1 parent 786e8c6 commit afd8ca9

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

articles/machine-learning/how-to-secure-online-endpoint.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
99
ms.reviewer: mopeakande
1010
author: dem108
1111
ms.author: sehan
12-
ms.date: 01/06/2023
12+
ms.date: 03/08/2023
1313
ms.custom: event-tier1-build-2022
1414
---
1515

@@ -163,10 +163,16 @@ ml_client.begin_create_or_update(blue_deployment)
163163
The deployment communicates with these resources over the private endpoint:
164164

165165
* The Azure Machine Learning workspace
166-
* The Azure Storage blob that is the default storage for the workspace
166+
* The Azure Storage blob that is associated with the workspace
167167
* The Azure Container Registry for the workspace
168168

169-
When you configure the `egress_public_network_access` to `disabled`, a new private endpoint is created per deployment, per service. For example, if you set the flag to `disabled` for three deployments to an online endpoint, nine private endpoints are created. Each deployment would have three private endpoints to communicate with the workspace, blob, and container registry.
169+
When you configure the `egress_public_network_access` to `disabled`, a new private endpoint is created per deployment, per service. For example, if you set the flag to `disabled` for three deployments to an online endpoint, a total of nine private endpoints are created. Each deployment would have three private endpoints to communicate with the workspace, blob, and container registry. To confirm the creation of the private endpoints, first check the storage account and container registry associated with the workspace (see [Download a configuration file](how-to-manage-workspace.md#download-a-configuration-file)), find each resource from Azure Portal and check `Private endpoint connections` tab under the `Networking` menu.
170+
171+
> [!IMPORTANT]
172+
> - Outbound communication from managed online endpoint deployment is to the _workspace API_. When the endpoint is configured to use __public outbound__ (in other words, `public_network_access` flag for the endpoint is set to `enabled`), then the workspace must be able to accept that public communication (`public_network_access` flag for the workspace set to `enabled`).
173+
> - When online deployments are created with `egress_public_network_access` flag set to `disabled`, they will have access to above secured resources only. For instance, if the deployment uses model assets uploaded to other storage accounts, the model download will fail. Ensure model assets are on the storage account associated with the workspace.
174+
> - When `egress_public_network_access` is set to `disabled`, the deployment can only access the workspace-associated resources secured in the VNET. On the contrary, when `egress_public_network_access` is set to `enabled`, the deployment can only access the resources with public access, which means it cannot access the resources secured in the VNET.
175+
170176

171177
## Scenarios
172178

@@ -179,9 +185,6 @@ The following table lists the supported configurations when configuring inbound
179185
| public inbound with secure outbound | `public_network_access` is enabled | `egress_public_network_access` is disabled | Yes |
180186
| public inbound with public outbound | `public_network_access` is enabled</br>The workspace must also allow public access. | `egress_public_network_access` is enabled | Yes |
181187

182-
> [!IMPORTANT]
183-
> - Outbound communication from managed online endpoint deployment is to the _workspace API_. When the endpoint is configured to use __public outbound__, then the workspace must be able to accept that public communication (allow public access).
184-
> - When `egress_public_network_access` is disabled, the deployment can only access the resources secured in the VNET. When `egress_public_network_access` is enabled, the deployment can only access the resources with public access, which means it cannot access the resources secured in the VNET.
185188

186189
## End-to-end example
187190

0 commit comments

Comments
 (0)