You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-secure-training-vnet.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -122,10 +122,14 @@ In this article you learn how to secure the following training compute resources
122
122
> [!IMPORTANT]
123
123
> Using the __no public IP__ configuration requires you to opt-in to this preview. Before opting in, you must have created a workspace and a compute instance on the subscription you plan to use. You can delete the compute instance and/or workspace after creating them.
124
124
>
125
-
> Use the form at [https://forms.office.com/r/0Rw6mXTT07](https://forms.office.com/r/0Rw6mXTT07) to opt in to this Azure Machine Learning preview. Microsoft will contact you once your subscription has been allowlisted to the preview. It may take one to two weeks to allowlist your subscription.
125
+
> Use the form at [https://forms.office.com/r/0Rw6mXTT07](https://forms.office.com/r/0Rw6mXTT07) to opt in to this Azure Machine Learning preview. Microsoft will contact you once your subscription has been allowlisted to the preview. It may take one to two weeks to allowlist your subscription. Opting-in provides the following benefits:
126
+
> - Additional regions are available for use with no public IP configuration
> - No networking costs from load balancer, public IP, or private link service.
126
129
>
127
130
> If you have been using compute instances configured for no public IP without opting-in to the preview using the form, you will need to delete and recreate them after your subscription has been allowlisted to take advantage of the new architecture and region availability. For existing compute clusters configured for no public IP, once the cluster has been reduced to 0 nodes (requires the minimum nodes to be configured as 0), it will take advantage of the new architecture the next time nodes are allocated after the subscription is allowlisted.
* If you have configured Azure Container Registry for your workspace behind the virtual network, you must use a compute cluster to build Docker images. If you use a compute cluster configured for no public IP address, you must provide some method for the cluster to access the public internet. Internet access is required when accessing images stored on the Microsoft Container Registry, packages installed on Pypi, Conda, etc. For more information, see [Enable Azure Container Registry](how-to-secure-workspace-vnet.md#enable-azure-container-registry-acr).
131
135
@@ -177,7 +181,7 @@ For more information on using Azure Databricks in a virtual network, see [Deploy
177
181
178
182
For information on using a firewall solution, see [Use a firewall with Azure Machine Learning](how-to-access-azureml-behind-firewall.md).
179
183
180
-
## <aname="compute-cluster"></a>Compute clusters
184
+
## Compute cluster
181
185
182
186
Use the following steps to create a compute cluster in the Azure Machine Learning studio:
183
187
@@ -205,7 +209,7 @@ When the creation process finishes, you train your model by using the cluster in
### <aname="no-public-ip-amlcompute"></a>No public IP for compute clusters (preview)
212
+
### No public IP for compute clusters (preview)
209
213
210
214
When you enable **No public IP**, your compute cluster doesn't use a public IP for communication with any dependencies. Instead, it communicates solely within the virtual network using Azure Private Link ecosystem and service/private endpoints, eliminating the need for a public IP entirely. No public IP removes access and discoverability of compute cluster nodes from the internet thus eliminating a significant threat vector. **No public IP** clusters help comply with no public IP policies many enterprises have.
211
215
@@ -224,8 +228,6 @@ You can use a service endpoint or private endpoint for your Azure container regi
224
228
To create a no public IP address compute cluster (a preview feature) in studio, set **No public IP** checkbox in the virtual network section.
225
229
You can also create no public IP compute cluster through an ARM template. In the ARM template set enableNodePublicIP parameter to false.
* If you get this error message during creation of cluster `The specified subnet has PrivateLinkServiceNetworkPolicies or PrivateEndpointNetworkEndpoints enabled`, follow the instructions from [Disable network policies for Private Link service](../private-link/disable-private-link-service-network-policy.md) and [Disable network policies for Private Endpoint](../private-link/disable-private-endpoint-network-policy.md).
@@ -238,7 +240,7 @@ You can also create no public IP compute cluster through an ARM template. In the
238
240
239
241
For steps on how to create a compute instance deployed in a virtual network, see [Create and manage an Azure Machine Learning compute instance](how-to-create-manage-compute-instance.md).
240
242
241
-
### <aname="no-public-ip"></a>No public IP for compute instances (preview)
243
+
### No public IP for compute instances (preview)
242
244
243
245
When you enable **No public IP**, your compute instance doesn't use a public IP for communication with any dependencies. Instead, it communicates solely within the virtual network using Azure Private Link ecosystem and service/private endpoints, eliminating the need for a public IP entirely. No public IP removes access and discoverability of compute instance node from the internet thus eliminating a significant threat vector. Compute instances will also do packet filtering to reject any traffic from outside virtual network. **No public IP** instances are dependent on [Azure Private Link](how-to-configure-private-link.md) for Azure Machine Learning workspace.
244
246
@@ -258,8 +260,6 @@ Next steps:
258
260
*[Use custom DNS](how-to-custom-dns.md)
259
261
*[Use a firewall](how-to-access-azureml-behind-firewall.md)
0 commit comments