You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-studio/how-to/configure-managed-network.md
+1-25Lines changed: 1 addition & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ There are three different configuration modes for outbound traffic from the mana
48
48
> While you can create a private endpoint for Azure AI Search, the connected services must allow public networking. For more information, see [Connectivity to other services](#connectivity-to-other-services).
49
49
50
50
* You must add rules for each outbound connection you need to allow.
51
-
* Adding FQDN outbound rules __increase your costs__ as this rule type uses Azure Firewall.
51
+
* Adding FQDN outbound rules __increase your costs__ as this rule type uses Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](#pricing).
52
52
* The default rules for _allow only approved outbound_ are designed to minimize the risk of data exfiltration. Any outbound rules you add might increase your risk.
53
53
54
54
The managed virtual network is preconfigured with [required default rules](#list-of-required-rules). It's also configured for private endpoint connections to your hub, the hub's default storage, container registry, and key vault if they're configured as private or the hub isolation mode is set to allow only approved outbound. After choosing the isolation mode, you only need to consider other outbound requirements you might need to add.
@@ -380,9 +380,6 @@ To configure a managed virtual network that allows internet outbound communicati
380
380
381
381
If the destination typeis__FQDN__, provide the following information:
382
382
383
-
> [!WARNING]
384
-
>FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](#pricing).
385
-
386
383
*__FQDN destination__: The fully qualified domain name to add to the approved outbound rules.
387
384
388
385
Select __Save__ to save the rule. You can continue using __Add user-defined outbound rules__ to add rules.
@@ -415,9 +412,6 @@ You can also define _outbound rules_ to define approved outbound communication.
415
412
>* Adding an outbound for a service tag orFQDNis only valid when the managed VNet is configured to `allow_only_approved_outbound`.
416
413
>* If you add outbound rules, Microsoft can't guarantee data exfiltration.
417
414
418
-
> [!WARNING]
419
-
>FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are added to your billing. For more information, see [Pricing](#pricing).
420
-
421
415
```yaml
422
416
managed_network:
423
417
isolation_mode: allow_only_approved_outbound
@@ -476,9 +470,6 @@ You can configure a managed virtual network using either the `az ml workspace cr
476
470
477
471
The following YAMLfile defines a managed virtual network for the hub. It also demonstrates how to add an approved outbound to the managed virtual network. In this example, an outbound rule is added for both a service tag:
478
472
479
-
> [!WARNING]
480
-
>FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are added to your billing. For more information, see [Pricing](#pricing).
481
-
482
473
```yaml
483
474
name: myhub_dep
484
475
managed_network:
@@ -522,9 +513,6 @@ To configure a managed virtual network that allows only approved outbound commun
522
513
>* Adding an outbound for a service tag orFQDNis only valid when the managed VNet is configured to `IsolationMode.ALLOW_ONLY_APPROVED_OUTBOUND`.
523
514
>* If you add outbound rules, Microsoft can't guarantee data exfiltration.
524
515
525
-
> [!WARNING]
526
-
>FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are added to your billing. For more information, see [Pricing](#pricing).
@@ -587,9 +575,6 @@ To configure a managed virtual network that allows only approved outbound commun
587
575
588
576
> [!TIP]
589
577
> Adding an outbound for a service tag orFQDNis only valid when the managed VNet is configured to `IsolationMode.ALLOW_ONLY_APPROVED_OUTBOUND`.
590
-
591
-
> [!WARNING]
592
-
>FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are added to your billing. For more information, see [Pricing](#pricing).
593
578
594
579
```python
595
580
# Get the existing hub
@@ -728,9 +713,6 @@ __Inbound__ service tag rules:
728
713
729
714
To allow installation of __Python packages for training and deployment__, add outbound _FQDN_ rules to allow traffic to the following host names:
730
715
731
-
> [!WARNING]
732
-
>FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](#pricing).
733
-
734
716
> [!NOTE]
735
717
> This isnot a complete list of the hosts required forall Python resources on the internet, only the most commonly used. For example, if you need access to a GitHub repository or other host, you must identify and add the required hosts for that scenario.
736
718
@@ -748,9 +730,6 @@ Visual Studio Code relies on specific hosts and ports to establish a remote conn
748
730
#### Hosts
749
731
If you plan to use __Visual Studio Code__ with the hub, add outbound _FQDN_ rules to allow traffic to the following hosts:
750
732
751
-
> [!WARNING]
752
-
>FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](#pricing).
753
-
754
733
*`*.vscode.dev`
755
734
*`vscode.blob.core.windows.net`
756
735
*`*.gallerycdn.vsassets.io`
@@ -773,9 +752,6 @@ You must allow network traffic to ports 8704 to 8710. The VS Code server dynamic
773
752
774
753
If you plan to use __HuggingFace models__ with the hub, add outbound _FQDN_ rules to allow traffic to the following hosts:
775
754
776
-
> [!WARNING]
777
-
>FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](#pricing).
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-identity-access-azure-sql-with-managed-identity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,7 +76,7 @@ To enable system-assigned managed identity in the Azure portal:
76
76
1. Select Identity.
77
77
1. Within the System assigned tab, switch Status to On. Click Save.
78
78
79
-

79
+
:::image type="content" source="./media/functions-identity-access-sql-with-managed-identity/function-system-identity.png" alt-text="Screenshot of function app, showing the Status set to On.":::
80
80
81
81
82
82
For information on enabling system-assigned managed identity through Azure CLI or PowerShell, check out more information on [using managed identities with Azure Functions](../app-service/overview-managed-identity.md?tabs=dotnet&toc=%2fazure%2fazure-functions%2ftoc.json#add-a-system-assigned-identity).
0 commit comments