You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article explains how to use Azure Machine Learning studio in a virtual network. The studio includes features like AutoML, the designer, and data labeling.
22
22
23
-
Some of the studio's features are disabled by default in a virtual network. To re-enable these features, you must enable managed identity for storage accounts you intend to use in the studio.
23
+
Some of the studio's features are disabled by default in a virtual network. To re-enable these features, you must enable managed identity for storage accounts that you intend to use in the studio.
24
24
25
25
The following operations are disabled by default in a virtual network:
26
26
@@ -61,16 +61,16 @@ In this article, you learn how to:
61
61
* An existing [Azure storage account added your virtual network](v1/how-to-secure-workspace-vnet.md#secure-azure-storage-accounts).
62
62
:::moniker-end
63
63
64
-
*For a tutorial on creating a secure workspace, see [Tutorial: Create a secure workspace](tutorial-create-secure-workspace.md) or [Tutorial: Create a secure workspace using a template](tutorial-create-secure-workspace-template.md).
64
+
*To learn how to create a secure workspace, see [Tutorial: Create a secure workspace](tutorial-create-secure-workspace.md) or [Tutorial: Create a secure workspace using a template](tutorial-create-secure-workspace-template.md).
65
65
66
66
## Limitations
67
67
68
68
### Azure Storage Account
69
69
70
70
* When the storage account is in the virtual network, there are extra validation requirements to use studio:
71
71
72
-
* If the storage account uses a [service endpoint](how-to-secure-workspace-vnet.md?tabs=se#secure-azure-storage-accounts), the workspace private endpoint and storage service endpoint must be in the same subnet of the VNet.
73
-
* If the storage account uses a [private endpoint](how-to-secure-workspace-vnet.md?tabs=pe#secure-azure-storage-accounts), the workspace private endpoint and storage private endpoint must be in the same VNet. In this case, they can be in different subnets.
72
+
* If the storage account uses a [service endpoint](how-to-secure-workspace-vnet.md?tabs=se#secure-azure-storage-accounts), the workspace private endpoint and storage service endpoint must be in the same subnet of the virtual network.
73
+
* If the storage account uses a [private endpoint](how-to-secure-workspace-vnet.md?tabs=pe#secure-azure-storage-accounts), the workspace private endpoint and storage private endpoint must be in the same virtual network. In this case, they can be in different subnets.
74
74
75
75
### Designer sample pipeline
76
76
@@ -83,13 +83,13 @@ To resolve this issue, use a public workspace to run the sample pipeline. Or rep
83
83
Use the following steps to enable access to data stored in Azure Blob and File storage:
84
84
85
85
> [!TIP]
86
-
> The first step is not required for the default storage account for the workspace. All other steps are required for *any* storage account behind the VNet and used by the workspace, including the default storage account.
86
+
> The first step isn't required for the default storage account for the workspace. All other steps are required for *any* storage account behind the VNet and used by the workspace, including the default storage account.
87
87
88
88
1.**If the storage account is the *default* storage for your workspace, skip this step**. If it isn't the default, **grant the workspace managed identity the Storage Blob Data Reader role** for the Azure storage account so that it can read data from blob storage.
89
89
90
90
For more information, see the [Blob Data Reader](../role-based-access-control/built-in-roles.md#storage-blob-data-reader) built-in role.
91
91
92
-
1.**Grant the workspace managed identity the Reader role for storage private endpoints**. If your storage service uses a private endpoint, grant the workspace's managed identity **Reader** access to the private endpoint. The workspace's managed identity in Microsoft Entra ID has the same name as your Azure Machine Learning workspace. A private endpoint is necessary for both blob and file storage types.
92
+
1.**Grant the workspace managed identity the Reader role for storage private endpoints**. If your storage service uses a private endpoint, grant the workspace's managed identity *Reader* access to the private endpoint. The workspace's managed identity in Microsoft Entra ID has the same name as your Azure Machine Learning workspace. A private endpoint is necessary for both blob and file storage types.
93
93
94
94
> [!TIP]
95
95
> Your storage account might have multiple private endpoints. For example, one storage account might have separate private endpoint for blob, file, and dfs (Azure Data Lake Storage Gen2). Add the managed identity to all these endpoints.
@@ -122,7 +122,7 @@ Use the following steps to enable access to data stored in Azure Blob and File s
122
122
123
123
1. In the **Networking** settings for the Azure Storage Account, add the `Microsoft.MachineLearningService/workspaces`**Resource type**, and set the **Instance name** to the workspace.
124
124
125
-
These steps add the workspace's managed identity as a Reader to the new storage service using Azure RBAC. Reader access allows the workspace to view the resource, but not make changes.
125
+
These steps add the workspace's managed identity as a Reader to the new storage service using Azure role-based access control (RBAC). Reader access allows the workspace to view the resource, but not make changes.
126
126
127
127
## Datastore: Azure Data Lake Storage Gen1
128
128
@@ -156,18 +156,18 @@ Make sure that you have access to the intermediate storage accounts in your virt
156
156
157
157
## Access the studio from a resource inside the VNet
158
158
159
-
If you're accessing the studio from a resource inside of a virtual network (for example, a compute instance or virtual machine), you must allow outbound traffic from the virtual network to the studio.
159
+
If you access the studio from a resource inside of a virtual network (for example, a compute instance or virtual machine), you must allow outbound traffic from the virtual network to the studio.
160
160
161
-
For example, if you're using network security groups (NSG) to restrict outbound traffic, add a rule to a **service tag** destination of `AzureFrontDoor.Frontend`.
161
+
For example, if you use network security groups (NSG) to restrict outbound traffic, add a rule to a **service tag** destination of `AzureFrontDoor.Frontend`.
162
162
163
163
## Firewall settings
164
164
165
165
Some storage services, such as Azure Storage Account, have firewall settings that apply to the public endpoint for that specific service instance. Usually this setting allows you to allow/disallow access from specific IP addresses from the public internet. **This is not supported** when using Azure Machine Learning studio. It's supported when using the Azure Machine Learning SDK or CLI.
166
166
167
167
> [!TIP]
168
-
> Azure Machine Learning studio is supported when using the Azure Firewall service. For more information, see [Use your workspace behind a firewall](how-to-access-azureml-behind-firewall.md).
168
+
> Azure Machine Learning studio is supported when using the Azure Firewall service. For more information, see [Configure inbound and outbound network traffic](how-to-access-azureml-behind-firewall.md).
169
169
170
-
## Next steps
170
+
## Related content
171
171
172
172
This article is part of a series on securing an Azure Machine Learning workflow. See the other articles in this series:
Copy file name to clipboardExpand all lines: articles/machine-learning/includes/managed-vnet-note.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,4 +8,4 @@ ms.author: larryfr
8
8
---
9
9
10
10
> [!TIP]
11
-
> Microsoft recommends using an Azure Machine Learning **managed virtual networks** instead of the steps in this article. With a managed virtual network, Azure Machine Learning handles the job of network isolation for your workspace and managed computes. You can also add private endpoints for resources needed by the workspace, such as Azure Storage Account. For more information, see [Workspace managed network isolation](../how-to-managed-network.md).
11
+
> Microsoft recommends using Azure Machine Learning **managed virtual networks** instead of the steps in this article. With a managed virtual network, Azure Machine Learning handles the job of network isolation for your workspace and managed computes. You can also add private endpoints for resources needed by the workspace, such as Azure Storage Account. For more information, see [Workspace managed network isolation](../how-to-managed-network.md).
0 commit comments