Skip to content

Commit c228483

Browse files
Merge pull request #268301 from cdpark/azureml-vnet-jhirono
User Story 226300: Q&M: AzureML Freshness updates - Virtual networks
2 parents a7f0797 + bd128ad commit c228483

File tree

2 files changed

+14
-14
lines changed

2 files changed

+14
-14
lines changed

articles/machine-learning/how-to-enable-studio-virtual-network.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Enable Azure Machine Learning studio in a virtual network
2+
title: Use Azure Machine Learning studio in a virtual network
33
titleSuffix: Azure Machine Learning
44
description: Learn how to configure Azure Machine Learning studio to access data stored inside of a virtual network.
55
services: machine-learning
@@ -9,7 +9,7 @@ ms.topic: how-to
99
ms.reviewer: larryfr
1010
ms.author: jhirono
1111
author: jhirono
12-
ms.date: 01/29/2024
12+
ms.date: 03/06/2024
1313
ms.custom: tracking-python, security
1414
monikerRange: 'azureml-api-2 || azureml-api-1'
1515
---
@@ -20,7 +20,7 @@ monikerRange: 'azureml-api-2 || azureml-api-1'
2020

2121
This article explains how to use Azure Machine Learning studio in a virtual network. The studio includes features like AutoML, the designer, and data labeling.
2222

23-
Some of the studio's features are disabled by default in a virtual network. To re-enable these features, you must enable managed identity for storage accounts you intend to use in the studio.
23+
Some of the studio's features are disabled by default in a virtual network. To re-enable these features, you must enable managed identity for storage accounts that you intend to use in the studio.
2424

2525
The following operations are disabled by default in a virtual network:
2626

@@ -61,16 +61,16 @@ In this article, you learn how to:
6161
* An existing [Azure storage account added your virtual network](v1/how-to-secure-workspace-vnet.md#secure-azure-storage-accounts).
6262
:::moniker-end
6363

64-
* For a tutorial on creating a secure workspace, see [Tutorial: Create a secure workspace](tutorial-create-secure-workspace.md) or [Tutorial: Create a secure workspace using a template](tutorial-create-secure-workspace-template.md).
64+
* To learn how to create a secure workspace, see [Tutorial: Create a secure workspace](tutorial-create-secure-workspace.md) or [Tutorial: Create a secure workspace using a template](tutorial-create-secure-workspace-template.md).
6565

6666
## Limitations
6767

6868
### Azure Storage Account
6969

7070
* When the storage account is in the virtual network, there are extra validation requirements to use studio:
7171

72-
* If the storage account uses a [service endpoint](how-to-secure-workspace-vnet.md?tabs=se#secure-azure-storage-accounts), the workspace private endpoint and storage service endpoint must be in the same subnet of the VNet.
73-
* If the storage account uses a [private endpoint](how-to-secure-workspace-vnet.md?tabs=pe#secure-azure-storage-accounts), the workspace private endpoint and storage private endpoint must be in the same VNet. In this case, they can be in different subnets.
72+
* If the storage account uses a [service endpoint](how-to-secure-workspace-vnet.md?tabs=se#secure-azure-storage-accounts), the workspace private endpoint and storage service endpoint must be in the same subnet of the virtual network.
73+
* If the storage account uses a [private endpoint](how-to-secure-workspace-vnet.md?tabs=pe#secure-azure-storage-accounts), the workspace private endpoint and storage private endpoint must be in the same virtual network. In this case, they can be in different subnets.
7474

7575
### Designer sample pipeline
7676

@@ -83,13 +83,13 @@ To resolve this issue, use a public workspace to run the sample pipeline. Or rep
8383
Use the following steps to enable access to data stored in Azure Blob and File storage:
8484

8585
> [!TIP]
86-
> The first step is not required for the default storage account for the workspace. All other steps are required for *any* storage account behind the VNet and used by the workspace, including the default storage account.
86+
> The first step isn't required for the default storage account for the workspace. All other steps are required for *any* storage account behind the VNet and used by the workspace, including the default storage account.
8787
8888
1. **If the storage account is the *default* storage for your workspace, skip this step**. If it isn't the default, **grant the workspace managed identity the Storage Blob Data Reader role** for the Azure storage account so that it can read data from blob storage.
8989

9090
For more information, see the [Blob Data Reader](../role-based-access-control/built-in-roles.md#storage-blob-data-reader) built-in role.
9191

92-
1. **Grant the workspace managed identity the Reader role for storage private endpoints**. If your storage service uses a private endpoint, grant the workspace's managed identity **Reader** access to the private endpoint. The workspace's managed identity in Microsoft Entra ID has the same name as your Azure Machine Learning workspace. A private endpoint is necessary for both blob and file storage types.
92+
1. **Grant the workspace managed identity the Reader role for storage private endpoints**. If your storage service uses a private endpoint, grant the workspace's managed identity *Reader* access to the private endpoint. The workspace's managed identity in Microsoft Entra ID has the same name as your Azure Machine Learning workspace. A private endpoint is necessary for both blob and file storage types.
9393

9494
> [!TIP]
9595
> Your storage account might have multiple private endpoints. For example, one storage account might have separate private endpoint for blob, file, and dfs (Azure Data Lake Storage Gen2). Add the managed identity to all these endpoints.
@@ -122,7 +122,7 @@ Use the following steps to enable access to data stored in Azure Blob and File s
122122

123123
1. In the **Networking** settings for the Azure Storage Account, add the `Microsoft.MachineLearningService/workspaces` **Resource type**, and set the **Instance name** to the workspace.
124124

125-
These steps add the workspace's managed identity as a Reader to the new storage service using Azure RBAC. Reader access allows the workspace to view the resource, but not make changes.
125+
These steps add the workspace's managed identity as a Reader to the new storage service using Azure role-based access control (RBAC). Reader access allows the workspace to view the resource, but not make changes.
126126

127127
## Datastore: Azure Data Lake Storage Gen1
128128

@@ -156,18 +156,18 @@ Make sure that you have access to the intermediate storage accounts in your virt
156156

157157
## Access the studio from a resource inside the VNet
158158

159-
If you're accessing the studio from a resource inside of a virtual network (for example, a compute instance or virtual machine), you must allow outbound traffic from the virtual network to the studio.
159+
If you access the studio from a resource inside of a virtual network (for example, a compute instance or virtual machine), you must allow outbound traffic from the virtual network to the studio.
160160

161-
For example, if you're using network security groups (NSG) to restrict outbound traffic, add a rule to a **service tag** destination of `AzureFrontDoor.Frontend`.
161+
For example, if you use network security groups (NSG) to restrict outbound traffic, add a rule to a **service tag** destination of `AzureFrontDoor.Frontend`.
162162

163163
## Firewall settings
164164

165165
Some storage services, such as Azure Storage Account, have firewall settings that apply to the public endpoint for that specific service instance. Usually this setting allows you to allow/disallow access from specific IP addresses from the public internet. **This is not supported** when using Azure Machine Learning studio. It's supported when using the Azure Machine Learning SDK or CLI.
166166

167167
> [!TIP]
168-
> Azure Machine Learning studio is supported when using the Azure Firewall service. For more information, see [Use your workspace behind a firewall](how-to-access-azureml-behind-firewall.md).
168+
> Azure Machine Learning studio is supported when using the Azure Firewall service. For more information, see [Configure inbound and outbound network traffic](how-to-access-azureml-behind-firewall.md).
169169
170-
## Next steps
170+
## Related content
171171

172172
This article is part of a series on securing an Azure Machine Learning workflow. See the other articles in this series:
173173

articles/machine-learning/includes/managed-vnet-note.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,4 @@ ms.author: larryfr
88
---
99

1010
> [!TIP]
11-
> Microsoft recommends using an Azure Machine Learning **managed virtual networks** instead of the steps in this article. With a managed virtual network, Azure Machine Learning handles the job of network isolation for your workspace and managed computes. You can also add private endpoints for resources needed by the workspace, such as Azure Storage Account. For more information, see [Workspace managed network isolation](../how-to-managed-network.md).
11+
> Microsoft recommends using Azure Machine Learning **managed virtual networks** instead of the steps in this article. With a managed virtual network, Azure Machine Learning handles the job of network isolation for your workspace and managed computes. You can also add private endpoints for resources needed by the workspace, such as Azure Storage Account. For more information, see [Workspace managed network isolation](../how-to-managed-network.md).

0 commit comments

Comments
 (0)