Skip to content

Commit f3a8a10

Browse files
Acrolinx correctness fix 2
1 parent f6ec785 commit f3a8a10

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/machine-learning/how-to-configure-private-link.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ ws = Workspace.create(name='myworkspace',
7878

7979
# [Azure CLI extension 2.0 preview](#tab/azurecliextensionv2)
8080

81-
When using the Azure CLI [extension 2.0 CLI preview for machine learning](how-to-configure-cli.md), a YAML document is used to configure the workspace. The following is an of creating a new workspace using a YAML configuration:
81+
When using the Azure CLI [extension 2.0 CLI preview for machine learning](how-to-configure-cli.md), a YAML document is used to configure the workspace. The following is an example of creating a new workspace using a YAML configuration:
8282

8383
> [!TIP]
8484
> When using private link, your workspace cannot use Azure Container Registry tasks compute for image building. The `image_build_compute` property in this configuration specifies a CPU compute cluster name to use for Docker image environment building. You can also specify whether the private link workspace should be accessible over the internet using the `public_network_access` property.
@@ -323,7 +323,7 @@ The Azure CLI [extension 1.0 for machine learning](reference-azure-machine-learn
323323
In some situations, you may want to allow someone to connect to your secured workspace over a public endpoint, instead of through the VNet. Or you may want to remove the workspace from the VNet and re-enable public access.
324324

325325
> [!IMPORTANT]
326-
> Enabling public access doesn't remove any private endpoints that exist. All communications between components behind the VNet that the private endpoint(s) connect to is still secured. It enables public access only to the workspace, in addition to the private access through any private endpoints.
326+
> Enabling public access doesn't remove any private endpoints that exist. All communications between components behind the VNet that the private endpoint(s) connect to are still secured. It enables public access only to the workspace, in addition to the private access through any private endpoints.
327327
328328
> [!WARNING]
329329
> When connecting over the public endpoint while the workspace uses a private endpoint to communicate with other resources:
@@ -441,4 +441,4 @@ If you want to create an isolated Azure Kubernetes Service used by the workspace
441441

442442
* If you plan on using a custom DNS solution in your virtual network, see [how to use a workspace with a custom DNS server](how-to-custom-dns.md).
443443

444-
* [API platform network isolation](how-to-configure-network-isolation-with-v2.md)
444+
* [API platform network isolation](how-to-configure-network-isolation-with-v2.md)

0 commit comments

Comments
 (0)