Skip to content

Commit f5d7784

Browse files
author
Jill Grant
authored
Merge pull request #266080 from meerakurup/patch-1
Update concept-secure-online-endpoint.md
2 parents bf70e30 + 35b91ea commit f5d7784

File tree

4 files changed

+30
-4
lines changed

4 files changed

+30
-4
lines changed

articles/machine-learning/concept-secure-online-endpoint.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.author: sehan
1111
ms.reviewer: mopeakande
1212
reviewer: msakande
1313
ms.custom: devplatv2, moe-wsvnet
14-
ms.date: 09/27/2023
14+
ms.date: 02/29/2024
1515
---
1616

1717
# Network isolation with managed online endpoints
@@ -108,6 +108,10 @@ To learn more about configurations for the workspace managed virtual network, se
108108

109109
## Scenarios for network isolation configuration
110110

111+
Your Azure Machine Learning workspace and managed online endpoint each have a `public_network_access` flag that you can use to configure their inbound communication. On the other hand, outbound communication from a deployment depends on the workspace's managed virtual network.
112+
113+
#### Communication with the managed online endpoint
114+
111115
Suppose a managed online endpoint has a deployment that uses an AI model, and you want to use an app to send scoring requests to the endpoint. You can decide what network isolation configuration to use for the managed online endpoint as follows:
112116

113117
**For inbound communication**:
@@ -124,6 +128,19 @@ However, if you want your deployment to access the internet, you can use the wor
124128

125129
Finally, if your deployment doesn't need to access private Azure resources and you don't need to control access to the internet, then you don't need to use a workspace managed virtual network.
126130

131+
#### Inbound communication to the Azure Machine Learning workspace
132+
133+
You can use the `public_network_access` flag of your Azure Machine Learning workspace to enable or disable inbound workspace access.
134+
Typically, if you secure inbound communication to your workspace (by disabling the workspace's `public_network_access` flag) you also want to secure inbound communication to your managed online endpoint.
135+
136+
The following chart shows a typical workflow for securing inbound communication to your Azure Machine Learning workspace and your managed online endpoint. For best security, we recommend that you disable the `public_network_access` flags for the workspace and the managed online endpoint to ensure that both can't be accessed via the public internet. If the workspace doesn't have a private endpoint, you can create one, making sure to include proper DNS resolution. You can then access the managed online endpoint by using the workspace's private endpoint.
137+
138+
:::image type="content" source="media/concept-secure-online-endpoint/network-isolation-flowchart.png" alt-text="A screenshot showing a typical workflow for securing inbound communication to your workspace and managed online endpoint." lightbox="media/concept-secure-online-endpoint/network-isolation-flowchart.png":::
139+
140+
[!INCLUDE [machine-learning-add-dns-records](includes/machine-learning-add-dns-records.md)]
141+
142+
For more information on DNS resolution for your workspace and private endpoint, see [How to use your workspace with a custom DNS server](how-to-custom-dns.md).
143+
127144
## Appendix
128145

129146
### Secure outbound access with legacy network isolation method

articles/machine-learning/how-to-custom-dns.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -111,9 +111,7 @@ The Fully Qualified Domains resolve to the following Canonical Names (CNAMEs) ca
111111

112112
The FQDNs resolve to the IP addresses of the Azure Machine Learning workspace in that region. However, resolution of the workspace Private Link FQDNs can be overridden by using a custom DNS server hosted in the virtual network. For an example of this architecture, see the [custom DNS server hosted in a vnet](#example-custom-dns-server-hosted-in-vnet) example.
113113

114-
> [!NOTE]
115-
> Managed online endpoints share the workspace private endpoint. If you are manually adding DNS records to the private DNS zone `privatelink.api.azureml.ms`, an A record with wildcard
116-
> `*.<per-workspace globally-unique identifier>.inference.<region>.privatelink.api.azureml.ms` should be added to route all endpoints under the workspace to the private endpoint.
114+
[!INCLUDE [machine-learning-add-dns-records](includes/machine-learning-add-dns-records.md)]
117115

118116
## Manual DNS server integration
119117

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
author: msakande
3+
ms.service: machine-learning
4+
ms.topic: include
5+
ms.date: 02/27/2024
6+
ms.author: mopeakande
7+
---
8+
9+
> [!NOTE]
10+
> Managed online endpoints share the workspace's private endpoint. If you're manually adding DNS records to the private DNS zone `privatelink.api.azureml.ms`, an A record with wildcard
11+
> `*.<per-workspace globally-unique identifier>.inference.<region>.privatelink.api.azureml.ms` should be added to route all endpoints under the workspace to the private endpoint.
72.3 KB
Loading

0 commit comments

Comments
 (0)