Skip to content

Commit 01fa4ed

Browse files
committed
Addressed reviewer comments & removed image
1 parent 6e5b90a commit 01fa4ed

File tree

3 files changed

+27
-29
lines changed

3 files changed

+27
-29
lines changed

learn-pr/advocates/restrict-azure-machine-learning-workspace-network/includes/2-managed-network-isolation.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,5 +2,3 @@ Using a managed virtual network provides an easier configuration for network iso
22

33
- **Allow internet outbound mode**: Use this option if you want to allow your machine learning engineers access the internet freely. You can create other private endpoint outbound rules to let them access your private resources on Azure.
44
- **Allow only approved outbound mode**: Use this option if you want to minimize data exfiltration risk and control what your machine learning engineers can access. You can control outbound rules using private endpoint, service tag, and FQDN.
5-
6-
![Diagram of a managed network with allow only approved outbound mode configured.](../media/managed-virtual-network.png)

learn-pr/advocates/restrict-azure-machine-learning-workspace-network/includes/5-configure-managed-virtual-network-approved-outbound.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -2,39 +2,39 @@ To configure a managed virtual network that allows only approved outbound commun
22

33
1. On Azure Cloud Shell, run the following command to update an existing Azure Machine Learning workspace:
44

5-
```azurecli
6-
az ml workspace update --name ws --resource-group rg --managed-network allow_only_approved_outbound
7-
```
5+
```azurecli
6+
az ml workspace update --name ws --resource-group rg --managed-network allow_only_approved_outbound
7+
```
88
99
1. Next, you need a YAML file to configure the rules for the approved destinations. An example with sample rules for service tag, FQDN, and private endpoint is as follows:
1010
11-
```yaml
12-
name: myworkspace_dep
13-
managed_network:
14-
isolation_mode: allow_only_approved_outbound
15-
outbound_rules:
16-
- name: added-servicetagrule
17-
destination:
18-
port_ranges: [80, 8080]
19-
protocol: TCP
20-
service_tag: DataFactory
21-
type: service_tag
22-
- name: add-fqdnrule
23-
destination: 'pypi.org'
24-
type: fqdn
25-
- name: added-perule
26-
destination:
27-
service_resource_id: /subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP>/providers/Microsoft.Storage/storageAccounts/<STORAGE_ACCOUNT_NAME>
28-
spark_enabled: true
29-
subresource_target: blob
30-
type: private_endpoint
31-
```
11+
```yaml
12+
name: myworkspace_dep
13+
managed_network:
14+
isolation_mode: allow_only_approved_outbound
15+
outbound_rules:
16+
- name: added-servicetagrule
17+
destination:
18+
port_ranges: [80, 8080]
19+
protocol: TCP
20+
service_tag: DataFactory
21+
type: service_tag
22+
- name: add-fqdnrule
23+
destination: 'pypi.org'
24+
type: fqdn
25+
- name: added-perule
26+
destination:
27+
service_resource_id: /subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP>/providers/Microsoft.Storage/storageAccounts/<STORAGE_ACCOUNT_NAME>
28+
spark_enabled: true
29+
subresource_target: blob
30+
type: private_endpoint
31+
```
3232
3333
1. After configuring the file, you can update the workspace with the command:
3434
35-
```azurecli
36-
az ml workspace update --file workspace.yaml --name ws --resource-group MyGroup
37-
```
35+
```azurecli
36+
az ml workspace update --file workspace.yaml --name ws --resource-group MyGroup
37+
```
3838
3939
When the isolation mode of a managed virtual network is set to *Allow internet outbound*, Azure automatically creates private endpoint outbound rules. These rules are required for the workspace and its associated resources, such as Key Vault, Storage Account, Container Registry, and Azure Machine Learning workspace, when public network access is disabled.
4040

0 commit comments

Comments
 (0)