You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/machine-learning/concept-endpoints.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -88,7 +88,7 @@ Traffic allocation can be used to do safe rollout blue/green deployments by bala
88
88
89
89
:::image type="content" source="media/concept-endpoints/endpoint-concept.png" alt-text="Diagram showing an endpoint splitting traffic to two deployments":::
90
90
91
-
Traffic to one deployment can also be mirrored (copied) to another deployment. Mirroring is useful when you want to test for things like response latency or error conditions without impacting live clients. For example, a blue/green deployment where 100% of the traffic is routed to blue and a 5% is mirrored to green. With mirroring, the results of the traffic to the green deployment aren't returned to the clients but metrics and logs are collected. Mirror traffic functionality is a __preview__ feature.
91
+
Traffic to one deployment can also be mirrored (copied) to another deployment. Mirroring is useful when you want to test for things like response latency or error conditions without impacting live clients. For example, a blue/green deployment where 100% of the traffic is routed to blue and a 10% is mirrored to green. With mirroring, the results of the traffic to the green deployment aren't returned to the clients but metrics and logs are collected. Mirror traffic functionality is a __preview__ feature.
92
92
93
93
:::image type="content" source="media/concept-endpoints/endpoint-concept-mirror.png" alt-text="Diagram showing an endpoint mirroring traffic to a deployment":::
Copy file name to clipboardExpand all lines: articles/machine-learning/concept-secure-network-traffic-flow.md
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -137,21 +137,21 @@ Securing an online endpoint with a private endpoint is a preview feature.
137
137
138
138
__Inbound__ communication with the scoring URL of the online endpoint can be secured using the `public_network_access` flag on the endpoint. Setting the flag to `disabled` restricts the online endpoint to receiving traffic only from the virtual network. For secure inbound communications, the Azure Machine Learning workspace's private endpoint is used.
139
139
140
-
__Outbound__ communication from a deployment can be secured on a per-deployment basis by using the `private_network_connection` flag. Outbound communication in this case is from the deployment to Azure Container Registry, storage blob, and workspace. Setting the flag to `true` will restrict communication with these resources to the virtual network.
140
+
__Outbound__ communication from a deployment can be secured on a per-deployment basis by using the `egress_public_network_access` flag. Outbound communication in this case is from the deployment to Azure Container Registry, storage blob, and workspace. Setting the flag to `true` will restrict communication with these resources to the virtual network.
141
141
142
142
> [!NOTE]
143
-
> For secure outbound communication, a private endpoint is created for each deployment where `private_network_connection` is set to `true`.
143
+
> For secure outbound communication, a private endpoint is created for each deployment where `egress_public_network_access` is set to `disabled`.
144
144
145
145
Visibility of the endpoint is also governed by the `public_network_access` flag of the Azure Machine Learning workspace. If this flag is `disabled`, then the scoring endpoints can only be accessed from virtual networks that contain a private endpoint for the workspace. If it is `enabled`, then the scoring endpoint can be accessed from the virtual network and public networks.
You can secure the inbound scoring requests from clients to an _online endpoint_. You can also configure the outbound communications between a _deployment_ and the Azure resources used by the deployment. Security for inbound and outbound communication is configured separately. For more information on endpoints and deployments, see [What are endpoints and deployments](concept-endpoints.md#what-are-endpoints-and-deployments).
23
+
You can secure the inbound scoring requests from clients to an _online endpoint_. You can also secure the outbound communications between a _deployment_ and the Azure resources used by the deployment. Security for inbound and outbound communication is configured separately. For more information on endpoints and deployments, see [What are endpoints and deployments](concept-endpoints.md#what-are-endpoints-and-deployments).
24
24
25
25
## Prerequisites
26
26
@@ -44,9 +44,10 @@ You can secure the inbound scoring requests from clients to an _online endpoint_
44
44
45
45
* If your Azure Machine Learning workspace has a private endpoint that was created before May 24, 2022, you must recreate the workspace's private endpoint before configuring your online endpoints to use a private endpoint. For more information on creating a private endpoint for your workspace, see [How to configure a private endpoint for Azure Machine Learning workspace](how-to-configure-private-link.md).
46
46
47
-
* Secure inbound communication only secures scoring requests. Requests to get the authentication key or token for the online endpoint are resolved over the public network (secured with TLS) to Azure Resource Manager. For more information, see [TBD]
48
-
49
47
* Secure outbound communication creates three private endpoints per deployment. One to Azure Blob storage, one to Azure Container Registry, and one to your workspace.
48
+
49
+
> [!NOTE]
50
+
> Requests to create, update, or retrieve the authentication keys are sent to the Azure Resource Manager over the public network. For information on configuring network isolation for this communication, see [TBD]
50
51
51
52
## Inbound (scoring)
52
53
@@ -56,22 +57,22 @@ To secure scoring requests to the online endpoint to your virtual network, set t
56
57
az ml online-endpoint create -f endpoint.yml --set public_network_access=disabled
57
58
```
58
59
59
-
When `public_network_access` is `disabled`, inbound scoring requests are received using the [private endpoint of the Azure Machine Learning workspace](how-to-configure-private-link.md).
60
+
When `public_network_access` is `disabled`, inbound scoring requests are received using the [private endpoint of the Azure Machine Learning workspace](how-to-configure-private-link.md) and the endpoint can't be reached from public networks.
60
61
61
62
## Outbound (resource access)
62
63
63
-
To restrict communication between a deployment and the Azure resources used to by the deployment, set the `private_network_connection` flag to `true`. Enable this flag to ensure that the download of the model, code, and images needed by your deployment are secured with a private endpoint.
64
+
To restrict communication between a deployment and the Azure resources used to by the deployment, set the `egress_public_network_access` flag to `disabled`. Enable this flag to ensure that the download of the model, code, and images needed by your deployment are secured with a private endpoint.
64
65
65
66
The following are the resources that the deployment communicates with over the private endpoint:
66
67
67
68
* The Azure Machine Learning workspace.
68
69
* The Azure Storage blob that is the default storage for the workspace.
69
70
* The Azure Container Registry for the workspace.
70
71
71
-
When you configure the `private_network_connection` to `true`, a new private endpoint is created per deployment, per service. For example, if you set the flag to `true` for three deployments to an online endpoint, nine private endpoints are created. Each deployment would have three private endpoints that are used to communicate with the workspace, blob, and container registry.
72
+
When you configure the `egress_public_network_access` to `disabled`, a new private endpoint is created per deployment, per service. For example, if you set the flag to `true` for three deployments to an online endpoint, nine private endpoints are created. Each deployment would have three private endpoints that are used to communicate with the workspace, blob, and container registry.
72
73
73
74
```azurecli
74
-
az ml online-deployment create -f deployment.yml --set private_network_connection true
75
+
az ml online-deployment create -f deployment.yml --set egress_public_network_access disabled
75
76
```
76
77
77
78
## Scenarios
@@ -80,10 +81,10 @@ The following table lists the supported configurations when configuring inbound
| secure inbound with secure outbound |`public_network_access` is disabled |`private_network_connection` is true| Yes |
84
-
| secure inbound with public outbound |`public_network_access` is disabled |`private_network_connection` is false| Yes |
85
-
| public inbound with secure outbound |`public_network_access` is enabled |`private_network_connection` is true| Yes |
86
-
| public inbound with public outbound |`public_network_access` is enabled |`private_network_connection` is false| Yes |
84
+
| secure inbound with secure outbound |`public_network_access` is disabled |`egress_public_network_access` is disabled| Yes |
85
+
| secure inbound with public outbound |`public_network_access` is disabled |`egress_public_network_access` is enabled| Yes |
86
+
| public inbound with secure outbound |`public_network_access` is enabled |`egress_public_network_access` is disabled| Yes |
87
+
| public inbound with public outbound |`public_network_access` is enabled |`egress_public_network_access` is enabled| Yes |
87
88
88
89
## End-to-end example
89
90
@@ -102,7 +103,7 @@ The steps in this section use an Azure Resource Manager template to create the f
102
103
* Azure Key Vault
103
104
* Azure Storage account (blob & file storage)
104
105
105
-
Public access is disabled for all the services. A scoring subnet is created, along with outbound rules that allow communication with the following Azure services:
106
+
Public access is disabled for all the services. While the Azure Machine Learning workspace is secured behind a vnet, it is configured to allow public network access. For more information, see [CLI 2.0 secure communications](how-to-configure-cli.md#secure-communications). A scoring subnet is created, along with outbound rules that allow communication with the following Azure services:
106
107
107
108
* Azure Active Directory
108
109
* Azure Resource Manager
@@ -194,7 +195,7 @@ When prompted, enter the password you used when creating the VM.
> In a production environment, when Azure Container Registry is behind the virtual network, you would use an Azure Machine Learning compute cluster and Azure Machine Learning environments. For more information, see [Secure Azure Machine Learning workspace](how-to-secure-workspace-vnet.md#enable-azure-container-registry-acr).
198
+
> In this example, we build the Docker image before pushing it to Azure Container Registry. Alternatively, you can build the image in your vnet by using an Azure Machine Learning compute cluster and environments. For more information, see [Secure Azure Machine Learning workspace](how-to-secure-workspace-vnet.md#enable-azure-container-registry-acr).
0 commit comments