Compare network isolation configurations in Azure Machine Learning
For your workspaces, Azure Machine Learning offers two types of outbound network isolation configurations: managed network isolation and custom network isolation. Both offer full network isolation support with its benefits and limitations. This document covers feature support and limitations on both network isolation configurations for you to decide what is best for your needs.
Enterprise security needs
Cloud computing enables you to scale up your data and machine learning capabilities, but it also poses new challenges and risks for security and compliance. You need to ensure that your cloud infrastructure is protected from unauthorized access, tampering, or leakage of data and models. You might also need to adhere to the regulations and standards that apply to your industry and domain.
Typical Enterprise requirements include:
- Use network isolation boundary with virtual network to have inbound and outbound control and to have private connection to private Azure resources.
- Avoid exposure to the internet with no public IP solutions and private endpoints.
- Use virtual network appliances to have better network security capabilities such as firewalling, intrusion detection, vulnerability management, web filtering.
- Network architecture for Azure Machine Learning can be integrated with existing network architecture.
What are managed and custom network isolation configurations?
Managed network isolation relies on managed virtual networks, which is a fully managed feature of Azure Machine Learning. Managed network isolation is ideal if you want to use Azure Machine Learning with minimal configuration and management overhead.
Custom network isolation relies on you creating and managing an Azure Virtual Network. This configuration is ideal if you're looking for maximal control over your network configuration.
When to use managed or custom virtual networks
Use managed virtual network when…
- You're new user to Azure Machine Learning with standard network isolation requirements
- You're a company with standard network isolation requirements
- You require on-premises access to resources with HTTP/S endpoints
- You don't have many non-Azure dependencies set up yet
- You require using Azure Machine Learning managed online endpoints and serverless spark computes
- You have fewer management requirements for networking in your organization
Use custom virtual network when…
- You're a company with heavy network isolation requirements
- You have many non-Azure dependencies previously set-up and need to access Azure Machine Learning
- You have on-premises databases with no HTTP/S endpoints
- You require using your own Firewall and virtual network logging and monitoring of outbound network traffic
- You want to use Azure Kubernetes Services (AKS) for inference workloads
The following table provides a comparison of the benefits and limitations of managed and custom virtual networks:
Custom virtual network | Managed virtual network | |
---|---|---|
Benefits | - You can tailor networking to your existing set-up - Bring your own non-Azure resources with Azure Machine Learning - Connect to on-premises resources |
- Minimize set-up and maintenance overhead - Supports managed online endpoints - Supports serverless spark - Gets new features first |
Limitations | - New feature support might be delayed - Managed online endpoints NOT supported - Serverless spark NOT supported - Foundational models NOT supported - No code MLFlow NOT supported - Implementation complexity - Maintenance overhead |
- Cost implications of the Azure Firewall and fully qualified domain name (FQDN) rules - Logging of the virtual network, firewall, and NSG rules NOT supported - Access to non-HTTP/S endpoint resources NOT supported |
Custom virtual network limitations
- New features support might be delayed: Efforts for improving our network isolation offerings are focused on managed instead of custom virtual network. Therefore, new feature asks are prioritized on managed over custom virtual network.
- Managed online endpoints isn't supported: Managed online endpoints don't support custom virtual network. Workspace managed virtual network must be enabled to secure your managed online endpoints. You can secure managed online endpoints with legacy network isolation method. But, we strongly recommend that you use workspace managed network isolation. For more information, visit Managed online endpoints.
- Serverless spark compute isn't supported: Serverless Spark computes aren't supported in a custom virtual network. Workspace managed virtual network supports Serverless Spark because Azure Synapse only uses managed virtual network set-up. For more information, visit Configured Serverless Spark.
- Implementation complexity and maintenance overhead: With custom virtual network set-up, all the complexity of setting up a virtual network, subnet, private endpoints, and more falls on the user. Maintenance of the network and computes fall on the user.
Managed virtual network limitations
- Cost implications with Azure Firewall and FQDN rules: An Azure Firewall is provisioned on behalf of the user only when a user-defined FQDN outbound rule is created. The Azure Firewall is the Standard SKU Firewall and incurs costs that are added to your billing. For more information, visit Azure Firewall pricing.
- Logging and monitoring of managed virtual network NOT supported: The managed virtual network doesn't support virtual network flow, NSG flow, or Firewall logs. This limitation is because the managed virtual network is deployed in a Microsoft tenant and can't be sent to your subscription.
- Access to non-Azure, non-HTTP/S resources isn't supported: The managed virtual network doesn't allow for access to non-Azure, non-HTTP/S resources.