Network isolation for the agents in the Hub based project #60
-
Do the agents in the Hub based project utilize the managed VNet of the hub? The agents belong to the project, and the documentation suggests that projects reside within the managed VNet. I am seeing the following error on by Hub based project UI when the linked AI Foundry This is despite the fact that I did create a private endpoint connection to this Foundry in the Hub settings: |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 14 replies
-
In Azure AI Foundry Hub-based architecture, projects are indeed bound to the hub’s managed VNet, and by default, agents and tools execute within the project’s context, meaning they should inherit that VNet isolation including routing through any private endpoints defined in the Hub. However, the error you're seeing (even with the Foundry’s public access disabled and a private endpoint configured) suggests a couple of things might be at play: Please check the following Some tips Useful Resources
These should help you validate whether the agent execution environment is correctly resolving and routing through the private endpoint. |
Beta Was this translation helpful? Give feedback.
-
Hi @gukoff We've been working through similar challenges getting AI Foundry Hub to function correctly in a fully private setup (private inbound, with only approved networks allowed). Despite following the documentation, we still ran into several issues and haven’t been able to get everything working exactly as described. That said, I did encounter the same issue you're facing. After several trials and comparisons between public and private setups, what ultimately worked for me was assigning the Azure AI User role to the Azure AI services resource(No mention of this in the documentation, atleast i couldn't find it). I’d recommend adding it directly on the resource, and optionally at the resource group level as well—won’t hurt to have it there. This role includes permissions to read private endpoint connections, which appears to be critical for the service to function properly in a restricted network environment. A couple of things to note: Role propagation can take a little while—you might need to log out and back in. If it still doesn’t work, try toggling the "Allow trusted Microsoft services to access this resource" setting on the Azure AI service: disable it, then re-enable it. Hope this helps. |
Beta Was this translation helpful? Give feedback.
-
To clarify some details here: In the Foundry hubs/project set-up, managed VNET is NOT used to secured outbound for the Agent service (preview). Similar to how the Agent service (GA) works in the new Foundry project resource, a virtual network and subnet injection is done to secured the Agent service (preview). Please refer to this Bicep template for the secure deployment of Agents with hubs/projects as there is not way in the UX to secure Agent client outbound and managed VNET does not apply in this case. Managed VNET in Foundry hubs/projects only applies to managed compute used in features such as PromptFlow. I would recommend moving to the new Foundry project set-up, instead of hubs/projects. We will continue building new features for the new Foundry project, such as the Agent service. |
Beta Was this translation helpful? Give feedback.
To clarify some details here: In the Foundry hubs/project set-up, managed VNET is NOT used to secured outbound for the Agent service (preview). Similar to how the Agent service (GA) works in the new Foundry project resource, a virtual network and subnet injection is done to secured the Agent service (preview). Please refer to this Bicep template for the secure deployment of Agents with hubs/projects as there is not way in the UX to secure Agent client outbound and managed VNET does not apply in this case. Managed VNET in Foundry hubs/projects only applies to managed compute used in features such as PromptFlow.
I would recommend moving to the new Foundry project set-up, instead of hubs/pro…