Skip to content

Commit b4eec45

Browse files
authored
Merge pull request #213963 from deeikele/ci-vulnmgmt
Recommendations on how to keep CI up-to-date
2 parents 0d88aac + e09f0db commit b4eec45

File tree

1 file changed

+35
-18
lines changed

1 file changed

+35
-18
lines changed

articles/machine-learning/concept-vulnerability-management.md

Lines changed: 35 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -72,24 +72,41 @@ It's a shared responsibility between you and Microsoft to ensure that your envir
7272

7373
### Compute instance
7474

75-
* Compute instances get latest VM images at time of provisioning.
76-
* Microsoft doesn't provide active OS patching for compute instance. To obtain the latest VM image, delete and recreate the compute instance.
77-
* You could use set up scripts to install extra scanning software. Azure Defender agents are currently not supported.
78-
* To query resource age, you could use the following log analytics query:
79-
80-
```kusto
81-
AmlComputeClusterEvent
82-
| where ClusterType == "DSI" and EventType =="CreateOperationCompleted" and split(_ResourceId, "/")[-1]=="<wsname>"
83-
| project ClusterName, TimeCreated=TimeGenerated
84-
| summarize Last_Time_Created=arg_max(TimeCreated, *) by ClusterName
85-
| join kind = leftouter (AmlComputeClusterEvent
86-
| where ClusterType == "DSI" and EventType =="DeleteOperationCompleted"
87-
| project ClusterName, TimeGenerated
88-
| summarize Last_Time_Deleted=arg_max(TimeGenerated, *) by ClusterName)
89-
on ClusterName
90-
| where (Last_Time_Created>Last_Time_Deleted or isnull(Last_Time_Deleted)) and Last_Time_Created < ago(30days)
91-
| project ClusterName, Last_Time_Created, Last_Time_Deleted
92-
```
75+
Compute instances get the latest VM images at the time of provisioning. Microsoft releases new VM images on a monthly basis. Once a compute instance is deployed, it does not get actively updated. To keep current with the latest software updates and security patches, you could:
76+
77+
1. Recreate a compute instance to get the latest OS image (recommended)
78+
79+
* Data and customizations such as installed packages that are stored on the instance’s OS and temporary disks will be lost.
80+
* [Store notebooks under "User files"](/azure/machine-learning/concept-compute-instance#accessing-files) to persist them when recreating your instance.
81+
* [Mount data using datasets and datastores](/azure/machine-learning/v1/concept-azure-machine-learning-architecture#datasets-and-datastores) to persist files when recreating your instance.
82+
* See [Compute Instance release notes](azure-machine-learning-ci-image-release-notes.md) for details on image releases.
83+
84+
1. Alternatively, regularly update OS and python packages.
85+
86+
* Use Linux package management tools to update the package list with the latest versions.
87+
88+
```bash
89+
sudo apt-get update
90+
```
91+
92+
* Use Linux package management tools to upgrade packages to the latest versions. Note that package conflicts might occur using this approach.
93+
94+
```bash
95+
sudo apt-get upgrade
96+
```
97+
98+
* Use Python package management tools to upgrade packages and check for updates.
99+
100+
```bash
101+
pip list --outdated
102+
```
103+
104+
You may install and run additional scanning software on compute instance to scan for security issues.
105+
106+
* [Trivy](https://github.com/aquasecurity/trivy) may be used to discover OS and python package level vulnerabilities.
107+
* [ClamAV](https://www.clamav.net/) may be used to discover malware and comes pre-installed on compute instance.
108+
* Defender for Server agent installation is currently not supported.
109+
* Consider using [customization scripts](/azure/machine-learning/how-to-customize-compute-instance) for automation.
93110

94111
### Compute clusters
95112

0 commit comments

Comments
 (0)