Skip to content

Commit d54c4d0

Browse files
Code review edits
1 parent c907946 commit d54c4d0

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/machine-learning/how-to-troubleshoot-environments.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,12 @@ There are some ways to decrease the impact of vulnerabilities:
6666
- Compartmentalize your environment so you can scope and fix issues in one place.
6767
- Understand flagged vulnerabilities and their relevance to your scenario.
6868

69+
### Scan for Vulnerabilities
70+
71+
You can monitor and maintain environment hygiene with [Microsoft Defender for Container Registry](../defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md) to help scan images for vulnerabilities.
72+
73+
To automate this process based on triggers from Microsoft Defender, see [Automate responses to Microsoft Defender for Cloud triggers](../defender-for-cloud/workflow-automation.md).
74+
6975
### Vulnerabilities vs Reproducibility
7076

7177
Reproducibility is one of the foundations of software development. When you're developing production code, a repeated operation must guarantee the same
@@ -96,15 +102,9 @@ You use system-managed environments when you want conda to manage the Python env
96102
latest image may be a tradeoff between reproducibility and vulnerability management. So, it's your responsibility to choose the environment version used
97103
for your jobs or model deployments while using system-managed environments.
98104

99-
### Scan for Vulnerabilities
100-
101-
You can monitor and maintain environment hygiene with [Microsoft Defender for Container Registry](../defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md) to help scan images for vulnerabilities.
102-
103-
To automate this process based on triggers from Microsoft Defender, see [Automate responses to Microsoft Defender for Cloud triggers](../defender-for-cloud/workflow-automation.md).
104-
105105
### Vulnerabilities: Common Issues
106106

107-
### Vulnerabilities in Base Docker Images
107+
### *Vulnerabilities in Base Docker Images*
108108

109109
System vulnerabilities in an environment are usually introduced from the base image. For example, vulnerabilities marked as "Ubuntu" or "Debian" are from the system level of the environment–the base Docker image. If the base image is from a third-party issuer, please check if the latest version has fixes for the flagged vulnerabilities. Most common sources for the base images in Azure Machine Learning are:
110110

@@ -119,7 +119,7 @@ If the latest version of your base image does not resolve your vulnerabilities,
119119
apt-get install -y library_name
120120
```
121121

122-
### Vulnerabilities in Python Packages
122+
### *Vulnerabilities in Python Packages*
123123

124124
Vulnerabilities can also be from installed Python packages on top of the system-managed base image. These Python-related vulnerabilities should be resolved by updating your Python dependencies. Python (pip) vulnerabilities in the image usually come from user-defined dependencies.
125125

@@ -133,7 +133,7 @@ or if you're using a conda environment, update the reference in the conda depend
133133

134134
In some cases, Python packages will be automatically installed during conda's setup of your environment on top of a base Docker image. Mitigation steps for those are the same as those for user-introduced packages. Conda installs necessary dependencies for every environment it materializes. Packages like cryptography, setuptools, wheel, etc. will be automatically installed from conda's default channels. There's a known issue with the default anaconda channel missing latest package versions, so it's recommended to prioritize the community-maintained conda-forge channel. Otherwise, please explicitly specify packages and versions, even if you don't reference them in the code you plan to execute on that environment.
135135

136-
### Cache issues
136+
### *Cache issues*
137137

138138
Associated to your Azure Machine Learning workspace is an Azure Container Registry instance that's a cache for container images. Any image
139139
materialized is pushed to the container registry and used if you trigger experimentation or deployment for the corresponding environment. Azure

0 commit comments

Comments
 (0)