-
Notifications
You must be signed in to change notification settings - Fork 148
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enabling Malware scanning #3768
Comments
We have found another import issue here - #3767 This will likely mean that 50% of airlock import requests fail as there are two IPs for the DNS entry. "During my tests, if on-upload malware scanning is not enable, the import request gets stuck." Can you confirm you aren't seeing this issue? If it is not enabled, it should not get stuck. I've not got much experience with the malware scanning, but @tamirkamara @yuvalyaron @eladiw @anatbal might have some ideas. |
Thanks @marrobi , I found that other issue regarding DNS entry just by chance (from time to time I come here to see what's going on). I didn't observe DNS problems during tests with Airlock, but I'll replay them and keep an eye on it. On the other hand, it seems that I was not clear enough when writing the previous message. My sincere apologies. Indeed, if I don't enable malware scanning in AzureTRE, nothing gets stuck and all the process goes as expected. By saying "if on-upload malware scanning is not enable, the import request gets stuck.", my idea was to express that malware scanning was not enabled on Azure site (neither on Subscription wide, nor on storage account level). I was moving one small step a time. :) Thus, once on-upload malware scanning in AzureTRE, and Azure is enabled. Everything goes fine. :) I'm going to replay the tests and see if DNS problems show up. |
Yes, would be good to programmatically enable it based on the environment variable. |
@marrobi @migldasilva I am willing to start working on enabling it this week, will keep you posted |
@marrobi I have been trying again to enable Malware scanning, but with no avail. I'm a little bit confused now and have to realize that I wasn't smart enough for previously writing down detailed notes. 🥲 Following the notes I previously prepared, I upgraded only the storage account (SA) If I'm not mistaken, the following screenshots are show what is expected to happen. Another step would be choosing an event grid topic for sending scan results. I found this PR #2442 , and it made me think that no addition event grid topic is required. I believe we'd have at most 4 options here:
Reading this file made me think that This screenshot shows some "Publish Failed Events", and the appear after every trial I made. I tried also to use the other topics for receiving scan results, but no luck. For all of them, "Publish Failed Events" were also registered. The steps for creating, uploading and submitting an import request are the usual ones. Checking the
Is there any other step you may realized I have missed? |
Hello @migldasilva. Since it has been a long time since we enabled malware scanning on your subscription and it was then in Private Preview, a lot of thing has changed. I think your confusing a few concepts - the scanner should be enabled on the in progress storage account rather than the external one. Also, in the previous version, when enabling the scanner it would automatically create an event grid. This version requires us to create one ourself and create the subscriber ourselves. and finally, it requires code change to airlock processor function since the message itself was changed. |
@anatbal Sounds perfect. Regarding which storage account to use, and following your explanation, I have also observed a funny behavior. When upgrading the in progress storage account, the Event Grid System Topic was not created. Thus I abandoned this option, I tried to stick with the external storage account (no comments added here because it seemed more an Azure support thing, than AzureTRE related). |
Description
Hi, If I'm not wrong, malware scanning in AzureTRE relies on on-upload malware scanning, by Microsoft Defender for Storage. This feature must be enabled in AzureTRE, and also in Azure.
During my tests, if on-upload malware scanning is not enable, the import request gets stuck. I mean, a TRE Researcher creates a request, uploads a file, but giving that no malware scanning is enabled on Azure side, the Airlock processor never gets a message saying if the file is OK or not.
Enabling Microsoft Defender for Storage my require a Defender for Storage plan upgrade. Such upgrade can be done subscription-wide, or per storage account. In both cases, it might be done through Azure Portal, Bicep or ARM.
Using Terraform, it'd be possible to enable on-upload malware scanning per Storage Account defining an
azurerm_template_deployment
object. One candidate storage account for such changes isstalimex<TRE_ENV_NAME>
.Are you aware of how other users are handling this situation? Is there any interested in changing Terraform so that on-upload malware scanning would be enabled for some given storage accounts?
Steps
The steps I have tried are:
stalimex<TRE_ENV_NAME>
The text was updated successfully, but these errors were encountered: