-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(deployment): FSS Deployment tool for Azure #89
base: master
Are you sure you want to change the base?
feat(deployment): FSS Deployment tool for Azure #89
Conversation
…ude and exclude criteria
…ation feat(post-scan action): GCP Slack notification for FSS
…ilestorage-plugins into gcp-post-scan-teams-notification
…/GeorgeDavis-TM/cloudone-filestorage-plugins into gcp-post-scan-slack-notification
…ation fix(post-scan action)!: GCP Slack notification for FSS
…ation feat(post-scan action): GCP Teams notification for FSS
Co-authored-by: Andrew C Lee <[email protected]>
Co-authored-by: Andrew C Lee <[email protected]>
….yml Co-authored-by: Andrew C Lee <[email protected]>
Co-authored-by: Andrew C Lee <[email protected]>
…/GeorgeDavis-TM/cloudone-filestorage-plugins into gcp-post-scan-slack-notification
…ing gcloud operations
…params are honored by order of inheritance and overriding, mentioned in serverless framework documentation
…ilestorage-plugins into gcp-post-scan-slack-notification
…ation feat(post-scan action): GCP Slack notification for FSS
…ation feat(post-scan action): GCP Teams notification for FSS
…ation fix: Changing package.include and package.exclude to package.patterns
…ation fix: Changing package.include and package.exclude to package.patterns
…e-fss/File-Storage-Security/Deployment/azure-python-deploy-to-all-existing-storage for PR to trendmicro/cloudone-filestorage-plugins
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @GeorgeDavis-TM,
Thank you for this PR. This can help customers to protect lots of storage accounts at a time. I have few questions about the solution:
- How long does the function take to deploy stacks for, like 10, storage accounts? Consumption function app has 10 minutes as maximal timeout, and deploying one set of stacks would take that long time. Can the deployment run in parallel? Or can we use ARM to deploy that many stacks?
- One scanner stack for serving 50 storage stacks looks a bit aggressive to me. And some storage accounts that have higher uploading frequency would need dedicated scanner for each.
- How to monitor the failure and recover the process from failure when deploying multiple stacks?
- The way to configure credentials are not documented. Managed identity with a proper role would be another choice for you to refer to. By using it you won't need to configure credentials.
@jack-c-tang Thank you for your review. Please see my comments inline.
This tool was designed to run in a terminal or Azure Cloud Shell, with versions for Azure functions planned for future releases when we have achieved parallelity. Please consider this tool, an MVP attempt at implementing deployment automation for FSS Stacks in Azure. I am looking for validation of this approach. Once validated from the product team, we can design for parallel runs.
The value is configurable in the
At the moment, failure of a deployment, throws an exception and exits the script. Complex handling logic can be introduced in later stages, where we are deploying multiple stacks in parallel.
At the moment, I am using an Azure registered app and secret from the same, similar to |
…otification from the deployment-azure-fss branch
Hi @GeorgeDavis-TM , Due to resources and priority, the prod team might not be able to fully validate this solution in a short time. I tried to understand how the plugin works, but some points are still unclear to me. The Do you think a short demo video clip can help us understand it quickly? If you have run some tests, like the number of storage accounts you've protected by this plugin, that would also be helpful. Thanks. |
I will work on updating the README and get back to you for review. Thank you for your feedback. |
FSS Deployment tool for Azure
Change Summary
geographies
- 1 FSS Scanner Stack per Azure geographyGroup, Defaultone-to-one
- 1 FSS Scanner Stack per Storage Account (1:1 relationship)single
- Just 1 FSS Scanner Stack for all Storage Accounts (not recommended for multi-region storage accounts)PR Checklist
Other Notes