MicrosoftDocs / azure-docs

Open source documentation of Microsoft Azure
https://docs.microsoft.com/azure
Creative Commons Attribution 4.0 International
10.21k stars 21.37k forks source link

Synapse Pipelines Web Activity cannot reach sites when using Managed Virtual Network with data exfiltration protection? #86103

Closed gdubya closed 4 months ago

gdubya commented 2 years ago

It appears as though the Web activity is unable to contact the management endpoint when the Synapse workspace is created using a Managed Virtual Network and data exfiltration protection. The first Web activity fails with an "unknown error".

This problem does not occur if i create the pipeline for a Synapse workspace that does not use a Managed Virtual Network with data exfiltration protection

Is there a workaround? The documentation should perhaps be updated to mention the restriction if it is not possible using a Managed Virtual Network.


Document Details

Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

gdubya commented 2 years ago

Asked on StackOverflow

gdubya commented 2 years ago

There is a section of "known limitations" under "Create a workspace with data exfiltration protection enabled" that is perhaps relevant. This says:

In data exfiltration protected workspaces, connections to outbound repositories are blocked. As a result, Python library installed from public repositories like PyPI are not supported.

I suppose this applies to pipelines too. If this is the case then I suggest adding a "known limitations" section to this "How to" page as well.

KranthiPakala-MSFT commented 2 years ago

Thank you for reaching out. At this time we are reviewing the ask and will provide an update as appropriate

lucabovo commented 1 year ago

I have a similar Github-Issue about the same doc (https://learn.microsoft.com/en-us/azure/synapse-analytics/sql/how-to-pause-resume-pipelines) and the same scenario/environment (pipeline execution in Synapse Workspace with Managed VNet and data exfiltration protection ENABLED) You can find the issue here: https://github.com/MicrosoftDocs/azure-docs/issues/99174

gdubya commented 1 year ago

@lucabovo my personal conclusion was that this was the root cause of the problem for us

rebremer commented 1 year ago

I noticed that it is possible to trigger REST APIs using a web hook in Synapse Workspace with Managed VNet and data exfiltration protection ENABLED. I assume this because in a web hook no IR has to be specified.

Is this expected behavior? I mean, I can now just use a web hook to exfiltrate data...

Cedz commented 1 year ago

When and how can this be addressed? Facing a similar issue . WebHook also does not work .

gdubya commented 1 year ago

@Cedz Use an integration runtime that is not contained within the managed vnet (e.g. a self-hosted IR).

The issue i raised here is regarding the documentation, not the functionality itself.

IsraelOrosMsft commented 10 months ago

@gdubya and @rebremer How can you leverage the self-hosted integration runtime (SHIR) when you are working with webhooks? I could not find a way to specify that. I created a SHIR on a private VNet and I validated I could connect to the webhook from that machine. The Synapse Workspace shows the SHIR status as running and the SHIR can communicate to the Webhook, but the pipeline calling the webhook fails as documented in this conversation.

Am I missing something? Is it really possible to access webhooks from Synapse with exfiltration turned on?

Thanks!

rebremer commented 10 months ago

See my GitHub what I did to solve this: https://github.com/rebremer/securely-connect-synapse-to-azure-functions

bandersmsft commented 4 months ago

Thanks for your dedication to our documentation. Unfortunately, at this time we have been unable to review your issue in a timely manner and we sincerely apologize for the delayed response. We are closing this issue for now, but if you feel that it's still a concern, please respond and let us know. If you determine another possible update to our documentation, please don't hesitate to reach out again. #please-close