Prisma AIRS
Harvest IP-Tags from Public and Hybrid Kubernetes Clusters to Enforce Security Policy Rules
Table of Contents
Harvest IP-Tags from Public and Hybrid Kubernetes Clusters to Enforce Security Policy Rules
Harvesting IP-tags for public and hybrid Kubernetes clusters.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
The IP-tag collector
sends these tags to the Prisma AIRS AI Runtime: Network
intercept in Strata Cloud Manager, so the Strata Cloud Manager can detect these
IP-tags while creating the security policy rules.
The IP-tag collector
workflow on this page supports collecting IP-tags from hybrid and
public Kubernetes clusters only.
Hybrid Cluster:
The data plane is private, but the control plane allows public API access.
Public Cluster: Both control and data planes have public IP
addresses, allowing external interaction with the cluster.
The Prisma AIRS AI Runtime: Network intercept protects traffic to
and from non-AI and AI applications and models, which may involve containerized and
VM-based workloads. Given the short lifecycle of container pods in Kubernetes (often
around 3 minutes), dynamic IP-tag collection is essential. The IP-tag collector
helps capture IP-tags, such as Kubernetes labels for namespaces, services, and pods,
in real-time. This allows automatic IP address registration and tag management
within AI Runtime Security, dynamically adapting security policy rules based on
current cluster activity.
For further information on dynamic IP
addresses and tags, refer to Dynamic Address Groups in Security
Policy.
- Setting up the Cloud Identity Engine User Context helps to isolate the user mappings and tags by region or use case, enabling granular access control and security.
- When you deploy the Terraform for the `security_project`, the Terraform will deploy two instances: the Prisma AIRS AI Runtime: Network intercept and the tag collector. Refer to the workflow for your cloud provider under Deploy Prisma AIRS AI Runtime: Network Intercept in Public Clouds for the deployment steps.
On this page, you will:
- Configure IP-Tag Collector to Send IP-Tags to Edge Service
- Configure IP-Tag Collector as Redistribution Agent on Prisma AIRS AI Runtime: Network Intercept
- Add Address Group and Filter the IP-Tag Mappings for Kubernetes Clusters
- Add a Security Policy Rule
The IP-tag collector uses 1
vCPU.
Configure IP-Tag Collector to Send IP-Tags to Edge Service
- Verify the IP-tag collector mode status is enabled by the Prisma AIRS AI Runtime: Network intercept deployment Terraform:show system info | match tag-collector-modeThis shows the collector mode as enabled.tag-collector-mode: enabledConfigure the Strata Cloud Manager region to enable the IP-tag collector to send the IP-tags to Strata Cloud Manager.View and enter the Strata Cloud Manager regions:request plugins kubernetes set-tag-collector-config regionrequest plugins kubernetes set-tag-collector-config region <region_name>Configure the Kubernetes cluster:
- If you have access to perform secure copy (scp) transfer of your credential file to the IP-tag collector, use the following commands:scp import k8s-service-accountset deviceconfig plugins kubernetes setup \ cluster-credentials <cluster_name> \ api-server-address <cluster-external-endpoint-ip> \ cluster-type [GKE|AKS|EKS] \ cluster-credential-file \ [GCP-service-account-json|AWS-credentials-file|Azure-credentials-file] <filename> labels no-labels
- Replace the value for the variable:
`<cluster-external-endpoint-ip>` with the
external endpoint IP address of your cluster (GKE,
AKS, EKS) in your cloud console (Google, Azure, or
Amazon).For example, to fetch the GKE cluster in the Google Cloud Console, navigate to Kubernetes Engine > Clusters > [Your Cluster] > External endpoint and copy the external endpoint IP address.
- Enter the credential file type (GCP-service-account-json, AWS-credentials-file, or Azure-credentials-file) based on your cloud provider.
If you don't have access to perform a secure copy (`scp`) transfer of your credential file to the IP-tag collector:Compress (`gzip`) and encode (`base64`) your credential file, and then use it in the following command. For detailed instructions on creating the credential file, refer to the following documentation.#Enter the configuration mode configure set deviceconfig plugins kubernetes setup \ cluster-credentials <cluster_name> \ api-server-address <Cluster API server IP address or FQDN> \ cluster-type [GKE|AKS|EKS] \ cluster-credential-file \ service-account-cred <credential_str> labels no-labelsCreate the monitoring definitions on the IP-tag collector:set deviceconfig plugins kubernetes \ monitoring-definition <mon_def_name> \ cluster-credentials <cluster_name> \ enable yesYou can map only one cluster to a monitoring definition and one monitoring definition to a cluster.commit to save your changes.Run the following command to view your cluster name and cluster status:show plugins kubernetes statusYour cluster's status should show as "Connected" indicating successful onboarding.Configure IP-Tag Collector as Redistribution Agent on Prisma AIRS AI Runtime: Network Intercept
Data redistribution also provides granularity, allowing you to redistribute only the types of information you specify to the devices you select. You can also filter the IP to User mappings or IP to Tag mappings using subnets and ranges to ensure the firewalls collect only the mappings they need to enforce the policy. For more information, see Firewall Deployment for Data Redistribution.You can configure the IP-tag collector as a redistribution agent on your Prisma AIRSAI Runtime: Network intercept console or Strata Cloud Manager. Plan the redistribution architecture, configure the data sources from which your redistribution agents obtain the data to redistribute to their clients, and then configure the authentication policy.For more information on configuring the IP-tag collector as a redistribution agent, see Configure Data Redistribution and use Strata Cloud Manager to set up and manage identity redistribution.- Log in to Strata Cloud Manager.Navigate to Manage→ Configuration → NGFW and Prisma Access → Identity Services → Identity Redistribution.Select the Configuration Scope where you want to configure identity redistribution.Select Add Agent.Enter a descriptive Name for the redistribution agent.
- Confirm that the agent is enabled.Enter the Host IP address.Enter the Port (default port is 5007, and the range is 1-65535).Select one or more data types that you want to redistribute in the Data Type Mapping:
- IP to User: Maps IP addresses to user names for User-ID
- Host Information Profile (HIP): Maps data for HIP-based Policy Enforcement
- IP to Tag: Maps IP address to tags for dynamic address groups
- User to Tag: Maps user names to tags for dynamic user groups
- Quarantined Device List: List of devices identified as quarantined by GlobalProtect
Ensure to select IP to Tag mapping.(Optional) Enter the Collector Name to identify which system you want to use as a redistribution agent.(Optional) Enter and confirm the Collector Pre-Shared Key for the system you want to use as a redistribution agent.Save.Commit.Push Config from Strata Cloud Manager to the AI Runtime Security managed folder.For the redistribution client to show up on the agent and for local distribution to work, run the following commands on your IP-tag collector:#Enter the configuration mode configureThe `userid` service may be disabled by default. Use the below command to enable the `userid` service (This is an optional step, and you can skip it if the `userid` is already enabled):set deviceconfig system service disable-userid-service no commitDisplay the status and configuration of all redistribution service clients:show redistribution service client all#Output IP address/port Vsys-ID Version Status Redistribution 10.13.0.3/58742 1 6 idle ITUHRun the following commands to show, debug, or request the Kubernetes plugin information:show plugins kubernetes [ counters | details-dashboard | ip-details | status | tag-details ] debug plugins kubernetes [dump-cluster-response | kubernetes-db-dump | kubernetes-tags ] request plugins kubernetes [merge-logs | set-tag-collector-config | validate-cluster-creds ]Add Address Group and Filter the IP-Tag Mappings for Kubernetes Clusters
In a large-scale network, instead of configuring all your firewalls directly to query the mapping information sources, you can streamline resource usage by configuring some firewalls to collect mapping information through redistribution. Data redistribution also provides granularity, allowing you to redistribute only the types of information you specify to only the devices you select. Filter the IP-tag mappings using subnets and ranges to ensure the firewalls collect only the mappings they need to enforce security policy rules.After configuring Strata Cloud Manager for your Prisma AIRSAI Runtime: Network intercept, add an address group and filter the IP-tag mappings for your Kubernetes clusters.- Log in to Strata Cloud Manager.Navigate to Manage→ Configuration → NGFW and Prisma Access → Objects → Address → Address Groups → Add Address Group with the required IP address-to-tag mappings.Enter an address group Name.Enter a Description.Select the Dynamic address group Type.Click Add Match Criteria.Switch to the CIE tab to view the list of Kubernetes tags sent from the IP-Tag collector to Strata Cloud Manager.Select the required Kubernetes tags to create an address group.Click Save.
Add a Security Policy Rule
Create a security policy rule with the address group containing the set of harvested Kubernetes IP-tags. Push this policy rule to the Prisma AIRS AI Runtime: Network intercept deployed in your cloud environment to enforce the policy rules on these IP-tags.- Log in to Strata Cloud Manager.Navigate to Manage→ Configuration → NGFW and Prisma Access → Security Services → Security Policy.Select Add Rule.Click pre-rule or post-rule.Enter your security policy rule Name.Enter a Description for the policy.Select the Source and Destination match criteria.In the Source section, click Select under Addresses.
- For the Source Address, select the Dynamic Address Group you created with the harvested IP tags in the previous section.Specify the action: Allow or Deny for the traffic.Optional Attach the security profile group to the security policy under Profile Group.Save.Select Push Config to push configuration changes to your Prisma AIRS: Network intercept.The IP-tag collector will now be listed as a cloud-managed device on Strata Cloud Manager under Workflows → NGFW SetupDevice Management → Cloud Managed Devices.After a successful push configuration, log in to your Prisma AIRS AI Runtime: Network intercept command line interface and run the following command to view the IP-tags and security policies list.show object registered-ip all #Output registered IP Tags -------------------------- -------- 10.111.22.108 * "k8s.ns_gmp-system (never expire)" "k8s.ns_gmp-operator (never expire)" 10.111.19.125 * "k8s.svc_metrics-server (never expire)"
- Replace the value for the variable:
`<cluster-external-endpoint-ip>` with the
external endpoint IP address of your cluster (GKE,
AKS, EKS) in your cloud console (Google, Azure, or
Amazon).