VMware Tanzu blobstore scanning
Prisma Cloud for TAS can scan the droplets in your blobstores for vulnerabilities. Prisma Cloud can be configured to scan your blobstores periodically. Defenders are the entities that perform the scanning.
When you install Tanzu Application Service (TAS) Defender in your environment, it automatically scans the running apps and hosts in your environment without any special configuration required.
Tanzu stores large binary files in blobstores. Blobstores are roughly equivalent to registries. One type of file stored in the blobstore is the droplet.
Droplets are archives that contain ready to run applications. They are roughly equivalent to container images. Droplets contain the OS stack, a buildpack (which contains the languages, libraries, and services used by the app), and custom app code. Before running an app on your infrastructure, the Cloud Controller stages it for delivery by combining the OS stack, buildpack, and source code into a droplet, then storing the droplet in a blobstore.
Configure Prisma Cloud to scan a blobstore
Prisma Cloud can scan both internal and external blobstores, and blobstores configured to use the Fog Ruby gem or WebDAV protocol.
Prequisite:You’ve already installed TAS Defender in your environment.
- Log into Prisma Cloud Console.
- Go toDefend > Vulnerabilities > VMware Tanzu blobstore.
- ClickAdd blobstore.
- InBlobstore location, select if scanning is Local or Remote.Prisma Cloud allows you to scan a blobstore by a Defender within the same TAS environment, or to scan it by a Defender in a remote TAS environment. If the Defender (the Scanner) runs in the same TAS environment as the blobstore, selectLocal. If you want a Defender to scan a blobstore in a differnet TAS environment, selectRemote.
- InBlobstore’s cloud controller, specify the cloud controller address of the blobstore you want to scan.
- (Optional) InFoundation, specify the foundation of the blobstore to scan. The foundation name will then be added as a label to the droplets scanned on this blobstore, which allows you to use it as a criteria for Collections.
- InCredentials, enter the credentials required to access the remote blobstore. If the credentials have already been created in the Prisma Cloud credential store, select it. If not, clickAddto create new credentials.The user role of the credentials you use should be one of the following: Admin, Admin Read-Only, Global Auditor, Org Manager, Space Auditor, Space Developer, or Space Manager. For non-admin users, the cloud_controller.read scope is also required.
- (Optional) InCA certificate, enter a CA certificate in PEM format.
- InScanner’s cloud controlles, specify the cloud controller address of the TAS environment where the scanning Defender is located.
- InScanner, specify a Defender to execute the scanning.Prisma Cloud lists all the agentIDs where Defender is installed. To correlate the agentID to the Diego cell’s IP address, and determine which host runs a Defender, log into any Diego cell, and inspect /var/vcap/instance/dns/records.json. This file shows the correlation between agentID and host IP address.
- InApplication name, specify the droplets to scan. Wildcards are supported. To scan all droplets, enter a single wildcard (*).
- InCap, specify the maximum number of droplets to scan. To scan all droplets, enter 0.
Review scan reports
Scan reports show all vulnerabilities found in the droplets in your blobstores. By default, droplets are rescanned every 24 hours.
A droplet, which is an artifact of the app staging process, contains the minimum required data to specify an app (binaries/libraries). Droplets are stored in blobstores. Review scan reports for droplets in
Monitor > Vulnerabilities > VMware Tanzu blobstore.
When an application is run in a Diego cell, it’s run on top of a stack, currently cflinuxfs3, which is derived from Ubuntu Bionic 18.04. Defender automatically scans all running applications (buildpack and docker). Review the scan reports for running apps in
Monitor > Vulnerabilities > Images.
If you compare the findings for a buildpack app in
Monitor > Vulnerabilities > VMware Tanzu blobstoreand
Monitor > Vulnerabilities > Images, you’ll notice a difference in the number of findings. Remember that
Monitor > Vulnerabilities > Imagesreports any additional findings in the app’s underlying stack that would not be found in the droplet alone.
When TAS stages Docker-based apps, it doesn’t stage an associated droplet in the blobstore. Therefore, blobstore scanning alone won’t cover Docker-based apps. If you’re running Docker containers in TAS, and you want to scan the images before they run, then configure Prisma Cloud to scan the container registry.
- Log into Prisma Cloud Console.
- Go toMonitor > Vulnerabilities > VMware Tanzu blobstoreto see a list of summary reports for each droplet.
- To drill into a specific scan report, click on a row in the table.