Table of Contents
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Prisma Cloud Container Images
- Kubernetes
- Deploy the Prisma Cloud Console on Amazon ECS
- Console on Fargate
- Onebox
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Container Service (ACS) with Kubernetes
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- IBM Kubernetes Service (IKS)
- OpenShift v4
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and Restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan Images in Alibaba Cloud Container Registry
- Scan Images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan Images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan Images in Google Container Registry (GCR)
- Scan Images in Harbor Registry
- Scan Images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger Registry Scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert Mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
Prometheus
Prometheus is a monitoring platform that scrapes the published endpoints of targets to collect their metrics.
You can configure Prisma Cloud to be a Prometheus target.
You can use Prometheus to monitor time series data across your environment and show high-level, dashboard-like, stats to visualize trends and changes.
Prisma Cloud’s instrumentation lets you track metrics such as the total number of connected Defenders and the total number of container images in your environment that your Defenders protect.
Metrics
Metrics are a core Prometheus concept.
Instrumented systems expose metrics.
Prometheus stores the metrics in its time-series database, and makes them easily available to query to understand how systems behave over time.
Prisma Cloud has two types of metrics:
- Counters: Single monotonically increasing values. A counter’s value can only increase or be reset to zero.
- Gauges: Single numerical values that can arbitrarily go up or down.
Prisma Cloud metrics
All Prisma Cloud metrics are listed in the following table.
Vulnerability and compliance metrics are updated every 24 hours.
The rest of the metrics are updated every 10 minutes.
The
vulnerabilities
and compliance
metrics report the number of many entities, for example images, containers, or hosts, that are at risk by the highest severity issue impacting them.
The images_critical_vulnerabilities
is not the total count of critical vulnerabilities in the images in your environment.
It is the total count of images where the highest severity CVE is critical.
For a thorough explanation of this type of metric, see Vulnerability Explorer.Metric | Type | Description |
---|---|---|
totalDefenders | Gauge | Total number of Defenders connected to Console.
Connected and disconnected Defenders can be reviewed in Console under Manage > Defenders > Manage . |
activeDefenders | Gauge | Total number of all Defenders for which a license is allocated, regardless of whether it is currently connected to Console or not. |
images_critical_vulnerabilities | Gauge | Total number of containers impacted by critical vulnerabilities. |
images_high_vulnerabilities | Gauge | Total number of containers impacted by high vulnerabilities. |
images_medium_vulnerabilities | Gauge | Total number of containers impacted by medium vulnerabilities. |
images_low_vulnerabilities | Gauge | Total number of containers impacted by low vulnerabilities. |
hosts_critical_vulnerabilities | Gauge | Total number of hosts impacted by critical vulnerabilities. |
hosts_high_vulnerabilities | Gauge | Total number of hosts impacted by high vulnerabilities. |
hosts_medium_vulnerabilities | Gauge | Total number of hosts impacted by medium vulnerabilities. |
hosts_low_vulnerabilities | Gauge | Total number of hosts impacted by low vulnerabilities. |
serverless_critical_vulnerabilities | Gauge | Total number of serverless functions impacted by critical vulnerabilities. |
serverless_high_vulnerabilities | Gauge | Total number of serverless functions impacted by high vulnerabilities. |
serverless_medium_vulnerabilities | Gauge | Total number of serverless functions impacted by medium vulnerabilities. |
serverless_low_vulnerabilities | Gauge | Total number of serverless functions impacted by low vulnerabilities. |
images_critical_compliance | Gauge | Total number of images impacted by critical compliance issues. |
images_high_compliance | Gauge | Total number of images impacted by high compliance issues. |
images_medium_compliance | Gauge | Total number of images impacted by medium compliance issues. |
images_low_compliance | Gauge | Total number of images impacted by low compliance issues. |
containers_critical_compliance | Gauge | Total number of containers impacted by critical compliance issues. |
containers_high_compliance | Gauge | Total number of containers impacted by high compliance issues. |
containers_medium_compliance | Gauge | Total number of containers impacted by medium compliance issues. |
containers_low_compliance | Gauge | Total number of containers impacted by low compliance issues. |
hosts_critical_compliance | Gauge | Total number of hosts impacted by critical compliance issues. |
hosts_high_compliance | Gauge | Total number of hosts impacted by high compliance issues. |
hosts_medium_compliance | Gauge | Total number of hosts impacted by medium compliance issues. |
hosts_low_compliance | Gauge | Total number of hosts impacted by low compliance issues. |
serverless_critical_compliance | Gauge | Total number of serverless functions impacted by critical compliance issues. |
serverless_high_compliance | Gauge | Total number of serverless functions impacted by high compliance issues. |
serverless_medium_compliance | Gauge | Total number of serverless functions impacted by medium compliance issues. |
serverless_low_compliance | Gauge | Total number of serverless functions impacted by low compliance issues. |
active_app_firewalls | Gauge | Total number of active app firewalls (WAAS). |
app_firewall_events | Gauge | Total number of app firewall (WAAS) events. |
protected_containers | Gauge | Total number of protected containers. |
container_runtime_events | Gauge | Total number of container runtime events. |
host_runtime_events | Gauge | Total number of host runtime events. |
access_events | Gauge | Total number of access events. |
registry_images | Gauge | The total number of registry images scanned. |
container_active_incidents | Gauge | The total number of container active incidents. |
container_archived_incidents | Gauge | The total number of container archived incidents. |
host_active_incidents | Gauge | The total number of host active incidents. |
host_archived_incidents | Gauge | The total number of host archived incidents. |
incident_snapshots | Gauge | The total number of incident snapshots on the console. |
incident_snapshots_size_mb Gauge The size in MB of incident snapshots | backups | Gauge |
The total backups stored in a system. | ci_image_scan_results | Gauge |
The total number of CI scanning results in the Prisma Cloud Console. | tenant_project_connectivity | Gauge |
For tenant projects, returns 1 if the tenant project is connected to the main console. | compliance_rules_consumed_collections | Gauge |
The total number of collections consumed by compliance rules. | vulnerability_rules_consumed_collections | Gauge |
The total number of collections consumed by vulnerability rules. | runtime_rules_consumed_collections | Gauge |
The total number of collections consumed by runtime rules. | api_requests | Counter |
Total number of requests to the Prisma Cloud API. | defender_events | Counter |
Integrate Prisma Cloud with Prometheus
The Prometheus server scrapes endpoints at configurable time intervals.
Regardless of the value you set for the Prometheus scrape interval, new Prisma Cloud data is only available at the following refresh rates.
- Vulnerability and compliance data is refreshed every 24 hours.
- All other data is refreshed every 10 minutes.
This procedure shows how to complete the following tasks.
- Enable the Prometheus integration.
- Configure the Prisma Cloud scrape.
- Start a Prometheus server running in a container.
If you already have a Prometheus server in your environment, you only need to enable the integration and configure the scrape.
- Enable the Prometheus integration.
- Log into Prisma Cloud Console.
- Go toManage > Alerts > Logging.
- SetPrometheus instrumentationtoEnabled.
- Prepare a scrape configuration file for the Prometheus server.
- Create a new prometheus.yml file, and open it for editing.
- Enter the following configuration fields.global: scrape_interval: 15s # Set the scrape interval to every 15 seconds. Default is every 1 minute. evaluation_interval: 15s # Evaluate rules every 15 seconds. The default is every 1 minute. # Prisma Cloud scrape configuration. scrape_configs: - job_name: 'twistlock' static_configs: - targets: ['CONSOLE_ADDRESS:8083'] metrics_path: /api/v1/metrics basic_auth: username: 'USER' password: 'PASS'
- Replace CONSOLE_ADDRESS with the DNS name or IP address for Prisma Cloud Console.
- Replace USER with a Prisma Cloud user, which has the minimum role ofAuditor.
- Replace PASS with that Prisma Cloud user’s password.
- Start the Prometheus server with the scrape configuration file.$ docker run \ --rm \ --network=host \ -p 9090:9090 \ -v /PATH_TO_YML/prometheus.yml:/etc/prometheus/prometheus.yml \ prom/prometheusGo to http://<PROMETHEUS_HOST>:9090/targets to validate that the Prisma Cloud integration is properly set up.To get results immediately for testing, restart the prisma Cloud Console. If you are using the PCEE, wait 10 minutes for the first refresh window to elapse.
- A central Prisma Cloud Console.
- A supervisor Prisma Cloud Console for a tenant project.
- CONSOLE_ADDRESS — DNS name or IP address for your central Prisma Cloud Console
- USER01 — Prisma Cloud user with access to central Prisma Cloud Console
- PASS01 — `USER01’s password
- USER02 — Prisma Cloud user with access to the tenant project
- PASS02 — `USER02’s password
- TENANT_PROJECT_NAME — name of the tenant project
- Go to http://<PROMETHEUS_HOST>:9090/graph
- ClickAdd Graph.
- In the drop-down list, selecttwistlock_total_defenders.
- ClickExecute. In theConsoletab, you see the value for total number of Defenders connected to the Prisma Cloud Console.
- Open theGraphtab to see a visual representation of how the number of Defenders has changed over time.
Use Prometheus with Projects
If you want to use Prometheus with projects, modify the scrape configuration file with an additional job for each Prisma Cloud Console.
If you are using tenant projects, enable Prometheus instrumentation in both the Central and Supervisor Consoles.
The following listing shows an example configuration that scrapes the following Prisma Cloud Consoles.
global: scrape_interval: 15s # Set the scrape interval to every 15 seconds. Default is every 1 minute. evaluation_interval: 15s # Evaluate rules every 15 seconds. The default is every 1 minute. # Prisma Cloud scrape configuration. scrape_configs: - job_name: 'Central Console' static_configs: - targets: [CONSOLE_ADDRESS:8083] metrics_path: /api/v1/metrics basic_auth: username: 'USER01' password: 'PASS01' - job_name: 'Tenant Console' static_configs: - targets: [CONSOLE_ADDRESS:8083] metrics_path: /api/v1/metrics scheme: http params: project: [TENANT_PROJECT_NAME] basic_auth: username: 'USER02' password: 'PASS02'
The configuration uses the following fields.
The value in job_name does not need to match anything else.
You can set it to anything.
Create a simple graph
Create a graph that shows the number of deployed Defenders.