Set Up Transporter Network Tunnels using Docker Containers
Table of Contents
Prisma Cloud Enterprise Edition
Expand all | Collapse all
-
- Quick Start for Beginners
- Enable Application Security on Prisma Cloud
- Application Security Licenses
- Manage Roles and Permissions
- Generate Access Key
-
-
- Add Azure Repos to Prisma Cloud Application Security
- Add Bitbucket to Prisma Cloud Application Security
- Add Bitbucket Server to Prisma Cloud Application Security
- Add GitHub to Prisma Cloud Application Security
- Add GitHub Server to Prisma Cloud Application Security
- Add GitLab Self-Managed to Prisma Cloud Application Security
- Add GitLab to Prisma Cloud Application Security
-
- Add AWS Code Build to Prisma Cloud Application Security
- Add CircleCI to Prisma Cloud Application Security
- Add Checkov to Prisma Cloud Application Security
- Add GitHub Actions to Prisma Cloud Application Security
- Add Jenkins to Prisma Cloud Application Security
- Add Terraform Cloud (Sentinel)
- Add Terraform Cloud (Run Tasks)
- Add Terraform Enterprise (Sentinel)
- Add Terraform Enterprise (Run Tasks)
-
- Pre-receive Hooks
- Set up IaC Tag and Trace
- Setup Drift Detection
- Secrets Scanning
- Manage Workspaces
- Create and Manage Code Category views
Set Up Transporter Network Tunnels using Docker Containers
Setup the Transporter network tunnel using Docker Containers.
- Verify the prerequisites.
- Add Prisma Cloud IP addresses and hostnameEnsure you add the Prisma Cloud IP addresses and hostname for Application Security to an allow list. In addition, to allow access for`egress` network you are required add the IP addresses to firewall or proxy in use. To know more see enable access to the Prisma Cloud Console.
- Access KeyThe Prisma Cloud access key enables you to integrate your self-hosted VCS with Prisma Cloud. If you do not have an access key, see generate access key.
- Secret KeyThe Prisma Cloud secret key generates with the access key. Save your secret key once it is generated, as you cannot see it again on Prima Cloud console.
- Install DockerTransporter Client requires Docker to run in your environment with network access to your self-hosted VCS. In addition, to establish a communication channel with Prisma Cloud you need egress network access.
- Certificate and path accessFor Transporter to establish a secure webhook connection to your VCS an SSL certificate is required. The webhook is established in your environment, therefore you are required to define the path for the SSL certificate storage path and key.
- LimitationsThere are hardware limitations you need to consider for Transporter configuration.
- When total size of all scanned repositories is under 4 GB - machine with 2 CPU / 8GB RAM (tested on m5.large EC2 instance).
- For bigger scale repositories (total size over 4GB) - machine with 4 CPU / 16GB RAM (tested with m5.xlarge EC2 instance).
- Access Manage Network Tunnels to configure the Transporter on Prisma Cloud.
- SelectSettings > Code & Build Providers > Manage Network Tunnels.
- SelectNew Transporterto create a new Transporter.
- Configure Transporter on Prisma Cloud.
- AddTransporter Name.The Transporter name is a unique helping you group and define multiple connections on Prisma Cloud console.Ensure the Transporter unique name does not have any spaces between characters.
- AddTransporter URLandPort.The Transporter URL is a proxy URL with a port number you must define. This information will also be part of the Docker files configured in Transporter, which helps communicate with Prisma Cloud.
- AddPrisma Cloud Access KeyandPrisma Cloud Secret Key.
- AddSSL Certificate pathandSSL Certificate key path.This includes the local path of the SSL certificate and key, where the certificate path allows webhooks to integrate with Transporter and certificate key allows WebSockets to communicate over HTTPS.Ensure the path of the certificate is for the specified Transporter client URL and Port.
- SelectNextto configure deploying the Transporter client.
- Provide permissions to pull and run Docker in your environment.
- Use the permissions inVerify and add permissions for set SSL Certificate pathin your terminal. The command defines the permission to use the SSL certificate while defining the local path to the certificate.
- Use the Docker pull CLI command in your terminal to pull the Docker image.
- You can choose to run the Docker image either Using Docker commands or Docker compose to establish communication between Prisma Cloud and your self-hosted VCS (version control system).
- Using Docker commandsYou are required to run the additional commands.
- Use theLogs volumecommand in your terminal to save the Docker logs as a dedicated volume.
- Use theDocker Run CLI commandin your terminal to run the pulled Docker image.
- Docker composeTo run the Docker compose you require additional commands.
- Use theDocker Compose Contentto create and save docker-compose file content that you can later use.
- Use the Docker-Compose CLI Command in your terminal to run the docker-compose CLI command.-d value in the command is used based on the docker compose yml file name.After the connection is established between the Prisma Cloud and your self-hosted VCS (version control system), the communication required for Transporter to function is through the WebSocket.
- SelectNextafter you run the Transporter in your environment.
- SelectDoneto complete the integration.Only after the Transporter has run successfully can Prisma Cloud authenticate and establish a communication channel with your VCS. You should be able to see the Transporter onSettings > Code & Build Providers > Manage Network Tunnels > Manage Integrations.You can add the Transporter to a new or existing VCS integration on Prisma Cloud fromSettings > Code & Build Providers > Add Repository. Adding the Transporter to an integration establishes the communication channel between the VCS and Prisma Cloud. In this example, the GitLab Self-managed integration to Prisma Cloud uses the Transporter.
Manage Transporter
You can manage the existing Transporter configuration by editing or deleting Transporter.
- Health CheckPrisma Cloud scans every Transporter configuration for a secure connection. After authenticating the secure connection, you will view the health check of the Transporter.Prisma cloud supports three types of client health checks:
- Transporter Client at VCS DomainChecks if there is a connection with VCS machine using Transporter.
- Additional headers to a CURL command are needed in order to point to what vcs the check should be applied to:
- x-forwarded-host: The vcs machine hostname for the check.
- x-forwarded-path: The path of the request to send to the VCS machine.
- x-forwarded-proto: The protocol which to check connectivity on, https or http.
- Transporter Client at Prisma Cloud Server
- Transporter Client in client environment and Transporter Client at Prisma Cloud environment.Check if the certificates given are relevant for the domain of the machine and runs at request on https.The health check provides real time information on the number of VCS integrations and the last attempt to establish a secure connection between the VCS and Prisma Cloud. Health checks on the Transporter run every hour. However, you can also refresh the connection anytime on Prisma Cloud.
- Delete TransporterDeleting the Transporter is only possible if you have removed existing VCS integrations with the Transporter.
- SelectSettings > Code & Build Providers > Manage Network Tunneland then select a specific Transporter name.
- SelectDelete Transporter.
- Edit TransporterYou can choose to edit the configuration of an existing Transporter.
- SelectSettings > Code & Build Providers > Manage Network Tunneland then select a specific Transporter name.
- Edit the configurations and then selectNext.