WAAS Troubleshooting
Table of Contents
Prisma Cloud Enterprise Edition
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
- Deploy Defender with Declarative Object Management
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Configure Agentless Scanning for AWS
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and Restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Customize terminal output
- Collections
- Tags
- WildFire Settings
- Log Scrubbing
- Permissions by feature
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan Images in Alibaba Cloud Container Registry
- Scan Images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan Images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan Images in Google Container Registry (GCR)
- Scan Images in Harbor Registry
- Scan Images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger Registry Scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Malware Scanning
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert Mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
WAAS Troubleshooting
Troubleshooting Container or Host Rules
Follow these steps to troubleshoot WAAS issues using the table below:
- Ensure the protected container or host is protected by WAAS - a green firewall icon should appear next to the workload’s radar entity and a "WAAS" tab should appear when clicked.
- Click on the workload in the radar and open WAAS connectivity monitor by clicking on the WAAS tab.
- Click on Reset to reset all counters.
- Send one or more HTTP requests to the protected application
- Click on Refresh and match changes in the request counters to the Connectivity Monitor Indications column in the table below
- If the WAAS errors counter has been incremented, click on View recent errors to view errors.
- A section of troubleshooting potential outcomes is provided below, along with possible causes and solutions.
WAAS connectivity monitor
WAAS connectivity monitor monitors the connection between WAAS and the protected application.
WAAS connectivity monitor aggregates data on pages served by WAAS and the application responses.
In addition, it provides easy access to WAAS related errors registered in the Defender logs (Defenders sends logs to the Console every hour).
The monitor tab becomes available when you click on an image or host protected by WAAS.

- Last updated- Most recent time when WAAS monitoring data was sent from the Defenders to the Console (Defender logs are sent to the Console on an hourly basis). By clicking on therefreshbutton users can initiate sending of newer data.
- Aggregation start time- Time when data aggregation began. By clicking on theresetbutton users can reset all counters.
- WAAS errors- To view recent errors related to a monitored image or host, click theView recent errorslink.
- WAAS statistics:
- Incoming requests - Count of HTTP requests inspected by WAAS since the start of aggregation.
- Forwarded requests - Count of HTTP requests forwarded by WAAS to the protected application.
- Interstitial pages served - Count of interstitial pages served by WAAS (interstitial pages are served once Prisma Sessions Cookies are enabled).
- reCAPTCHAs served - Count of reCAPTCHA challenges served by WAAS (when enabled as part of bot protection).
- Application statistics
- Count of server responses returned from the protected application to WAAS grouped by HTTP response code prefix
- Count of timeouts (a timeout is counted when a request is forwarded by WAAS to the protected application with no response received within the set timeout period).
Existing WAAS and application statistics counts will be lost once users reset the aggregation start time. will
not
affect WAAS errors and will not cause recent errors to be lost.For further details on WAAS deployment, monitoring and troubleshooting please refer to the WAAS deployment page.
Troubleshooting Potential Outcomes
Application is not responding
Possible reasons | Connectivity Monitor Indications | Solution |
---|---|---|
A problem with the protected application | Not a WAAS issue, check the application error logs.
Disable WAAS rule and check if the problem persists. | |
TLS related issues:
- Expired certificate
- Protected application is using TLS, but TLS was not enabled in app | - None of the counters is getting incremented.
- WAAS Errors counter incremented. | Click on View recent errors in the WAAS connectivity monitor to view errors.
If the application is communicating over TLS:
- Ensure TLS toggle is enabled
- Ensure certificates are valid |
Prisma Session Cookies is enabled and the client accessing the application does not support both cookies and Javascript. | - Incoming requests are incremented.
- `Interstitial pages served counter is incremented.
- None of the Application Statistics counters is incremented. | Disable Prisma Session Cookies and validate the issue is resolved.
Ensure clients accessing the protected application support both cookies and Javascript before re-enabling Prisma Session Cookies.
Please see Prisma Session Cookies section for more details. |
reCAPTCHA is enabled and clients and preventing clients from reaching the protected application. | - Incoming requests is incremented.
- reCAPTCHAs served is incremented.
- None of the Application Statistics counters is incremented. |
Application is responding as expected yet WAAS protections do not trigger
Possible reasons | Connectivity Monitor Indications | Solution |
---|---|---|
Minimum version requirements of Defenders for a protection or a feature are not met. | - For new deployment methods (e.g. Out-of-band, VPC traffic mirroring) - WAAS will not get deployed and the WAAS tab will not be available on the radar view.
- For new features added to existing deployment methods, WAAS operations will continue as usual while new features will not function | Verify that all Defenders meet the minimum requirement stated in the feature documentation before enabling it. |
WAAS port is not properly configured. | Incoming requests is not incremented | The App port should be set to the port on which the protected application is listening. For containers the app port should be set to the exposed port on the container (not necessarily the same as the publicly exposed port). |
Workload is not included in rule scope. | The workload radar entity does not have a firewall icon next to it, and the WAAS tab is not available when clicked. | Navigate to the relevant WAAS rule ( Defend → WAAS ) and click on Show in the Entities in scope column.
Verify the workload is not in scope and adjust scope to include it. |
Workload is included in the scope of two WAAS rules (only first by order will match). | The workload radar entity does not have a firewall icon next to it, and the WAAS tab is not available when clicked. | Navigate to the relevant WAAS rule ( Defend → WAAS ).
Click the Show link under the Entities in scope column of each rule to check whether the protected workload is included in the scope of two or more rules.
Whenever several rules apply to the same scope, only the first rule by order will match.
Ensure that the desired rule matches first by altering rule scope collections or reordering rules. |
HTTP hostname is included in the scope of two or more apps under the same WAAS rules (only first app by order will match). | - Incoming requests is incremented.
- Forwarded requests is incremented.
- Application statistics counters are incremented. | Navigate to the relevant WAAS rule ( Defend → WAAS ) and select the relevant WAAS rule.
Check the order of the apps (policies) in the rule.
Whenever multiple apps are defined in the same rule only the first app by order will match. |
Request URL is not included in the list of protected endpoints. | Green firewall icon should appear next to the workload’s radar entity
None of the counters is getting incremented | Navigate to the relevant WAAS rule ( Defend → WAAS ) and select the relevant WAAS rule.
Open the app and ensure the request URL is listed under protected endpoints:
- Verify base path ends with an * to include all subpaths
- Verify HTTP hostname in the request matches the listed HTTP hostnames
- Verify scheme in the request matches the scheme in the protected endpoints list (TLS is enabled/disabled accordingly) |
Application is responding with HTTP errors (3XX, 4XX, 5XX)
Possible reasons | Connectivity Monitor Indications | Solution |
---|---|---|
Errors are generated by WAAS (requests are not forwarded to the protected application) | - None of the Application Statistics counters is incremented.
- WAAS Errors counter incremented. | |
Errors are generated by the protected application | - Incoming requests is incremented.
- Forwarded requests is incremented.
- Application statistics 3XX, 4XX or 5XX counters are incremented. | Check the protected application logs for errors. |
Multiple servers configured in NGINX | - Application statistics 3XX, 4XX or 5XX counters are incremented. | Create a PCSUP to get engineering guidance on how to resolve this issue. To the ticket please attach the Nginx configs and output of the netstat command for port 80, sudo netstat -nlp | grep 80. |
WAAS is blocking legitimate requests
Possible reasons | Connectivity Monitor Indications | Solution |
---|---|---|
False positive | - Incoming requests is incremented.
- Forwarded requests is incremented.
- Application statistics counters are incremented. | Navigate to WAAS analytics ( Monitor → Events → WAAS for containers/hosts ) and review audits generated.
Add exceptions to protections causing false triggers. |
WAAS events all have the same attacker IP (private IP)
Possible reasons | Connectivity Monitor Indications | Solution |
---|---|---|
Ingress controller is not set as a transparent proxy | - Incoming requests is incremented.
- Forwarded requests is incremented.
- Application statistics counters are incremented. | Configure ingress controller as transparent proxy (enable “X-Forwarded-For” and “X-Forwarded-Host” HTTP headers). |
WaitCondition received failed message: 'Defender deployment failed' for uniqueid: i-xxxx.
AWS CloudFormation stack failed to deploy the WAAS agentless resources because Prisma Console is not accessible from AWS.

- Make sure that the IP address of Prisma Console in the VPC configuration is public.
- Check if the Defender instance has a public IP address.
- Check if AWS account can connect with the Prisma Cloud Console with Console URL that you selected in the VPC configuration.
- If the Console is not reachable, delete the rule and create a new rule with a valid Prisma Cloud Console URL.
- If the Console is not reachable due to a firewall rule or other blocking rules, fix the rule to allow the connectivity to the Console, and clickUpdateto retry the deployment.
- Ensure that the Console’s IP address and the ports are reachable by the Defender. Also, the firewall is open with the relevant port and source IPs.