Troubleshooting Prisma Cloud Kubernetes Auditing Integration with Amazon EKS

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
L0 Member
100% helpful (1/1)

By Kiran Kaukuntla, Senior Customer Success Engineer

 

Overview

 

The Kubernetes auditing system tracks the activities of users, administrators, and other components impacting the cluster. Once you configure the Prisma Cloud CWP Kubernetes auditing feature, Prisma Cloud can ingest, analyze, and alert on security-relevant events. You can either write custom rules or use pre-written rules from Prisma Cloud Labs to evaluate the incoming audit stream and detect suspicious activities.

 

This article outlines troubleshooting steps to follow if audit logs are not visible in the console after configuring Kubernetes auditing for your Elastic Kubernetes Service (EKS).

 

Troubleshooting Steps

 

1. Validate Kubernetes Auditing Configuration

 

First, confirm that the Kubernetes auditing configuration is successful. Navigate to the console and go to Defend > Access > Kubernetes to verify if an audit has been created.

 

unnamed.jpg

Figure 1: Kubernetes-Audits_PaloAltoNetworks

 

If no audit is visible, wait 10-15 minutes. Prisma Cloud retrieves audits from AWS CloudWatch, polling it every 10-15 minutes for new data. If you still don’t see any events, follow the troubleshooting steps below:

 

2. Verify EKS Logs Export to AWS CloudWatch

 

Ensure that EKS is set up to export logs to AWS CloudWatch. Follow the instructions in the AWS documentation and make sure the EKS Control Plane Logging for "Audit" logs is enabled for your EKS cluster.

 

3. Check IAM Permissions for Prisma Cloud

 

Verify that the AWS IAM Role or User configured for EKS Auditing has the necessary read-only permissions for CloudWatch. The role should have the following permissions:

 

  • logs:GetQueryResults

  • logs:StartQuery

  • logs:DescribeLogGroups

 

Refer to the AWS managed policy documentation for details on the required permissions.

 

4. Review CloudTrail Logs

 

If you’ve confirmed that CloudWatch permissions are correctly configured and still do not see audits in Prisma Cloud, review the CloudTrail logs. Check if events related to StartQuery, GetQueryResults, and DescribeLogGroups are logged from the user configured in Prisma Cloud. 

 

For guidance, refer to the AWS CloudTrail documentation.

 

unnamed.png

Figure 2: CloudTrails-Events_PaloAltoNetworks

 

5. Inspect Prisma Cloud Console Debug Logs

 

If issues persist, review the console debug logs in Prisma Cloud. Search for the keyword “audit” and examine related errors. For more information, refer to the Prisma Cloud debug logs guide.

 

Eks article 1.jpg

Figure 3: Console-Debuglogs_PaloAltoNetworks 

 

6. Clean Up Inactive Clusters

 

Ensure that all onboarded clusters in the Prisma Cloud Kubernetes Auditing configuration page are active and properly integrated with Prisma Cloud. Inactive or incorrectly integrated clusters can prevent Prisma Cloud from polling audit logs effectively on the newly on-boarded clusters.

 

eks article 2.jpg

Figure 4: KubernetesAuditing-Configuration_PaloAltoNetworks

 

If, after following these troubleshooting steps, the issue remains unresolved, consult AWS and Prisma Cloud Support for further assistance:

 

  • AWS Support: Reach out for help with EKS and CloudWatch integration problems.

  • Prisma Cloud Support: Contact for assistance with issues related to Prisma Cloud’s integration with EKS.

 

Conclusion

 

This article outlines troubleshooting steps to follow if audit logs are not visible in the console after configuring Kubernetes auditing for your Elastic Kubernetes Service (EKS). By following these troubleshooting steps, you should see Prisma Cloud ingesting and alerting on security-relevant events for EKS. 

 

References

 

[1] Prisma Kubernetes Auditing 

[2] EKS Control Plane Logging

[3] CloudWatch Logs Read-Only Policy

[4] Cloud Trail Logs

[5] Prisma  Console Debug logs


About the Author

Kiran Kaukuntla is a senior customer success engineer specializing in Prisma Cloud, AWS, Azure, GCP, containers and Kubernetes. He uses collaborative approaches to break down complex problems into solutions for global enterprise customers and leverage their multi industry knowledge to inspire success. 

 

 

Rate this article:
  • 564 Views
  • 0 comments
  • 1 Likes
Register or Sign-in
Contributors
Labels
Article Dashboard
Version history
Last Updated:
‎08-20-2024 03:30 PM
Updated by: