- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Supported OS
Prisma Cloud Compute Edition is a security scanner. It scans containers, hosts, and packages to find vulnerabilities and compliance issues.
The Prisma Cloud Compute Edition check is included in the Datadog Agent package, so you do not need to install anything else on your server.
To configure this check for an Agent running on a host:
Edit the twistlock.d/conf.yaml
file, in the conf.d/
folder at the root of your Agent’s configuration directory to start collecting your twistlock performance data. See the sample twistlock.d/conf.yaml for all available configuration options.
For containerized environments, see the Autodiscovery Integration Templates for guidance on applying the parameters below.
Parameter | Value |
---|---|
<INTEGRATION_NAME> | twistlock |
<INIT_CONFIG> | blank or {} |
<INSTANCE_CONFIG> | {"url":"http://%%host%%:8083", "username":"<USERNAME>", "password": "<PASSWORD>"} |
If you’re using Kubernetes, add the config to replication controller section of twistlock_console.yaml before deploying:
apiVersion: v1
kind: ReplicationController
metadata:
name: twistlock-console
namespace: twistlock
spec:
replicas: 1
selector:
name: twistlock-console
template:
metadata:
annotations:
ad.datadoghq.com/twistlock-console.check_names: '["twistlock"]'
ad.datadoghq.com/twistlock-console.init_configs: "[{}]"
ad.datadoghq.com/twistlock-console.instances: '[{"url":"http://%%host%%:8083", "username":"<USERNAME>", "password": "<PASSWORD>"}]'
ad.datadoghq.com/twistlock-console.logs: '[{"source": "twistlock", "service": "twistlock"}]'
name: twistlock-console
namespace: twistlock
labels:
name: twistlock-console
Log collection is not supported for the Datadog site.
Available for Agent versions >6.0
Collecting logs is disabled by default in the Datadog Agent. To enable it, see Kubernetes Log Collection.
Parameter | Value |
---|---|
<LOG_CONFIG> | {"source": "twistlock", "service": "twistlock"} |
Collecting logs is disabled by default in the Datadog Agent. Enable it in your DaemonSet configuration:
#(...)
env:
#(...)
- name: DD_LOGS_ENABLED
value: "true"
- name: DD_LOGS_CONFIG_CONTAINER_COLLECT_ALL
value: "true"
#(...)
Mount the Docker socket to the Datadog Agent. See the Datadog Kubernetes example manifests.
Make sure the log section is included in the Pod annotation for the defender, where the container name can be found just below in the pod spec:
ad.datadoghq.com/<container-name>.logs: '[{"source": "twistlock", "service": "twistlock"}]'
Collecting logs is disabled by default in the Datadog Agent. Enable it with the environment variable:
DD_LOGS_ENABLED=true
Add a label on the defender container:
ad.datadoghq.com/<container-name>.logs: '[{"source": "twistlock", "service": "twistlock"}]'
Mount the Docker socket to the Datadog Agent. More information about the required configuration to collect logs with the Datadog Agent available in Docker Log Collection.
Run the Agent’s status subcommand and look for twistlock
under the Checks section.
twistlock.containers.compliance.count (gauge) | The number of compliance violations a container has Shown as occurrence |
twistlock.hosts.compliance.count (gauge) | The number of compliance violations a host has Shown as occurrence |
twistlock.hosts.cve.count (gauge) | The number of CVEs a host has Shown as occurrence |
twistlock.hosts.cve.details (gauge) | The details of a CVE on a host Shown as occurrence |
twistlock.images.compliance.count (gauge) | The number of compliance violations an image has Shown as occurrence |
twistlock.images.cve.count (gauge) | The number of CVEs an image has Shown as occurrence |
twistlock.images.cve.details (gauge) | The details of a CVE on an image Shown as occurrence |
twistlock.images.layer_count (gauge) | The count of layers in a local image Shown as occurrence |
twistlock.images.size (gauge) | The size of a local image Shown as byte |
twistlock.registry.compliance.count (gauge) | The number of compliance violations an image in a registry has Shown as occurrence |
twistlock.registry.cve.count (gauge) | The number of CVEs an image in a registry has Shown as occurrence |
twistlock.registry.cve.details (gauge) | The details of a CVE on an image in a registry Shown as occurrence |
twistlock.registry.layer_count (gauge) | The count of layers in an image in a registry Shown as occurrence |
twistlock.registry.size (gauge) | The size of an image in a registry Shown as byte |
Prisma Cloud Compute Edition sends an event when a new CVE is found.
twistlock.license_ok
Returns Critical if the Agent cannot retrieve the Licence data or its expiring, OK otherwise.
Statuses: ok, warning, critical
twistlock.registry
Returns Critical if the Agent cannot retrieve registry data, OK otherwise.
Statuses: ok, critical
twistlock.can_connect
Returns Critical if the Agent cannot retrieve image data from the registry, OK otherwise.
Statuses: ok, critical
twistlock.images
Returns Critical if the image hasn’t been scanned in critical_days, OK otherwise.
Statuses: ok, warning, critical
twistlock.hosts
Returns Critical if the host hasn’t been scanned in critical_days, OK otherwise.
Statuses: ok, warning, critical
twistlock.containers
Returns Critical if the container hasn’t been scanned in critical_days, OK otherwise.
Statuses: ok, warning, critical
Need help? Contact Datadog support.