Cloud Connected
Panther Cloud Connected deployments
Overview
Under the Cloud Connected deployment model, your organization owns the Snowflake and AWS accounts in which your Panther instance is deployed, while Panther manages initial deployments and subsequent upgrades. To deploy a Cloud Connected instance of Panther, follow the instructions in Setting Up a Cloud Connected Panther Instance.
In the Cloud Connected model, Panther performs deployment and maintenance work by assuming an IAM role named PantherDeploymentRole
. When a Cloud Connected instance is deployed, Panther will self-monitor by automatically ingesting audit logs produced by your AWS account. This allows you to monitor actions taken by the PantherDeploymentRole
, as well as any other IAM role.
After your Panther deployment is complete, you can monitor your Panther-related AWS costs.
Learn about Panther's other deployment models on Panther Deployment Types.
Aside from the modifications in AWS you are asked to make as part of the Cloud Connected setup process, it is highly discouraged to make any additional changes to the AWS account your Panther infrastructure resides in, including creating additional resources (such as Data Transport sources) and/or updating any permissions. Such changes may interfere with Panther's automation software.
How to set up a Cloud Connected instance of Panther
Follow the instructions in Setting Up a Cloud Connected Panther Instance.
Cloud Connected deployment monitoring
Monitoring your Panther AWS costs
You can monitor your Panther-related spend in AWS by using the AWS Cost Explorer.
If you have not already, enable Cost Explorer.
View the Cost Explorer chart to explore usage and cost amounts.
Use the Filter and Group by fields to narrow your search to certain services, tag names, and/or usage types.
Learn more about Panther and customer-defined AWS resource tags below.
How Panther monitors your Cloud Connected deployment
In order to provide a SaaS-like experience, Panther monitors Cloud Connected deployments using the following tools:
Datadog for metrics and system logs
Sentry for alerting on errors
Pendo for user and product analytics
Using AWS resource tags
Panther-defined tags on AWS resources
Panther defines tags on your AWS resources, which may be useful in cost analysis. In order for them to be used, you must first activate them.
Panther defines the following tags on your AWS resources:
panther:app
panther:resource
panther:subsystem
panther:version
Custom tags on AWS resources
It's possible to add custom tags to your AWS resources, if you would like. Doing so may aid in your billing analysis.
To add custom tags, reach out to your Panther support team with the list of tag keys and values.
(Optional) Creating read-only roles for Panther data tables
Panther maintains the pantheraccountadmin
user credentials in a secure location.
If needed, you can create and maintain several users with read-only access to the Panther data lake tables. To do so, run the following commands (using the pantheraccountadmin
user or another SECURITYADMIN
-enabled user on your Snowflake account):
(Not recommended) Disabling and re-enabling the pantheraccountadmin user
Disabling the pantheraccountadmin
user may prevent Panther from being able to:
Perform credential rotation
Enable certain functionality, such as Role-Based Access Control (RBAC)
Deploy new data lake features requiring
ACCOUNTADMIN
-level permissions
If you choose to disable the pantheraccountadmin
user despite the implications above, you may do so using the following commands:
If a Panther upgrade requires privileged access, the user can then be temporarily re-enabled:
Decommissioning a Cloud Connected Panther deployment
If you need to decommission a Panther deployment, you can simply terminate the AWS and Snowflake accounts. If you'd like to retain you Snowflake data, you can preserve that account while terminating the AWS account.
Last updated
Was this helpful?