How to Use CGS
Table 1 describes how to use CGS.
No. |
Step |
Description |
---|---|---|
1 |
Enabling cluster protection |
After protection is enabled, images and running containers on all nodes in a cluster can be checked in real time. |
2 |
(Optional) Configuring security policies |
Configuring security policies and applying the policies to an image can effectively prevent security risks in a running container. |
3 |
Viewing vulnerabilities |
Check the vulnerabilities on the image and determine whether to ignore the vulnerabilities. |
Checking container runtime security details |
View exceptions during the running of the container. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot