Updated on 2025-12-12 GMT+08:00

Viewing Container Assets

Scenario

Check the container asset information collected by HSS and handle asset anomalies.

Constraints

  • Only the HSS container edition supports the container fingerprint function.
  • Only Linux is supported.

Viewing Cluster Information

  1. Log in to the HSS console.
  2. Click in the upper left corner and select a region or project.
  3. Choose Asset Management > Container Assets. Click the Cluster tab.

    Figure 1 Clusters

  4. (Optional) If you have enabled the enterprise project function, select an enterprise project from the Enterprise Project drop-down list in the upper part of the page to view its data.
  5. View the cluster list, workload, service, and pod information.

Viewing Node Information

  1. Log in to the HSS console.
  2. Click in the upper left corner and select a region or project.
  3. Choose Asset Management > Container Assets. Click the Nodes tab.

    Figure 2 Nodes

  4. (Optional) If you have enabled the enterprise project function, select an enterprise project from the Enterprise Project drop-down list in the upper part of the page to view its data.
  5. View information about cluster nodes and independent nodes.

Viewing Container Information

  1. Log in to the HSS console.
  2. Click in the upper left corner and select a region or project.
  3. Choose Asset Management > Container Assets. Click the Containers tab.

    Figure 3 Containers

  4. (Optional) If you have enabled the enterprise project function, select an enterprise project from the Enterprise Project drop-down list in the upper part of the page to view its data.
  5. View container information.

Viewing Image Information

  1. Log in to the HSS console.
  2. Click in the upper left corner and select a region or project.
  3. Choose Asset Management > Container Assets. Click the Images tab.

    Figure 4 Images

  4. (Optional) If you have enabled the enterprise project function, select an enterprise project from the Enterprise Project drop-down list in the upper part of the page to view its data.
  5. View the CI/CD image, local image, and container image information.

Viewing the Container Fingerprints of a Node

  1. Log in to the HSS console.
  2. Click in the upper left corner and select a region or project.
  3. In the navigation pane, choose Asset Management > Servers & Quota. Click the Servers tab.
  4. (Optional) If you have enabled the enterprise project function, select an enterprise project from the Enterprise Project drop-down list in the upper part of the page to view its data.
  5. Click the name of the target server. On the server details page that is displayed, click the Asset Fingerprints > Containers tab.

    Figure 5 Viewing the container fingerprints of a node

  6. In the Fingerprints list, click a fingerprint type to view details.

    Figure 6 Viewing container fingerprint details

  7. (Optional) Remove risky assets.

    If you find unsafe assets after counting, remove them in time.

    If you receive port alarms, you can set Dangerous Port to Yes in the search box of the Open Ports area to filter dangerous ports. You are advised to handle unsafe ports as follows:

    • If HSS detects open dangerous ports or unused ports, check whether they are really used by your services. If they are not, disable them. For dangerous ports, you are advised to further check their program files, and delete or isolate their source files if necessary.
    • If a detected high-risk port is actually a normal port used for services, you can ignore it. Ignored alarms will neither be recorded as unsafe items and nor trigger alarms.

    For more information, see High-risk port list.

Viewing the Fingerprints of All Containers

  1. Log in to the HSS console.
  2. Click in the upper left corner and select a region or project.
  3. Choose Asset Management > Container Assets. Click the Container Fingerprints tab.

    Figure 7 Container fingerprints

  4. (Optional) If you have enabled the enterprise project function, select an enterprise project from the Enterprise Project drop-down list in the upper part of the page to view its data.
  5. Check the container fingerprint overview.

    Figure 8 Checking the container fingerprint overview

  6. Click a fingerprint type in the fingerprint list, for example, Installed Software, to view its details.

    The meanings of the numbers in Figure 9 are as follows:

    • 1: the fingerprint list and the number of associated containers
    • 2: The fingerprint details list. You can click a fingerprint in the fingerprint list on the left to view its details.
    Figure 9 Viewing container fingerprint details

  7. (Optional) Remove risky assets.

    If you find unsafe assets after counting, remove them in a timely manner.

    If you receive port alarms, you can set Dangerous Port to Yes in the search box of the Open Ports area to filter dangerous ports. You are advised to handle unsafe ports as follows:

    • If HSS detects open high-risk ports or unused ports, check whether they are really used by your services. If they are not, disable them. For dangerous ports, you are advised to further check their program files, and delete or isolate their source files if necessary.
    • If a detected high-risk port is actually a normal port used for services, you can ignore it. Ignored alarms will neither be recorded as unsafe items and nor trigger alarms.

    High-risk port list describes the common dangerous ports.