Enabling Container WTP
Scenarios
You can enable container WTP to protect website applications. Container WTP protects static web pages. The protection object is an image. If you enable the HSS container edition for a contain node, all containerized website applications associated with the target image on the container node will be protected.
Prerequisites
- You have enabled the HSS container edition for a container node. For details, see Enabling Protection.
- You have purchased container WTP. For details, see Purchasing Container WTP.
Enabling Container WTP
- Log in to the HSS console.
- Click
in the upper left corner and select a region or project. - In the navigation pane on the left, choose > Web Tamper Protection.
- Choose and click Add Asset.
- Select the images you want to protect. For more information, see Table 1.
Figure 1 Select Image
Table 1 Parameters for selecting an image Parameter
Description
Example Value
Web Application Name
Enter the name of the website application you want to protect. The name must be unique.
www.test.com
Protection Scope
Protection scope of the website application. You can select:
- Kubernetes cluster: The website application is deployed in a cluster.
- Independent node: The website application is deployed on an independent node.
Kubernetes cluster
Tags (Optional)
This parameter is mandatory only when Protection Scope is set to Kubernetes cluster.
You can configure resource tags for your cluster. HSS will automatically obtain the tags you configure for your cluster.
If the container WTP type is set to Block, HSS identifies Deployments based on the website application cluster resource tags. If the rolling upgrade policy is used for Deployments, the containers that match protected images in Deployments will be configured to read-only.
A maximum of 10 tags can be added. If multiple tags are added, only the deployments with all tags are matched.
Website
Selected Images
Container WTP protects containerized website applications associated with protected images.
- If Protection Scope is set to Kubernetes cluster, the image in each cluster requires one container WTP quota. It can protect the containers associated with the image on all nodes where the HSS container protection is enabled in the cluster. If an image is used for multiple clusters, the number of required quotas is equal to the number of clusters.
- If Protection Scope is set to Independent node, every image for each node requires one quota of the container WTP service to protect the containers associated with the image. If an image is used for multiple nodes, the number of required quotas is equal to the number of nodes.
Select the images you want to protect.
- Select Existing Image: You can select repository images or local images obtained by HSS. If the image you want to protect is from a third-party repository, ensure that the repository has been connected to HSS. For details, see Connecting to a Third-party Image Repository.
- Add Image: In the Add Image dialog box, enter the name and version of the image used for the website application you want to protect. Be sure to enter right information, or HSS will not be able to find or protect your containers. If no image tag is specified, all the running containers using any tags of the image will be protected.
If Protection Scope is set to Kubernetes cluster and Type is set to Block, enabling protection will automatically restart the containers deployed in the Deployments identified by tag and using a rolling upgrade policy, and will configure their file systems to read-only. You are advised to select all images used for the website application at a time to avoid repeated restarts.
-
- After the images to be protected are selected, click Next.
- Configure a protection policy. For details about related parameters, see Table 2.
Figure 2 Configuring a protection policy
- Confirm parameter settings and click Next.
- Configure when you want to enable Container WTP.
- Now
If you select Now for Enable Protection, you need to configure the quota you need, read the Host Security Service Disclaimer, and select the check box before "I have read and agree to the Host Security Service Disclaimer." You can configure quotas in either of the following ways:
- Select a quota randomly: The system automatically allocates available quotas with the longest expiration time to all assets. This option is selected by default.
- Quota ID: You need to select the quota IDs in the drop-down list based on the number of selected assets. For example, if two assets are selected, you need to select two target quota IDs as well.
If Protection Scope is set to Kubernetes cluster and Type is set to Block, enabling protection will automatically restart the containers deployed in the Deployments identified by tag and using a rolling upgrade policy, and will configure their file systems to read-only. You are advised to enable protection during off-peak hours or cluster upgrade. In other scenarios, you can enable protection immediately.
- Later
If you select this, HSS saves the protection settings of the website application but does not enable protection. You can click Enable Protection on the Container WTP tab page later during off-peak hours or cluster upgrade.
- Now
- Click OK. The container WTP configuration is complete.
You can check the image protection status on the protected asset page. If the image status is Protected, the protection is enabled successfully. For details about protection statuses, see Table 3.
Table 3 Container WTP status description Status
Description
Unprotected
You have completed the WTP configuration but selected Later for Enable Protection when adding the asset. You can locate the row containing the target image and click Enable Protection in the Operation column.
Protected
The target image is under protection.
Partially protected
Some directories are protected, but some directories fail to be protected. You can click the number in the Protected Containers column of the target image to go to the protected container page and click View Details in the row where the container fails to be protected is listed.
Protection failed
All protected directories failed to be protected. You can click the number in the Protected Containers column of the target image to go to the protected container page and click View Details in the row where the container fails to be protected.
Redundant Protection
The current image is not associated with any containers. Possible causes:
- The node associated with this image is not protected by the container edition. Protection policies cannot be applied.
- This image is not associated with any container instances in a protected cluster or independent node. Container protection is enabled but cannot be applied.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot


