Modifying Container WTP Configuration
Scenario
You can modify configuration after container WTP is enabled. You can perform the following operations:
- Modify a tag: HSS obtains the Deployment of the website application based on the cluster resource tag. If the upgrade policy is rolling upgrade, the container that matches the protected image in the Deployment is set to read-only. You can modify the range of containers that need to be set to read-only.
- Manage protected directories: Add, modify, or delete protected directories.
- Change the protection mode: Container WTP supports the alarm mode and interception mode. You can set the mode based on service requirements.
- Enable process monitoring or set privileged processes: If you want HSS to record information about processes that may be tampered with, enable process monitoring. To allow a privileged process to modify files in the protected directory, you must first enable process monitoring and then configure the privileged process. Only nodes with the Linux kernel version 5.10 or later support this function.
Modifying Container WTP Configurations
- Log in to the HSS console.
- Click
in the upper left corner and select a region or project. - In the navigation pane, choose .
- Click the Container WTP tab. In the row containing the target image, click Edit in the Operation column.
- On the Edit page, modify the container WTP configuration.
Figure 1 Edit asset
- Modify tags: When the container WTP protection mode is Interception, HSS obtains the Deployment of the website application based on the cluster resource tag. When the Deployment upgrade policy is rolling upgrade, the container that matches the protected image in the Deployment is set to read-only. You can modify the range of containers that need to be set to read-only. A maximum of 10 tags can be added. If multiple tags are added, only the Deployments with all tags are matched.
- Manage protected directories.
You can add, modify, and delete protected directories.
- Modify a protected directory
On the Edit page, you can modify excluded file types. To modify the directory, excluded subdirectories, excluded file paths, and local backup paths of a protected directory, click Edit in its Operation column. For details about related parameters, see Table 1.
- Remove a protected directory
If a directory no longer needs protection, click Delete in its Operation column.
- Add a protected directory
Click Add Protected Directory. In the dialog box that is displayed, enter directory information and click OK. For details about related parameters, see Table 1.
- Modify a protected directory
- Change the protection mode.
The protection mode indicates the type of action taken in response to file tampering. You can select a mode from the drop-down list.
- Alarm: If HSS detects file tampering in a protected directory, it does not block the tampering but only sends an alarm notification to you, letting you check and determine how to handle it. Select it if your web page content needs to be updated at unpredictable times.
- Block: If HSS detects that a file in the protected directory has been tampered with, it blocks tampering operations to prevent unauthorized changes and protect the integrity of the web page file. Select it if your web page content does not need to be frequently updated.
- Enable process monitoring or set privileged processes.
For images running Linux kernel 5.10 or later, you are advised to enable Monitor Processes.
Click
to enable it. HSS will provide the following functions:- Record processes suspected of tampering.
When a tampering event is detected, the service obtains the process path and process command line, and reports an alarm. The alarm will be displayed in the protection event list for you to locate suspicious processes.
- Configure privileged processes.
A privileged process is a process authorized to modify a protected directory.
After container WTP is enabled, the files in the protected directory cannot be modified.
You can add privileged processes and use them to modify the files in protected directories or update websites. Ensure the specified privileged processes, which are authorized to access protected directories, are secure and reliable.
To enable the privileged process, you also need to configure the following parameters:
- Process File Path
Set one or multiple complete file paths of privileged processes. Put each privileged process file path on a separate line. Up to 10 privileged processes are allowed.
- Trust Subprocess
If Trust Subprocess is enabled, HSS will trust all the subprocesses up to five levels deep in the subdirectories of specified directories, and allow the subprocesses to modify protected directories. Subprocesses can modify protected directories.
- Process File Path
- Record processes suspected of tampering.
- Confirm the settings. On the Edit page, click OK.
- Verify the change.
It takes a few minutes for the configuration to take effect. You are advised to verify the configuration after 3 to 5 minutes.
- Modify Tag
If all containers corresponding to the selected tag are set to read-only file systems, the modification is successful.
- Protected Directory
In the Protected Containers column of a target image, click the number view details.
If the information about the protected directory is correct and the Protection Status is Protected, the directory is successfully added or modified.
If the deleted protected directory is not displayed in the list, its deletion is successful.
- Type
When you attempt to modify a file, HSS performs protection actions based on the selected protection mode. The protection mode is set successfully.
- Process Monitoring
If the reported protection event contains the process path and process command line information, the process is monitored successfully.
- Privileged Process
If the web page can be modified through a privileged process, the process is successfully configured.
- Modify Tag
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot