...
We’ve extended the support for Kubernetes features on the Cloud Management HyperCloud™ Platform (CMPHCP) through enhancements.
You can perform these activities using our enhanced Kubernetes feature:
Add, use, and delete Container Secret registry.
Delete a Kubernetes object from the namespace and app view. You can delete Kubernetes objects (services, deployments, secrets, etc.) from the namespace and app-detail views.
Toggle for viewing your kube-system objects from the Cluster view. Turn on the Show System Namespaces toggle to enable the read-only view of your kube-system objects.
New Connect feature in your Services in-app view. You can now edit your ip and port configurations via the Connect menu.
You can scan images via the Container Security page.
You can scan your helm chart images for vulnerabilities before deployment using the anchore engine. Your Tenants can configure the anchore settings via the Container Security page.
You can also block images that contain vulnerabilities defined in your Rules.
CMP HCP Tenant Administrators can define and view these Rules to block deployment:
Namespace
All the Namespaces in a Cluster
All the Clusters for a tenant
If you’ve enabled Image Scanning for a tenant, all deployments made by Tenant Users will be automatically subjected to Image Scans.
Your deployments will be blocked or allowed based on the Rules you define.
Tenant Users can also view the list of vulnerabilities via helm chart images.
We’ve enhanced our CMP HCP portal to support installation of helm charts for Clusters. You can also install helm chart in your Amazon EKS clusters.