Examples of configured runtime profiles
27 March 2024
ID 265052
The table below presents a few of the images that are most frequently used by the application, and the settings for their configured restrictions in runtime profiles.
Images and their configured settings
Image name | Restrict container executable modules | Restrict network connections |
---|---|---|
Nginx | Allowed executable file:
| Block outbound connections |
Mysql | Allowed executable files:
| Block outbound connections |
Wordpress | Allowed executable files:
| |
Node | Allowed executable file:
| Block outbound connections |
MongoDB | Allowed executable files:
| |
HAProxy | Allowed executable files:
| |
Hipache | Allowed executable files:
| |
Drupal | Allowed executable files:
| |
Redis | Allowed executable files:
| Block outbound connections |
Tomcat | Allowed executable files:
| Block outbound connections |
Celery | Allowed executable files:
|