Constraints and Limitations
Server Protection Restrictions
HSS can protect:
- Elastic Cloud Server (ECS)
- On-premises data center (IDC)
Container Protection Restrictions
HSS can only protect CCE clusters. The restrictions on CCE cluster protection are as follows:
- Supported container runtime: Docker and Containerd
- Supported cluster editions: CCE standard and Turbo editions
- Node resource requirements: at least 50 MiB memory and 200m CPU available
- Resource usage restriction: When a cluster is connected to HSS, HSS will create a namespace in the cluster.
OS Restrictions
Currently, the HSS agent and system vulnerability scan functions are not supported in certain OSs.
For details about the OS restrictions of HSS, see:
- CentOS 6.x is no longer updated or maintained on the Linux official website, and HSS no longer supports CentOS 6.x or earlier.
- The meanings of the symbols in the table are as follows:
- √: supported
- ×: not supported
OS | Agent | System Vulnerability Scan |
---|---|---|
Windows Server 2012 R2 Standard 64-bit English (40 GB) | √ | √ |
Windows Server 2012 R2 Standard 64-bit Chinese (40 GB) | √ | √ |
Windows Server 2012 R2 Datacenter 64-bit English (40 GB) | √ | √ |
Windows Server 2012 R2 Datacenter 64-bit Chinese (40 GB) | √ | √ |
Windows Server 2016 Standard 64-bit English (40 GB) | √ | √ |
Windows Server 2016 Standard 64-bit Chinese (40 GB) | √ | √ |
Windows Server 2016 Datacenter 64-bit English (40 GB) | √ | √ |
Windows Server 2016 Datacenter 64-bit Chinese (40 GB) | √ | √ |
Windows Server 2019 Datacenter 64-bit English (40 GB) | √ | √ |
Windows Server 2019 Datacenter 64-bit Chinese (40 GB) | √ | √ |
Windows Server 2022 Datacenter 64-bit English (40 GB) | √ | × |
Windows Server 2022 Datacenter 64-bit Chinese (40 GB) | √ | × |
OS | Agent | System Vulnerability Scan |
---|---|---|
CentOS 7.4 (64-bit) | √ | √ |
CentOS 7.5 (64-bit) | √ | √ |
CentOS 7.6 (64-bit) | √ | √ |
CentOS 7.7 (64-bit) | √ | √ |
CentOS 7.8 (64-bit) | √ | √ |
CentOS 7.9 (64-bit) | √ | √ |
CentOS 8.1 (64-bit) | √ | × |
CentOS 8.2 (64-bit) | √ | × |
CentOS 8 (64-bit) | √ | × |
CentOS 9 (64-bit) | √ | × |
Debian 9 (64-bit) | √ | √ |
Debian 10 (64-bit) | √ | √ |
Debian 11.0.0 (64-bit) | √ | √ |
Debian 11.1.0 (64-bit) | √ | √ |
Debian 12.0.0 (64-bit) | √ | × |
EulerOS 2.2 (64-bit) | √ | √ |
EulerOS 2.3 (64-bit) | √ | √ |
EulerOS 2.5 (64-bit) | √ | √ |
EulerOS 2.7 (64-bit) | √ | × |
EulerOS 2.9 (64-bit) | √ | √ |
EulerOS 2.10 (64-bit) | √ | √ |
EulerOS 2.11 (64-bit) | √ | √ |
EulerOS 2.12 (64-bit) | √ | √ |
Fedora 28 (64-bit) | √ | × |
Fedora 31 (64-bit) | √ | × |
Fedora 32 (64-bit) | √ | × |
Fedora 33 (64-bit) | √ | × |
Fedora 34 (64-bit) | √ | × |
Ubuntu 16.04 (64-bit) | √ | √ |
Ubuntu 18.04 (64-bit) | √ | √ |
Ubuntu 20.04 (64-bit) | √ | √ |
Ubuntu 22.04 (64-bit) | √ | √ |
Ubuntu 24.04 (64-bit) | √ NOTE: Currently, brute-force attack detection is not supported. | × |
Red Hat 7.4 (64-bit) | √ | × |
Red Hat 7.6 (64-bit) | √ | × |
Red Hat 8.0 (64-bit) | √ | × |
Red Hat 8.7 (64-bit) | √ | × |
OpenEuler 20.03 LTS (64-bit) | √ | √ |
OpenEuler 20.03 LTS SP4 (64-bit) | √ | × |
OpenEuler 22.03 LTS SP3 (64-bit) | √ | × |
OpenEuler 22.03 LTS (64-bit) | √ | × |
OpenEuler 22.03 LTS SP4 (64-bit) | √ | × |
AlmaLinux 8.4 (64-bit) | √ | √ |
AlmaLinux 9.0 (64-bit) | √ | × |
Rocky Linux 8.4 (64-bit) | √ | × |
Rocky Linux 8.5 (64-bit) | √ | × |
Rocky Linux 9.0 (64-bit) | √ | × |
HCE 1.1 (64-bit) | √ | √ |
HCE 2.0 (64-bit) | √ | √ |
SUSE 12 SP5 (64-bit) | √ | √ |
SUSE 15 (64-bit) | √ | × |
SUSE 15 SP1 (64-bit) | √ | √ |
SUSE 15 SP2 (64-bit) | √ | √ |
SUSE 15 SP3 (64-bit) | √ | × |
SUSE 15.5 (64-bit) | √ | × |
SUSE 15 SP6 (64-bit) | √ NOTE: Currently, brute-force attack detection is not supported. | × |
Kylin V10 (64-bit) | √ | √ |
Kylin V10 SP3 (64-bit) | √ | × |
UnionTech OS 1050u2e | √ NOTE: Currently, file escape detection is not supported. | √ |
OS | Agent | System Vulnerability Scan |
---|---|---|
CentOS 7.4 (64-bit) | √ | √ |
CentOS 7.5 (64-bit) | √ | √ |
CentOS 7.6 (64-bit) | √ | √ |
CentOS 7.7 (64-bit) | √ | √ |
CentOS 7.8 (64-bit) | √ | √ |
CentOS 7.9 (64-bit) | √ | √ |
CentOS 8.0 (64-bit) | √ | × |
CentOS 8.1 (64-bit) | √ | × |
CentOS 8.2 (64-bit) | √ | × |
CentOS 9 (64-bit) | √ | × |
EulerOS 2.8 (64-bit) | √ | √ |
EulerOS 2.9 (64-bit) | √ | √ |
EulerOS 2.10 (64-bit) | √ | √ |
EulerOS 2.11 (64-bit) | √ | √ |
EulerOS 2.12 (64-bit) | √ | √ |
Fedora 29 (64-bit) | √ | × |
Ubuntu 18.04 (64-bit) | √ | × |
Ubuntu 20.04 (64-bit) | √ | √ |
Ubuntu 22.04 (64-bit) | √ | √ |
Ubuntu 24.04 (64-bit) | √ NOTE: Currently, brute-force attack detection is not supported. | × |
Kylin V7 (64-bit) | √ | × |
Kylin V10 (64-bit) | √ | √ |
Kylin V10 SP3 (64-bit) | √ | × |
HCE 2.0 (64-bit) | √ | √ |
UnionTech OS V20 (64-bit) | √ | √ NOTE: Only UnionTech OS V20 server editions E and D support system vulnerability scan. |
UnionTech OS V20 1050e (64-bit) | √ | √ |
UnionTech OS V20 1060e (64-bit) | √ | √ |
OpenEuler 22.03 LTS (64-bit) | √ | × |
Agent Restrictions
- If third-party security software is installed on the server, uninstall the software before installing the HSS agent. If the third-party security software is incompatible with the HSS agent, the HSS protection functions will be affected.
- After the agent is installed on the server or container node, the agent may modify the following system files or configurations:
- Linux system files:
- /etc/hosts.deny
- /etc/hosts.allow
- /etc/rc.local
- /etc/ssh/sshd_config
- /etc/pam.d/sshd
- /etc/docker/daemon.json
- /etc/sysctl.conf
- /sys/fs/cgroup/cpu/ (A subdirectory will be created for the HSS process in this directory.)
- /sys/kernel/debug/tracing/instances (A CSA instance will be created in this directory.)
- Linux system configurations: iptables rules
- Windows system configurations:
- Firewall rules
- System login event audit policy and the configuration of login security layer and authentication mode
- Windows Remote Management trusted server list
- Linux system files:
Restrictions on Brute-force Attack Defense
Authorize the Windows firewall when you enable protection for a Windows server. Do not disable the Windows firewall while you use HSS.
If the Windows firewall is disabled, HSS cannot block the source IP addresses of brute-force attacks. This problem may persist even if the Windows firewall is enabled after being disabled.
- Server Protection Restrictions
- Container Protection Restrictions
- OS Restrictions
- Agent Restrictions
- Restrictions on Brute-force Attack Defense