Users can manage Docker images, leverage public image repositories, and upload pictures. You can quickly create containers to launch applications based on images in the repository.
Lifecycle management of the creation, decommission, and deletion of cloud host instances through the console and creation of snapshots for rapid scaling.
In addition to tenant isolation, improve the business security of platform users through network policies such as ACL and security groups.