... | @@ -51,11 +51,10 @@ In this section, we describe how the VP model can be used as an individual Micro |
... | @@ -51,11 +51,10 @@ In this section, we describe how the VP model can be used as an individual Micro |
|
|
|
|
|
## Execution of the Docker Container
|
|
## Execution of the Docker Container
|
|
|
|
|
|
Having the VP Container already deployed on your local machine, it can be started, paused, and stopped using common Docker commands. For your convenience, some indicative commands are provided in this section. First of all, in order to start the Vulnerability Prediction docker container, you need to execute the following commands on your terminal:
|
|
Having the VP Container already deployed on your local machine, it can be started, paused, and stopped using common Docker commands. For your convenience, some indicative commands are provided in this section. In order to start the Vulnerability Prediction docker container, you need to execute the following command on your terminal:
|
|
|
|
|
|
~~~
|
|
~~~
|
|
sudo docker start vp-tool
|
|
sudo docker start vp-tool
|
|
sudo docker exec -it vp-tool bash python vp_service.py DB_IP DB_PORT
|
|
|
|
~~~
|
|
~~~
|
|
|
|
|
|
|
|
|
... | | ... | |