You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Microsoft Defender for Cloud recommends that running containers as root user should be avoided. This means that the pod securityContext should contain runAsNonRoot: true. My tests were configured with the following security context:
Currently, the pod fails to start with the following error message since it doesn't have permissions to create a directory under /var/lib/varnish which is owned by root.
Error: Cannot create working directory '/var/lib/varnish/cache-statefulset-0/': Permission denied
Describe the solution you'd like
Ideally, the pod should be able to start as a non root user.
I wonder if this would be at all possible. This doesn't prevent us from using the image since the policy is not enforced but it would be nice to have for compliance with the recommendation.
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem? Please describe.
Microsoft Defender for Cloud recommends that running containers as root user should be avoided. This means that the pod
securityContext
should containrunAsNonRoot: true
. My tests were configured with the following security context:Currently, the pod fails to start with the following error message since it doesn't have permissions to create a directory under
/var/lib/varnish
which is owned byroot
.Describe the solution you'd like
Ideally, the pod should be able to start as a non root user.
I wonder if this would be at all possible. This doesn't prevent us from using the image since the policy is not enforced but it would be nice to have for compliance with the recommendation.
The text was updated successfully, but these errors were encountered: