Clarify init container use case for security (#17404)

This commit is contained in:
CRC 2019-11-06 20:42:43 -05:00 committed by Kubernetes Prow Robot
parent 6a3617ee97
commit c247cda3e2
1 changed files with 3 additions and 1 deletions

View File

@ -62,7 +62,6 @@ have some advantages for start-up related code:
* Init containers can contain utilities or custom code for setup that are not present in an app
image. For example, there is no need to make an image `FROM` another image just to use a tool like
`sed`, `awk`, `python`, or `dig` during setup.
* Init containers can securely run utilities that would make an app container image less secure.
* The application image builder and deployer roles can work independently without
the need to jointly build a single app image.
* Init containers can run with a different view of the filesystem than app containers in the
@ -71,6 +70,9 @@ have some advantages for start-up related code:
* Because init containers run to completion before any app containers start, init containers offer
a mechanism to block or delay app container startup until a set of preconditions are met. Once
preconditions are met, all of the app containers in a Pod can start in parallel.
* Init containers can securely run utilities or custom code that would otherwise make an app
container image less secure. By keeping unnecessary tools separate you can limit the attack
surface of your app container image.
### Examples