Clarify init container use case for security (#17404)
This commit is contained in:
parent
6a3617ee97
commit
c247cda3e2
|
@ -62,7 +62,6 @@ have some advantages for start-up related code:
|
|||
* Init containers can contain utilities or custom code for setup that are not present in an app
|
||||
image. For example, there is no need to make an image `FROM` another image just to use a tool like
|
||||
`sed`, `awk`, `python`, or `dig` during setup.
|
||||
* Init containers can securely run utilities that would make an app container image less secure.
|
||||
* The application image builder and deployer roles can work independently without
|
||||
the need to jointly build a single app image.
|
||||
* Init containers can run with a different view of the filesystem than app containers in the
|
||||
|
@ -71,6 +70,9 @@ have some advantages for start-up related code:
|
|||
* Because init containers run to completion before any app containers start, init containers offer
|
||||
a mechanism to block or delay app container startup until a set of preconditions are met. Once
|
||||
preconditions are met, all of the app containers in a Pod can start in parallel.
|
||||
* Init containers can securely run utilities or custom code that would otherwise make an app
|
||||
container image less secure. By keeping unnecessary tools separate you can limit the attack
|
||||
surface of your app container image.
|
||||
|
||||
|
||||
### Examples
|
||||
|
|
Loading…
Reference in New Issue