Slide 12
Slide 12 text
12
Copyright©2017 NTT Corp. All Rights Reserved.
Secure Container configuration!
• Container configuration.
• Cgroups
• --kernel-memory, --memory, --memory-swap, --cpu-period, --cpu-quota, -- cpu-shares, --cpuset-
cpus, --cpuset-mems, --device-read-bps, --device-read-iops, --device- write-bps, --device-write-
iops, --blkio-weight, --blkio-weight-device, –cpus (since v1.13)
• Use these flags with docker run/create
• Think on these lines
• Suites the application in container.
• Container should not eat all/any resources alone
• e.g. CPU, Memory, IO bandwidth, Network bandwidth.
• Protects from DoS attacks
• capabilities
• Use cap-add and cap-drop with docker run/create
• Drop all capabilities which are not required.
• Use CAP_SYS_ADMIN with caution!.(disable by default)
• Make the attack surface very narrow