Have you heard about rootless containers, but don't really know what they are? Do you wonder what prevents processes in one container from interacting with processes in another container? Would you like to learn how to scan container images with OpenSCAP?
If you answered yes to any of these questions, I've recently published a series of videos on containers and Podman that might help.
Rootless containers using Podman
Watch two videos covering running containers unprivileged, or "rootless" using Podman.
The first video is an overview of the options you have when choosing which user account to use to run Podman and which account to run processes as within container images. The video includes a demo of these various options in action.
The second video dives deep into how user namespaces work in rootless Podman, and demos the following topics:
- Run a container with rootless Podman.
- View user namespaces with the
lsns
command. - Use the
/etc/subuid
file, which defines subordinate UID ranges. - Use the
/proc uid_map
file, which shows the UID map for processes. - Calculate the UID number that a process runs as on the host.
- Use the
podman top
command to view the user mapping between the container and the host. - Use the
podman unshare
command to run a command within a container user namespace.
Overview of PID namespaces
The next video, Overview of How Containers Use PID Namespaces to Provide Process Isolation, takes an in-depth look at how PID namespaces work. Namespaces, including PID namespaces, are one of the key technologies that enable containers to run in isolated environments.
PID namespaces also allow containers to have the same PID number running in each container (this is how every container running on a system can have their own PID #1). PID namespaces map the PID numbers between the container and the host, so a process running in your container will have a different PID number from the container's point of view versus the host's point of view, which is explained in the video.
After watching this video, you should have a solid understanding of how PID namespaces work and the benefits they provide.
Security compliance by scanning container images with OpenSCAP
The last video is named Scanning Containers for Vulnerabilities on RHEL 8.2 With OpenSCAP and Podman. In this video, I cover the new feature in RHEL 8.2 that allows container images to be scanned with OpenSCAP using the oscap-podman
command. This video covers the following topics:
- Scan container images for vulnerabilities with the
oscap-podman
command. - Assess a container image's security compliance with the PCI-DSS baseline by using the
oscap-podman
command. - Use Buildah to create a new image with one of the OpenSCAP findings remediated.
Running a container inside a container (Podman in Podman)
This video covers an overview of Podman in Podman, or in other words, running a container within a container. This is a technology preview feature in Red Hat Enterprise Linux (RHEL) 8.3.
The video covers an overview of:
- From the RHEL 8.3 host, starting a container using the registry.redhat.io/rhel8/
podman container image (with the --privileged option) - Within that container, building a new container image using podman build
- Running a container (while in a container) using the newly created container image (Podman in Podman)
Please note that Podman in Podman functionality is currently only available when starting the container as root.
Conclusion
I hope you find these videos useful and educational. I want to make several more Red Hat Container Tools-related videos in the future, so keep an eye on the Enable Sysadmin blog and the Red Hat Videos YouTube channel!
[ Free book: Building modern apps with Linux containers. ]
저자 소개
Brian Smith is a product manager at Red Hat focused on RHEL automation and management. He has been at Red Hat since 2018, previously working with public sector customers as a technical account manager (TAM).
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
오리지널 쇼
엔터프라이즈 기술 분야의 제작자와 리더가 전하는 흥미로운 스토리
제품
- Red Hat Enterprise Linux
- Red Hat OpenShift Enterprise
- Red Hat Ansible Automation Platform
- 클라우드 서비스
- 모든 제품 보기
툴
체험, 구매 & 영업
커뮤니케이션
Red Hat 소개
Red Hat은 Linux, 클라우드, 컨테이너, 쿠버네티스 등을 포함한 글로벌 엔터프라이즈 오픈소스 솔루션 공급업체입니다. Red Hat은 코어 데이터센터에서 네트워크 엣지에 이르기까지 다양한 플랫폼과 환경에서 기업의 업무 편의성을 높여 주는 강화된 기능의 솔루션을 제공합니다.