TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Why we run Data Pipelines as Containers

1 点作者 flippingbits将近 4 年前

1 comment

nyrikki将近 4 年前
&quot;two approaches but run data pipelines in a fully isolated environment - containers - which prevents user code from breaking free.&quot;<p>While (user) namespaces, root-less and cgroups do slightly reduce the attack surface, they are still running on a shared kernel instance.<p>In Dockers default configuration, using host namespaces and allowing --privlaged, anyone who can launch a container has full root level access to read disks of even the host machine via mknod or even update firmware. Lets hope that they are not using Linux bridges for containers too.<p>The belief that containers are somehow ultra secure will result in many breaches in the future. In theory if you have control of the code SELinux or Apparmor could help but most people don&#x27;t use them and a major cloud providers solution doesn&#x27;t even support them.<p>It is scary how many install bases even add capabilities to the container daemons so that they can run some form of storage persistence etc...<p>The risk of containers can be mitigated to an acceptable layer. But when ever I hear a company claiming that they are using containers because they are &quot;secure&quot; it is a huge red flag.<p>If you are a company making claims like the above, you are proclaiming that you either think that security through obscurity is a primary cybersecurity practice or you really don&#x27;t understand how containers and namespaces work.
评论 #28246261 未加载