6 Rootless containers
This chapter covers
- Why rootless mode is more secure
- How Podman works with the user and mount namespaces
- The architecture of Podman running in rootless mode
In this chapter, you will take a deep dive into what is going on when running Podman in rootless mode. I believe it is helpful to understand what is happening when you run rootless containers and learn about the problems that running in rootless mode can cause. With the introduction of containerized applications over the last few years, certain highly secure environments were not able to take advantage of the new technology.
High performance computing (HPC) systems run the fastest computers in the world. These tend to be at national labs and universities and deal with ...
Get Podman in Action now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.