odpi / egeria

Egeria core
https://egeria-project.org
Apache License 2.0
786 stars 258 forks source link

UBI image for 'configure' container? #5912

Open planetf1 opened 2 years ago

planetf1 commented 2 years ago

The egeria container image is based on the RedHat UBI 8 openjdk base image. See https://www.redhat.com/en/blog/introducing-red-hat-universal-base-image . This is a supported, secure , OCI compliant image that passes container security checks on quay.io

However we also use some other containers to support demos and UI, which are based on lighter images such as alpine, and these may not be as secure.

Full data is available on quay.io by selecting the image under https://quay.io/organization/odpi, for example the egeria base image at https://quay.io/repository/odpi/egeria?tab=tags

We should consider using secure base images for all the container images we build (not just in egeria, but in other projects such as our connectors)

The downside is that newer images may increase the memory footprint - this may in particular be more painful on arm platforms. (the mitigation there may be needing alternate image definitions)

cc: @lpalashevski

planetf1 commented 2 years ago

We still have

cmgrote commented 2 years ago

The small configure image is used in various places where Jupyter is not needed, in particular for parts of setting up the PTS and CTS charts -- so keen we keep that image as its own image (nice and small).

planetf1 commented 2 years ago

289 and #311 address updating our UI containers to UBI

Focus here on 'configure'. There is a UBI new micro image. Will review security scans / docs and figure out next step for this container

github-actions[bot] commented 2 years ago

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 20 days if no further activity occurs. Thank you for your contributions.

planetf1 commented 2 years ago

I'm thinking that perhaps we can remove this container entirely, and use a regular image (the lightest 'UBI' image ideally as it provides a better security stance).

We only use this image for simple scripts, which can be injected through a volume mount/config map or similar techniques.

This would mean one less image to maintain, scan & allow our process to focus on the egeria specifics

github-actions[bot] commented 2 years ago

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 20 days if no further activity occurs. Thank you for your contributions.

github-actions[bot] commented 1 year ago

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 20 days if no further activity occurs. Thank you for your contributions.

planetf1 commented 1 year ago

This image should be harmless, but can likely be replaced with use of a standard, simple image, without any added tools