Portainer and Agent runs under the user root #9497
Replies: 9 comments
-
|
We'll need to investigate this as Portainer might require root access to be able to use This could be potentially worked around but requires some configuration on the Docker daemon side too to allow another user to use these files. |
Beta Was this translation helpful? Give feedback.
-
|
Worth having a look at https://medium.com/@lizrice/non-privileged-containers-based-on-the-scratch-image-a80105d6d341 |
Beta Was this translation helpful? Give feedback.
-
|
I have been trying to get this to work as well and managed to do so today. The
|
Beta Was this translation helpful? Give feedback.
-
|
This issue has been marked as stale as it has not had recent activity, it will be closed if no further activity occurs in the next 7 days. If you believe that it has been incorrectly labelled as stale, leave a comment and the label will be removed. |
Beta Was this translation helpful? Give feedback.
-
|
Since no further activity has appeared on this issue it will be closed. If you believe that it has been incorrectly closed, leave a comment and mention @itsconquest. One of our staff will then review the issue. |
Beta Was this translation helpful? Give feedback.
-
|
Issue should not have been marked as stale as we did not investigate it yet. |
Beta Was this translation helpful? Give feedback.
-
|
For the future reference, when the experimental rootless docker is run, it sets the socket file location to |
Beta Was this translation helpful? Give feedback.
-
|
I'm using rootless docker and I was experiencing the same thing with portainer. I changed the docker command to reflect @ibnesayeed's comment and I can also see containers that I've spun up as rootless in the dashboard (which I wasn't able to before): |
Beta Was this translation helpful? Give feedback.
-
|
@mven wrote:
Even better, in the above command, replace |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
We scan our running docker images with the cis benchmark and we see that both the agent and portainer itself are running under the user root.
For us that's a security risk and my question is now:
Is it possible to use another user in the agent and portainer so that the cis checks no longer generate security messages?
That would be a big increase in safety for Portainer and the agent.
Beta Was this translation helpful? Give feedback.
All reactions