How do I restrict custom image replacement in K3s containerd #11337
Closed
ashok-mariyala
started this conversation in
General
Replies: 1 comment 2 replies
-
That's not the 'image version', that part of the image spec is referred to as the tag. If you care about the integrity of your images, you should use image references that specify the digest instead of the tag, or combine both tag and digest:
This isn't really a k3s question though. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I am using K3s cluster to run my application. My application is having 3 docker images which are pulling from my private repository. There is a possibility to hack my cluster and inject some malicious code and then replace my docker images in containerd using
k3s ctr i pull <docker image name>:<docker image version
and retag withk3s ctr i tag
commandwith same docker images names. Here K3s will assume, image is already present in cluster and hence not pulling images from my private repository as my
ImagePullPolicy
isPullIfNotPresent
.Is there any way to restrict my application should run with my private repository images only.
Beta Was this translation helpful? Give feedback.
All reactions