Skip to content
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
31 changes: 31 additions & 0 deletions content/en/blog/_posts/2024-02-22-ensure-secret-pulled-images.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
---
layout: blog
title: 'Image Pull Policy: Configuring Kubernetes to Ensure Access Security for Container Images in a Multi-Tenant Environment'
date: 2024-02-22
slug: ensure-secret-pulled-images
---

**Authors:** Michael Brown (IBM), Paco Xu (DaoCloud)

Intro..
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is where to talk about multitenancy use cases:

  • SaaS multitenancy, where different tenants may not be running the exact same code
  • isolating between teams in a common cluster (eg, cluster per environment; set-of-clusters per environment with tenants sharded over clusters)
  • platform-as-a-service multitenancy

etc


## Understanding Kubernetes Image Pull Policies

excerpts from : https://kubernetes.io/docs/concepts/containers/images/

## Configuring The Ensure Secret Pulled Images Featuregate

## Dependencies

## Use Cases (with feature gate enabled)

### Cluster running only non-proprietary (e.g. open-source) images. No need to hide images.

### Cluster running some proprietary images which should be hidden to those outside the company, but visible to all cluster users.

### Cluster with proprietary images, a few of which require stricter access control.

### A multi-tenant cluster where each tenant needs own private registry

## Closing Notes