-
Hello, See the doc for more information about what i'm mean by rootless docker daemon https://docs.docker.com/engine/security/rootless/ Regards, BBA |
Beta Was this translation helpful? Give feedback.
Answered by
thediveo
Apr 2, 2024
Replies: 1 comment
-
We've never tested this, and we don't have resources to look into it. You can either have system diagnosis or rootless lock-down. On top of this, you'll use a completely different networking infrastructure where large parts of its state are hidden in user space processes, and these processes neither offering diagnosis nor telemetry. |
Beta Was this translation helpful? Give feedback.
0 replies
Answer selected by
thediveo
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
We've never tested this, and we don't have resources to look into it. You can either have system diagnosis or rootless lock-down.
On top of this, you'll use a completely different networking infrastructure where large parts of its state are hidden in user space processes, and these processes neither offering diagnosis nor telemetry.