ECS Exec vs read-only-root-filesystem

1

Hi,

We're evaluating moving our application deployments from Kubernetes to ECS, but one of the requirements we're struggling with in ECS is command execution. We experimented with ECS Exec, but it requires disabling the readonlyRootFilesystem security feature - see Using Amazon ECS Exec for debugging:

The SSM agent requires that the container file system is able to be written to in order to create the required directories and files. Therefore, making the root file system read-only using the readonlyRootFilesystem task definition parameter, or any other method, isn't supported.

How do ECS users typically deal with this tradeoff? Do you disable readonlyRootFilesystem and find another security measure to mitigate its absence? Or do you forego ECS Exec and find another way to troubleshoot your containers, e.g. by adding more logging to your app?

Thanks,

Jim

Jim D
已提問 3 個月前檢視次數 97 次
沒有答案

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南