-
| Hello, See the doc for more information about what i'm mean by rootless docker daemon https://docs.docker.com/engine/security/rootless/ Regards, BBA |
Beta Was this translation helpful? Give feedback.
Answered by thediveo Apr 2, 2024
Replies: 1 comment
-
| We've never tested this, and we don't have resources to look into it. You can either have system diagnosis or rootless lock-down. On top of this, you'll use a completely different networking infrastructure where large parts of its state are hidden in user space processes, and these processes neither offering diagnosis nor telemetry. |
Beta Was this translation helpful? Give feedback.
0 replies
Answer selected by thediveo
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
We've never tested this, and we don't have resources to look into it. You can either have system diagnosis or rootless lock-down.
On top of this, you'll use a completely different networking infrastructure where large parts of its state are hidden in user space processes, and these processes neither offering diagnosis nor telemetry.