Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Refactor to use /tmp in workers on Fargate and mount root filesystem as readonly #3421

Open
hassy opened this issue Nov 27, 2024 Discussed in #3420 · 0 comments
Open

Refactor to use /tmp in workers on Fargate and mount root filesystem as readonly #3421

hassy opened this issue Nov 27, 2024 Discussed in #3420 · 0 comments

Comments

@hassy
Copy link
Member

hassy commented Nov 27, 2024

Discussed in #3420

Originally posted by drissamri November 27, 2024
We run Artillery on AWS using the fargate option but the automated scans by AWS SecurityHub raise an alarm that containers should only have read-only access to its root system

Screenshot 2024-11-27 at 11 42 35

I don't see an option to customize the Fargate deployment? Is this something that can be fixed in the framework itsefl? There is an option readonlyRootFilesystem that can be enabled on a Fargate Task which would resolve this security alert.

If the container does need to write filesystem, there are other options to do this like using Docker volumes to get rid of this error: https://repost.aws/questions/QUZufioV63TciPZZ0onYdsdA/unable-to-limit-ecs-containers-to-read-only-access-to-root-filesystem

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant