Allow containers to run as root
Security best practices dictate that engine containers should not run as the root
user. Previously, engines (v7 and lower) would briefly initialize as the
root user and then run as the
cdsw user. With engine v8 (and higher), engines
now follow the best practice and run only as the
Use the following sections to determine whether you need to perform any steps to take advantage of this feature.
New Deployments - Version 1.6.0 (or higher)
Cloudera Data Science Workbench 1.6 (and higher) ships with engine v8 (and higher). On such deployments, all projects should already be using the latest engine versions. Therefore, this property should be left disabled .
Upgrades from Version 1.5.x (and lower) to 1.6.0 (or higher)
For deployments that have upgraded from Cloudera Data Science Workbench 1.5 (or lower), it is likely that projects on your deployment are still using base engine v7 (or lower). On such deployments, this property will be enabled by default.
- Upgrade to Cloudera Data Science Workbench 1.6 (or higher).
- Test and upgrade all projects to engine v8 (or higher). If you are using custom engines, you will need to rebuild these engines using engine v8 or higher as the base image.
- Go to . Under the Control of User-Created Kubernetes Pods section, disable the Allow containers to run as root checkbox.