diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-site/src/site/markdown/DockerContainers.md b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-site/src/site/markdown/DockerContainers.md index 21d8e82f178..020258b3988 100644 --- a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-site/src/site/markdown/DockerContainers.md +++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-site/src/site/markdown/DockerContainers.md @@ -17,11 +17,15 @@ Launching Applications Using Docker Containers -Notice ------- -This feature is experimental and is not complete. Enabling this feature and -running Docker containers in your cluster has security implications. -Please do a security analysis before enabling this feature. +Security Warning +--------------- +**IMPORTANT** This feature is experimental and is not complete. **IMPORTANT** +Enabling this feature and running Docker containers in your cluster has security +implications. With this feature enabled, it may be possible to gain root access +to the YARN NodeManager hosts. Given Docker's integration with many powerful +kernel features, it is imperative that administrators understand +[Docker security](https://docs.docker.com/engine/security/security/) before +enabling this feature. Overview -------- @@ -152,6 +156,18 @@ The following properties should be set in yarn-site.xml: privileged contains if privileged containers are allowed. + + + yarn.nodemanager.runtime.linux.docker.capabilities + CHOWN,DAC_OVERRIDE,FSETID,FOWNER,MKNOD,NET_RAW,SETGID,SETUID,SETFCAP,SETPCAP,NET_BIND_SERVICE,SYS_CHROOT,KILL,AUDIT_WRITE + + Optional. This configuration setting determines the capabilities + assigned to docker containers when they are launched. While these may not + be case-sensitive from a docker perspective, it is best to keep these + uppercase. To run without any capabilites, set this value to + "none" or "NONE" + + ```