You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs: fix port mapping documentation for unprivileged containers
Resolves#428
Add dedicated section explaining that unprivileged container images
listen on port 8080 internally (not port 80), as they run as non-root
users and cannot bind to privileged ports.
Changes:
- Add "Running Unprivileged Container Images" subsection with correct
port mapping examples (80:8080 or 8080:8080)
- Add note in Kubernetes section about containerPort for unprivileged
images
- Clarify security benefits of unprivileged containers
The standard OSS images continue to use port 80 as they run as root.
Only images tagged with 'unprivileged-oss-*' use port 8080.
Unprivileged container images run NGINX as a non-root user and listen on port **8080** internally (instead of port 80). This provides enhanced security by not requiring privileged ports.
236
+
237
+
To run an unprivileged image, use the `unprivileged-oss` tag and map to port **8080**:
238
+
```
239
+
docker run --env-file ./settings --publish 80:8080 --name nginx-s3-gateway \
### Building the Public Open Source NGINX Container Image
234
250
235
251
In order to build the NGINX OSS container image, do a `docker build` as follows
@@ -457,6 +473,9 @@ spec:
457
473
path: /health
458
474
port: http
459
475
```
476
+
477
+
**Note:** If using an unprivileged container image (e.g., `unprivileged-oss-YYYYMMDD`), change `containerPort: 80` to `containerPort: 8080` as unprivileged containers listen on port 8080.
478
+
460
479
## Running on EKS with EKS Pod Identities
461
480
462
481
An alternative way to use the container image on an EKS cluster is to use a service account which can assume a role using [Pod Identities](https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html).
0 commit comments