Create an Assumable Identity for a Kubernetes Pod
Procedural tutorial outlining how to create a Chainguard identity that can be assumed by a Kubernetes pod.
Product Docs
Open Source
Compliance
Education
Chainguard container images are designed to be minimal and to include special features for increased security and provenance attestation. Depending on your current base image and customizations, you may need to make some adjustments when migrating your current workloads to use Chainguard Containers. This checklist provides a high-level overview of the steps you should consider when migrating to Chainguard Containers.
Download the PDF version of this checklist here!
-dev suffix and can be customized.-dev variant and a runtime stage based on a distroless image.USER root statement may be required before installing software.apt commands with their apk equivalents. This also applies for other distros that are not based on apk.-dev (such as latest-dev) variant as a starting point.USER root statement before package installations or other commands that must run as an administrative user.apt install (or equivalent) with apk add.apk search on a running container or the APK Explorer tool to identify packages you need – some commands might be available with different names or bundled with different packages.For detailed migration guidance, please refer to our Migration Docs on Chainguard Academy. For troubleshooting, check our Debugging distroless containers resource.
Procedural tutorial outlining how to create a Chainguard identity that can be assumed by a Kubernetes pod.
Dustin Kirkland discusses whether users can build Chainguard Containers on their own
Interview with Dustin Kirkland about the products and artifacts created by the Chainguard Factory
Learning Lab for July 2025 on securing AI workloads with hardened container images
Frequently asked questions about Chainguard Factory, the automated build system that monitors and updates thousands of …
Last updated: 2025-07-23 16:52