Chainguard Containers
How to Port a Sample Application to Chainguard Containers
This article works through porting a small but complete application to use Chainguard Containers. As we'll see, this is relatively straightforward, but it is important to be aware of some of the differences to other common images.
Getting Started with Distroless Container Images
Why distroless containers are more secure: Chainguard's approach removes shells, package managers, and unnecessary components to minimize attack surface while maintaining compatibility
Debian Compatibility
Differences between Chainguard Containers and Debian third-party images
Debugging Distroless Containers with Docker Debug
How to use the Docker Debug feature to debug Distroless and minimal containers
How to Use Chainguard Security Advisories
Article outlining how one can explore and use the Security Advisories found on the Chainguard Container Directory.
Chainguard Containers Network Requirements
Using Chainguard Containers with firewalls, access control lists, and proxies.
Create an Assumable Identity for a GitLab CI/CD Pipeline
Procedural tutorial outlining how to create a Chainguard identity that can be assumed by a GitLab CI/CD pipeline.