Get notified of upcoming product changes, critical vulnerability notifications and patches and more.
Sign inA minimal haproxy base image rebuilt every night from source.
The image is available on cgr.dev
:
Similar to the docker-library/haproxy
image, this image does not come with any default configuration.
Please refer to upstream's excellent (and comprehensive) documentation on the subject of configuring HAProxy for your needs.
Let say you have a haproxy.cfg
config file is current working directory. To test that configuration file, you can run the following command
In order for the container to work, you need to mount your custom haproxy.cfg
file in the container. The following example runs HAProxy with a custom configuration file:
When installing in Kubernetes, securityContexts
that drop [ "ALL" ]
capabilities interfere with the setcap
privileged haproxy
. In order to support Kubernetes based installs which default to dropping ALL
capabilities, the necessary modifications must be made to add back NET_ADMIN
capabilities.
For example, in the ha-redis
chart used by argocd
, the values.yaml
becomes:
Chainguard Images contain software packages that are direct or transitive dependencies. The following licenses were found in the "latest" version of this image:
Apache-2.0
BSD-3-Clause
GCC-exception-3.1
GPL-2.0-only
GPL-2.0-or-later
GPL-3.0-or-later
LGPL-2.1-or-later
For a complete list of licenses, please refer to this Image's SBOM.
Software license agreementThis is a FIPS validated image for FedRAMP compliance.
This image is STIG hardened and scanned against the DISA General Purpose Operating System SRG with reports available.
Learn more about STIGsGet started with STIGsProducts
Chainguard Images© 2024 Chainguard, Inc.