Skip to content

cleanstart-containers/valkey

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

Container Documentation for Valkey Documentation

The CleanStart Valkey image provides a production-ready, security-hardened container optimized for enterprise environments. Built on a minimal base OS with comprehensive security hardening, this image delivers reliable application execution with advanced security features.

📌 Base Foundation: Security-hardened, minimal base OS designed for enterprise containerized environments.

Image Path: ghcr.io/cleanstart-containers/valkey

Registry: cleanstart

Key Features

Core capabilities and strengths of this container

  • Production-ready container deployment
  • Enterprise-grade security hardening
  • Comprehensive monitoring and logging
  • Multi-architecture support

Common Use Cases

Typical scenarios where this container excels

  • Production application deployment
  • Microservices architecture implementation
  • Development and testing environments
  • Enterprise workload containerization

Pull Latest Image

Download the container image from the registry

docker pull ghcr.io/cleanstart-containers/valkey:latest
docker pull ghcr.io/cleanstart-containers/valkey:latest-dev

Basic Run

Run the container with basic configuration

docker run -it --name valkey ghcr.io/cleanstart-containers/valkey:latest

Production Deployment

Deploy with production security settings

docker run -d --name valkey-prod \
  --security-opt=no-new-privileges \
  --restart unless-stopped \
  ghcr.io/cleanstart-containers/valkey:latest

Volume Mount Mount local directory for persistent data

docker run -v /app:/app ghcr.io/cleanstart-containers/valkey:latest

Port Forwarding Run with custom port mappings

docker run -p 8080:8080 ghcr.io/cleanstart-containers/valkey:latest

Environment Variables

Configuration options available through environment variables

Variable Default Description
PATH /usr/local/sbin:/... System PATH configuration

Security Best Practices

Recommended security configurations and practices

  • Use specific image tags for production (avoid latest)
  • Configure resource limits: memory and CPU constraints
  • Enable read-only root filesystem when possible
  • Run containers with non-root user (--user 1000:1000)
  • Use --security-opt=no-new-privileges flag
  • Regularly update container images for security patches
  • Implement proper network segmentation
  • Monitor container metrics for anomalies

Kubernetes Security Context

Recommended security context for Kubernetes deployments

securityContext:
  runAsNonRoot: true
  runAsUser: 1000
  runAsGroup: 1000
  readOnlyRootFilesystem: true
  allowPrivilegeEscalation: false
  capabilities:
    drop:
      - ALL

Documentation Resources

Essential links and resources for further information


Vulnerability Disclaimer

CleanStart offers Docker images that include third-party open-source libraries and packages maintained by independent contributors. While CleanStart maintains these images and applies industry-standard security practices, it cannot guarantee the security or integrity of upstream components beyond its control.

Users acknowledge and agree that open-source software may contain undiscovered vulnerabilities or introduce new risks through updates. CleanStart shall not be liable for security issues originating from third-party libraries, including but not limited to zero-day exploits, supply chain attacks, or contributor-introduced risks.

Security remains a shared responsibility: CleanStart provides updated images and guidance where possible, while users are responsible for evaluating deployments and implementing appropriate controls.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors 3

  •  
  •  
  •