Kubernetes Pod vs Container Security Contexts

TechOps Examples

Hey โ€” It's Govardhana MK ๐Ÿ‘‹

Along with a use case deep dive, we identify the remote job opportunities, top news, tools, and articles in the TechOps industry.

๐Ÿ‘‹ Before we begin... a big thank you to today's sponsor PERFECTSCALE

Tired of guesstimates? This April 1st, donโ€™t be the Fool.

Let PERFECTSCALE  x K8s Tarot predict your clusterโ€™s fate!

We get it โ€” optimizing Kubernetes can feel like reading tea leaves.

Instead of leaning on granular data on your pods, nodes and automation we are launching K8s Tarot cards to help you to make your decisions.

No more OOM, throttling alerts and k8s clusters keeping you up at night!

Just draw a card, consult the fates, and let the power of the arcane guide your autoscaling strategy.

IN TODAY'S EDITION

๐Ÿง  Use Case
  • Kubernetes Pod vs Container Security Contexts

๐Ÿš€ Top News
๐Ÿ‘€ Remote Jobs

๐Ÿ“š๏ธ Resources

๐Ÿ“ข Reddit Threads

๐Ÿ‘‹ Iโ€™m happy to announce my next venture GROWTH FEELS

  • A media platform producing visual explainers for life and career growth.

  • GROWTH FEELS brings short, sharp, smarter visuals, mental models, and real life tools

  • First edition of the video and newsletter out tomorrow.

  • Grow wider. Think better. Handle life with clarity.

๐Ÿ› ๏ธ TOOL OF THE DAY

terranetes controller - Manages the lifecycle of an OpenTofu or Terraform resource, allowing developers to self-serve dependencies in a controlled manner.

๐Ÿง  USE CASE

Kubernetes Pod vs Container Security Contexts

For someone new to Kubernetes Security Context, itโ€™s what lets you control which user your containers run as and how they access the file system. Think of it like setting Linux user permissions, but now, inside a Kubernetes cluster.

You can apply it:

  • Pod level: Affects all containers in the pod.

  • Container level: Set individually per container and overrides pod level settings.

  • Pod + Container: Uses pod level defaults unless a container explicitly overrides them.

Letโ€™s walk through the three types using real world situations.

1. Pod level Security Context

spec:
  securityContext:
    runAsUser: 3000
    fsGroup: 4000

This setting is inherited by all containers unless overridden at container level. Useful when all containers share the same user or group ID context.

Donโ€™t assume it applies everywhere. If a container explicitly defines its own runAsUser, it will take precedence.

Use case: A log processor pod where both Fluentd and a custom metrics container access shared volumes, and you want them to operate under the same user and file group.

2. Container level Security Context

containers:
  - name: app-container
    securityContext:
      runAsUser: 3000
  - name: log-container
    securityContext:
      runAsUser: 5000

Each container has its own runAsUser. This is precise and flexible and ideal when containers need different privileges.

Note: Container level security context does not use any pod level runAsUser. Define all required security fields explicitly per container if you skip pod level.

Use case: A main Redis app container and a sidecar logging container, they serve different functions, so they should run under different OS users for audit and isolation.

3. Pod + Container โ€“ With Override

spec:
  securityContext:
    runAsUser: 3000
  containers:
    - name: app-container
      securityContext:
        runAsUser: 5000

Here, app-container overrides the pod level value. Only containers without their own setting will fall back to the pod-level configuration.

In mixed setups, audit security context at container level first. Whatโ€™s defined there always wins.

Use case: You set a default runAsUser for consistency, but need a specific container to run as root (e.g., an init container performing privileged setup).

My 2 cents:
  • Use Pod level when all containers share the same identity.

  • Use Container level for fine grained privilege control.

  • Container level always overrides Pod level (know what takes effect).

No one is immune to OOM, throttling alerts and k8s clusters downtime.

We brought PERFECTSCALE, the best Automated Kubernetes Optimization and Management Platform that can Continuously and autonomously optimize your K8s environment for peak performance at the lowest possible cost.

โœ… Install in minutes

โœ… Get instant actionable insights

โœ… Free for up to 200K vCPU Hours!

Looking to promote your company, product, service, or event to 42,000+ Cloud Native Professionals? Let's work together.