Hi,

The project produces official Docker images for every release, including our 
own bugfix releases.
These images are based on an OpenJDK base image, which is again based on a 
Linux base image.
Once in a while, when there is a serious bugfix in either Linux or Java the 
Solr image gets re-built by Docker.

I wanted to invite to a discussion on how you as users handle security patching 
in your Docker/k8s production environments.

Do you:

A) just pull the image once and let it sit there until next upgrade?
B) pin the exact version, e.g. solr:8.11.1 and pull routinely for Linux / JDK 
updates?
C) pin the minor version only, e.g. solr:8.1 and pull regularly for any new 
patch releases
D) pin the major oversion only, e.g. solr:8 and pull regularly for any new 
minor releases
E) make a custom Dockerfile FROM solr:8 and add "RUN apt upgrade" or similar to 
stay up to date? How often?
F) Neither of the above. Please share your best practice

This thread was triggered from 
https://issues.apache.org/jira/browse/SOLR-15967, which is really about RPM but 
strayed into security patching in general.

Thanks,
Jan

Reply via email to