All Projects → kata-containers → Runtime

kata-containers / Runtime

Licence: apache-2.0
Kata Containers version 1.x runtime (for version 2.x see https://github.com/kata-containers/kata-containers).

Programming Languages

go
31211 projects - #10 most used programming language
Makefile
30231 projects
shell
77523 projects

Projects that are alternatives of or similar to Runtime

Kata Containers
Kata Containers version 2.x repository. Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs. https://katacontainers.io/
Stars: ✭ 1,053 (-49.93%)
Mutual labels:  containers, k8s, virtual-machine, virtualization, qemu, kvm, oci
Cc Oci Runtime
OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
Stars: ✭ 418 (-80.12%)
Mutual labels:  containers, virtual-machine, container, virtualization, kvm, oci
Runtime
OCI (Open Containers Initiative) compatible runtime using Virtual Machines
Stars: ✭ 588 (-72.04%)
Mutual labels:  containers, virtual-machine, container, virtualization, kvm, oci
virtnbdbackup
Backup utiliy for Libvirt / qemu / kvm supporting incremental and differencial backups.
Stars: ✭ 62 (-97.05%)
Mutual labels:  virtual-machine, virtualization, kvm, qemu
Core
Eru, a simple, stateless, flexible, production-ready orchestrator designed to easily integrate into existing workflows. Can run any virtualization things in long or short time.
Stars: ✭ 147 (-93.01%)
Mutual labels:  containers, virtual-machine, container, virtualization
Learn Kvm
Qemu KVM(Kernel Virtual Machine)学习笔记
Stars: ✭ 305 (-85.5%)
Mutual labels:  virtualization, qemu, kvm
python-negotiator
Scriptable KVM/QEMU guest agent implemented in Python
Stars: ✭ 40 (-98.1%)
Mutual labels:  virtualization, kvm, qemu
Tks
Enable enthusiasts and administrators alike to easily provision highly available and production-ready Kubernetes clusters on Proxmox VE.
Stars: ✭ 319 (-84.83%)
Mutual labels:  virtualization, qemu, kvm
Runq
run regular Docker images in KVM/Qemu
Stars: ✭ 616 (-70.71%)
Mutual labels:  qemu, kvm, oci
Kvm Guest Drivers Windows
Windows paravirtualized
Stars: ✭ 892 (-57.58%)
Mutual labels:  virtualization, qemu, kvm
Node Libvirt
libvirt bindings for google v8 javascript engine (nodejs addon)
Stars: ✭ 162 (-92.3%)
Mutual labels:  virtualization, qemu, kvm
Multipass
Multipass orchestrates virtual Ubuntu instances
Stars: ✭ 3,978 (+89.16%)
Mutual labels:  virtual-machine, container, qemu
Macos Simple Kvm
Tools to set up a quick macOS VM in QEMU, accelerated by KVM.
Stars: ✭ 11,732 (+457.87%)
Mutual labels:  virtual-machine, qemu, kvm
Firecracker Containerd
firecracker-containerd enables containerd to manage containers as Firecracker microVMs
Stars: ✭ 1,130 (-46.27%)
Mutual labels:  containers, virtualization, oci
Ignite
Ignite a Firecracker microVM
Stars: ✭ 1,954 (-7.09%)
Mutual labels:  containers, kvm, oci
node-qemu-server
Free GUI / Frontend / Management tool for simple setup, configure and control virtual machines (qemu / kvm) within your HTML5 Webbrowser. Virtualization with Node.js / Currently under complete rewrite.
Stars: ✭ 41 (-98.05%)
Mutual labels:  virtualization, kvm, qemu
Tools
Combination of different utilities, have fun!
Stars: ✭ 166 (-92.11%)
Mutual labels:  virtualization, kvm, qemu
TTstack
A private-cloud solution for SMEs !
Stars: ✭ 55 (-97.38%)
Mutual labels:  container, kvm, qemu
Dockerpi
A Virtualised Raspberry Pi inside a Docker image
Stars: ✭ 1,064 (-49.41%)
Mutual labels:  virtual-machine, container, qemu
Osx Kvm
Run macOS on QEMU/KVM. With OpenCore + Big Sur + Monterey support now! Only commercial (paid) support is available now to avoid spammy issues. No Mac system is required.
Stars: ✭ 12,926 (+514.65%)
Mutual labels:  qemu, kvm, virtualization

Build Status Build Status Go Report Card GoDoc

Runtime

This repository contains the runtime for the Kata Containers project.

For details of the other Kata Containers repositories, see the repository summary.

Introduction

kata-runtime, referred to as "the runtime", is the Command-Line Interface (CLI) part of the Kata Containers runtime component. It leverages the virtcontainers package to provide a high-performance standards-compliant runtime that creates hardware-virtualized Linux containers running on Linux hosts.

The runtime is OCI-compatible, CRI-O-compatible, and Containerd-compatible, allowing it to work seamlessly with both Docker and Kubernetes respectively.

License

The code is licensed under an Apache 2.0 license.

See the license file for further details.

Platform support

Kata Containers currently works on systems supporting the following technologies:

  • Intel VT-x technology.
  • ARM Hyp mode (virtualization extension).
  • IBM Power Systems.
  • IBM Z mainframes.

Hardware requirements

The runtime has a built-in command to determine if your host system is capable of running and creating a Kata Container:

$ kata-runtime kata-check

Note:

  • By default, only a brief success / failure message is printed. If more details are needed, the --verbose flag can be used to display the list of all the checks performed.

  • root permission is needed to check if the system is capable of running Kata containers. In this case, additional checks are performed (e.g., if another incompatible hypervisor is running).

Download and install

Get it from the Snap Store

See the installation guides available for various operating systems.

Quick start for developers

See the developer guide.

Architecture overview

See the architecture overview for details on the Kata Containers design.

Configuration

The runtime uses a TOML format configuration file called configuration.toml. The file contains comments explaining all options.

Note:

The initial values in the configuration file provide a good default configuration. You may need to modify this file to optimise or tailor your system, or if you have specific requirements.

Since the runtime supports a stateless system, it checks for this configuration file in multiple locations, two of which are built in to the runtime. The default location is /usr/share/defaults/kata-containers/configuration.toml for a standard system. However, if /etc/kata-containers/configuration.toml exists, this takes priority.

The below command lists the full paths to the configuration files that the runtime attempts to load. The first path that exists will be used:

$ kata-runtime --kata-show-default-config-paths

Aside from the built-in locations, it is possible to specify the path to a custom configuration file using the --kata-config option:

$ kata-runtime --kata-config=/some/where/configuration.toml ...

The runtime will log the full path to the configuration file it is using. See the logging section for further details.

To see details of your systems runtime environment (including the location of the configuration file being used), run:

$ kata-runtime kata-env

Logging

For detailed information and analysis on obtaining logs for other system components, see the documentation for the kata-log-parser tool.

For runtime logs, see the following sections for the CRI-O and containerd shimv2 based runtimes.

Kata OCI

The Kata OCI runtime (including when used with CRI-O), provides --log= and --log-format= options. However, the runtime also always logs to the system log (syslog or journald).

To view runtime log output:

$ sudo journalctl -t kata-runtime

Kata containerd shimv2

The Kata containerd shimv2 runtime logs through containerd, and its logs will be sent to wherever the containerd logs are directed. However, the shimv2 runtime also always logs to the system log (syslog or journald) under the identifier name of kata.

To view the shimv2 runtime log output:

$ sudo journalctl -t kata

Debugging

See the debugging section of the developer guide.

Limitations

See the limitations file for further details.

Community

See the community repository.

Contact

See how to reach the community.

Further information

See the project table of contents and the documentation repository.

Additional packages

For details of the other packages contained in this repository, see the package documentation.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].