-
Notifications
You must be signed in to change notification settings - Fork 519
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
investigate gVisor support #811
Comments
@gregdek When do you plan to start to tackle this feature? |
You'll have to ask @bcressey -- I'm no longer with the org. :) (Hi Ben!) |
@gregdek - Hi! 😀 @igorantunes1984 - this isn't being actively worked on right now, and isn't on the roadmap for the year. That said, we're happy to collaborate if you have any interest in contributing. Any or all of these would be helpful:
Even general thoughts on the "right" experience for using gVisor would be helpful. Should there be an API setting, so that all containers default to Visor? Or is the Kubernetes support for selecting a custom runtime class sufficient? In recent months for NVIDIA builds, we've defined custom runtimes in the containerd-cri config (in #1799) and the Docker config (in #2097) so there are some examples of doing something similar in the tree now. |
Hi @gregdek Thank you for the information. Regarding the experience and keeping in mind the reduced attack surface and that gVisor only implements part of the kernel in user space, I believe that when gVisor becomes available it should be off by default with settings to:
Hope this helps :) |
Some info just in case it helps move this along:
Getting the files described in the installation docs: x86_64 $ wget -q https://storage.googleapis.com/gvisor/releases/release/latest/x86_64/runsc https://storage.googleapis.com/gvisor/releases/release/latest/x86_64/containerd-shim-runsc-v1
$ du -sh *
24M containerd-shim-runsc-v1
38M runsc aarch64 $ wget -q https://storage.googleapis.com/gvisor/releases/release/latest/aarch64/runsc https://storage.googleapis.com/gvisor/releases/release/latest/aarch64/containerd-shim-runsc-v1
$ du -sh *
23M containerd-shim-runsc-v1
37M runsc
Yes, both listed in installation docs.
https://gvisor.dev/docs/architecture_guide/performance/
are two areas I haven't looked into. Another detail is that gvisor uses bazel as build tool. |
We've heard from customers that they're interested in gVisor support for sandboxing containers.
Some areas to investigate:
The text was updated successfully, but these errors were encountered: