OS-level virtualization

Last updated

OS-level virtualization is an operating system (OS) virtualization paradigm in which the kernel allows the existence of multiple isolated user space instances, called containers (LXC, Solaris containers, AIX WPARs, HP-UX SRP Containers, Docker, Podman), zones (Solaris containers), virtual private servers (OpenVZ), partitions, virtual environments (VEs), virtual kernels (DragonFly BSD), or jails (FreeBSD jail or chroot jail). [1] Such instances may look like real computers from the point of view of programs running in them. A computer program running on an ordinary operating system can see all resources (connected devices, files and folders, network shares, CPU power, quantifiable hardware capabilities) of that computer. However, programs running inside of a container can only see the container's contents and devices assigned to the container.

Contents

On Unix-like operating systems, this feature can be seen as an advanced implementation of the standard chroot mechanism, which changes the apparent root folder for the current running process and its children. In addition to isolation mechanisms, the kernel often provides resource-management features to limit the impact of one container's activities on other containers. Linux containers are all based on the virtualization, isolation, and resource management mechanisms provided by the Linux kernel, notably Linux namespaces and cgroups. [2]

The term container, while most popularly referring to OS-level virtualization systems, is sometimes ambiguously used to refer to fuller virtual machine environments operating in varying degrees of concert with the host OS, e.g., Microsoft's Hyper-V containers. A more historic overview of virtualization in general since 1960 can be found in the Timeline of virtualization development.

Operation

On ordinary operating systems for personal computers, a computer program can see (even though it might not be able to access) all the system's resources. They include:

The operating system may be able to allow or deny access to such resources based on which program requests them and the user account in the context in which it runs. The operating system may also hide those resources, so that when the computer program enumerates them, they do not appear in the enumeration results. Nevertheless, from a programming point of view, the computer program has interacted with those resources and the operating system has managed an act of interaction.

With operating-system-virtualization, or containerization, it is possible to run programs within containers, to which only parts of these resources are allocated. A program expecting to see the whole computer, once run inside a container, can only see the allocated resources and believes them to be all that is available. Several containers can be created on each operating system, to each of which a subset of the computer's resources is allocated. Each container may contain any number of computer programs. These programs may run concurrently or separately, and may even interact with one another.

Containerization has similarities to application virtualization: In the latter, only one computer program is placed in an isolated container and the isolation applies to file system only.

Uses

Operating-system-level virtualization is commonly used in virtual hosting environments, where it is useful for securely allocating finite hardware resources among a large number of mutually-distrusting users. System administrators may also use it for consolidating server hardware by moving services on separate hosts into containers on the one server.

Other typical scenarios include separating several programs to separate containers for improved security, hardware independence, and added resource management features. [3] The improved security provided by the use of a chroot mechanism, however, is not perfect. [4] Operating-system-level virtualization implementations capable of live migration can also be used for dynamic load balancing of containers between nodes in a cluster.

Overhead

Operating-system-level virtualization usually imposes less overhead than full virtualization because programs in OS-level virtual partitions use the operating system's normal system call interface and do not need to be subjected to emulation or be run in an intermediate virtual machine, as is the case with full virtualization (such as VMware ESXi, QEMU, or Hyper-V) and paravirtualization (such as Xen or User-mode Linux). This form of virtualization also does not require hardware support for efficient performance.

Flexibility

Operating-system-level virtualization is not as flexible as other virtualization approaches since it cannot host a guest operating system different from the host one, or a different guest kernel. For example, with Linux, different distributions are fine, but other operating systems such as Windows cannot be hosted. Operating systems using variable input systematics are subject to limitations within the virtualized architecture. Adaptation methods including cloud-server relay analytics maintain the OS-level virtual environment within these applications. [5]

Solaris partially overcomes the limitation described above with its branded zones feature, which provides the ability to run an environment within a container that emulates an older Solaris 8 or 9 version in a Solaris 10 host. Linux branded zones (referred to as "lx" branded zones) are also available on x86-based Solaris systems, providing a complete Linux user space and support for the execution of Linux applications; additionally, Solaris provides utilities needed to install Red Hat Enterprise Linux  3.x or CentOS  3.x Linux distributions inside "lx" zones. [6] [7] However, in 2010 Linux branded zones were removed from Solaris; in 2014 they were reintroduced in Illumos, which is the open source Solaris fork, supporting 32-bit Linux kernels. [8]

Storage

Some implementations provide file-level copy-on-write (CoW) mechanisms. (Most commonly, a standard file system is shared between partitions, and those partitions that change the files automatically create their own copies.) This is easier to back up, more space-efficient and simpler to cache than the block-level copy-on-write schemes common on whole-system virtualizers. Whole-system virtualizers, however, can work with non-native file systems and create and roll back snapshots of the entire system state.

Implementations

MechanismOperating systemLicenseActively developed since or betweenFeatures
File system isolation Copy on write Disk quotas I/O rate limitingMemory limits CPU quotas Network isolationNested virtualizationPartition checkpointing and live migrationRoot privilege isolation
chroot Most UNIX-like operating systemsVaries by operating system1982Partial [lower-alpha 1] NoNoNoNoNoNoYesNoNo
Docker Linux, [10] FreeBSD, [11] Windows x64 [12] macOS [13] Apache license 2.0 2013YesYesNot directlyYes (since 1.10)YesYesYesYesOnly in experimental mode with CRIU Yes (since 1.10)
Linux-VServer
(security context)
Linux, Windows Server 2016 GNU GPLv2 2001YesYesYesYes [lower-alpha 2] YesYesPartial [lower-alpha 3]  ?NoPartial [lower-alpha 4]
lmctfy Linux Apache license 2.0 20132015YesYesYesYes [lower-alpha 2] YesYesPartial [lower-alpha 3]  ?NoPartial [lower-alpha 4]
LXC Linux GNU GPLv2 2008Yes [15] YesPartial [lower-alpha 5] Partial [lower-alpha 6] YesYesYesYesYesYes [15]
Singularity Linux BSD Licence 2015 [16] Yes [17] YesYesNoNoNoNoNoNoYes [18]
OpenVZ Linux GNU GPLv2 2005YesYes [19] YesYes [lower-alpha 7] YesYesYes [lower-alpha 8] Partial [lower-alpha 9] YesYes [lower-alpha 10]
Virtuozzo Linux, Windows Trialware 2000 [23] YesYesYesYes [lower-alpha 11] YesYesYes [lower-alpha 8] Partial [lower-alpha 12] YesYes
Solaris Containers (Zones) illumos (OpenSolaris),
Solaris
CDDL,
Proprietary
2004YesYes (ZFS)YesPartial [lower-alpha 13] YesYesYes [lower-alpha 14] [26] [27] Partial [lower-alpha 15] Partial [lower-alpha 16] [lower-alpha 17] Yes [lower-alpha 18]
FreeBSD jail FreeBSD, DragonFly BSD BSD License 2000 [29] YesYes (ZFS)Yes [lower-alpha 19] YesYes [30] YesYes [31] YesPartial [32] [33] Yes [34]
vkernel DragonFly BSD BSD Licence 2006 [35] Yes [36] Yes [36]  ?Yes [37] Yes [37] Yes [38]  ? ?Yes
sysjail OpenBSD, NetBSD BSD License 20062009YesNoNoNoNoNoYesNoNo ?
WPARs AIX Commercial proprietary software 2007YesNoYesYesYesYesYes [lower-alpha 20] NoYes [40]  ?
iCore Virtual Accounts Windows XP Freeware 2008YesNoYesNoNoNoNo ?No ?
Sandboxie Windows GNU GPLv3 2004YesYesPartialNoNoNoPartialNoNoYes
systemd-nspawn Linux GNU LGPLv2.1+ 2010YesYesYes [41] [42] Yes [41] [42] Yes [41] [42] Yes [41] [42] Yes ? ?Yes
Turbo Windows Freemium 2012YesNoNoNoNoNoYesNoNoYes
rkt (rocket) Linux Apache license 2.0 2014 [43] 2018YesYesYesYesYesYesYes ? ?Yes

Linux containers not listed above include:

See also

Notes

  1. Root user can easily escape from chroot. Chroot was never supposed to be used as a security mechanism. [9]
  2. 1 2 Using the CFQ scheduler, there is a separate queue per guest.
  3. 1 2 Networking is based on isolation, not virtualization.
  4. 1 2 A total of 14 user capabilities are considered safe within a container. The rest may cannot be granted to processes within that container without allowing that process to potentially interfere with things outside that container. [14]
  5. Disk quotas per container are possible when using separate partitions for each container with the help of LVM, or when the underlying host filesystem is btrfs, in which case btrfs subvolumes are automatically used.
  6. I/O rate limiting is supported when using Btrfs.
  7. Available since Linux kernel 2.6.18-028stable021. Implementation is based on CFQ disk I/O scheduler, but it is a two-level schema, so I/O priority is not per-process, but rather per-container. [20]
  8. 1 2 Each container can have its own IP addresses, firewall rules, routing tables and so on. Three different networking schemes are possible: route-based, bridge-based, and assigning a real network device (NIC) to a container.
  9. Docker containers can run inside OpenVZ containers. [21]
  10. Each container may have root access without possibly affecting other containers. [22]
  11. Available since version 4.0, January 2008.
  12. Docker containers can run inside Virtuozzo containers. [24]
  13. Yes with illumos [25]
  14. See Solaris network virtualization and resource control for more details.
  15. Only when top level is a KVM zone (illumos) or a kz zone (Oracle).
  16. Starting in Solaris 11.3 Beta, Solaris Kernel Zones may use live migration.
  17. Cold migration (shutdown-move-restart) is implemented.
  18. Non-global zones are restricted so they may not affect other zones via a capability-limiting approach. The global zone may administer the non-global zones. [28]
  19. Check the "allow.quotas" option and the "Jails and file systems" section on the FreeBSD jail man page for details.
  20. Available since TL 02. [39]

Related Research Articles

A monolithic kernel is an operating system architecture where the entire operating system is working in kernel space. The monolithic model differs from other operating system architectures in that it alone defines a high-level virtual interface over computer hardware. A set of primitives or system calls implement all operating system services such as process management, concurrency, and memory management. Device drivers can be added to the kernel as modules.

In computing, a virtual machine (VM) is the virtualization or emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer. Their implementations may involve specialized hardware, software, or a combination of the two. Virtual machines differ and are organized by their function, shown here:

chroot is an operation on Unix and Unix-like operating systems that changes the apparent root directory for the current running process and its children. A program that is run in such a modified environment cannot name files outside the designated directory tree. The term "chroot" may refer to the chroot(2) system call or the chroot(8) wrapper program. The modified environment is called a chroot jail.

These tables provide a comparison of operating systems, of computer devices, as listing general and technical information for a number of widely used and currently available PC or handheld operating systems. The article "Usage share of operating systems" provides a broader, and more general, comparison of operating systems that includes servers, mainframes and supercomputers.

<span class="mw-page-title-main">DTrace</span> Dynamic tracing framework for kernel and applications

DTrace is a comprehensive dynamic tracing framework originally created by Sun Microsystems for troubleshooting kernel and application problems on production systems in real time. Originally developed for Solaris, it has since been released under the free Common Development and Distribution License (CDDL) in OpenSolaris and its descendant illumos, and has been ported to several other Unix-like systems.

Solaris Containers is an implementation of operating system-level virtualization technology for x86 and SPARC systems, first released publicly in February 2004 in build 51 beta of Solaris 10, and subsequently in the first full release of Solaris 10, 2005. It is present in illumos distributions, such as OpenIndiana, SmartOS, Tribblix and OmniOS, as well as in the official Oracle Solaris 11 release.

<span class="mw-page-title-main">OpenVZ</span> Operating-system level virtualization technology

OpenVZ is an operating-system-level virtualization technology for Linux. It allows a physical server to run multiple isolated operating system instances, called containers, virtual private servers (VPSs), or virtual environments (VEs). OpenVZ is similar to Solaris Containers and LXC.

The following is a timeline of virtualization development. In computing, virtualization is the use of a computer to simulate another computer. Through virtualization, a host simulates a guest by exposing virtual hardware devices, which may be done through software or by allowing access to a physical device connected to the machine.

<span class="mw-page-title-main">Kernel-based Virtual Machine</span> Virtualization module in the Linux kernel

Kernel-based Virtual Machine (KVM) is a free and open-source virtualization module in the Linux kernel that allows the kernel to function as a hypervisor. It was merged into the mainline Linux kernel in version 2.6.20, which was released on February 5, 2007. KVM requires a processor with hardware virtualization extensions, such as Intel VT or AMD-V. KVM has also been ported to other operating systems such as FreeBSD and illumos in the form of loadable kernel modules.

libvirt Management tool

libvirt is an open-source API, daemon and management tool for managing platform virtualization. It can be used to manage KVM, Xen, VMware ESXi, QEMU and other virtualization technologies. These APIs are widely used in the orchestration layer of hypervisors in the development of a cloud-based solution.

<span class="mw-page-title-main">Illumos</span> Free software implementation of the Solaris kernel

Illumos is a partly free and open-source Unix operating system. It is based on OpenSolaris, which was based on System V Release 4 (SVR4) and the Berkeley Software Distribution (BSD). Illumos comprises a kernel, device drivers, system libraries, and utility software for system administration. This core is now the base for many different open-sourced Illumos distributions, in a similar way in which the Linux kernel is used in different Linux distributions.

<span class="mw-page-title-main">LXC</span> Operating system-level virtualization for Linux

Linux Containers (LXC) is an operating-system-level virtualization method for running multiple isolated Linux systems (containers) on a control host using a single Linux kernel.

cgroups is a Linux kernel feature that limits, accounts for, and isolates the resource usage of a collection of processes.

<span class="mw-page-title-main">SmartOS</span> Operating system

SmartOS is a free and open-source SVR4 hypervisor based on the UNIX operating system that combines OpenSolaris technology with bhyve and KVM virtualization. Its core kernel contributes to the illumos project. It features several technologies: Crossbow, DTrace, bhyve, KVM, ZFS, and Zones. Unlike other illumos distributions, SmartOS employs NetBSD pkgsrc package management. SmartOS is designed to be particularly suitable for building clouds and generating appliances. It was originally developed for and by Joyent, who announced in April 2022 that they had sold their business supporting and developing of Triton Datacenter and SmartOS to MNX Solutions. It is open-source and free for anyone to use.

Docker is a set of platform as a service (PaaS) products that use OS-level virtualization to deliver software in packages called containers. The service has both free and premium tiers. The software that hosts the containers is called Docker Engine. It was first released in 2013 and is developed by Docker, Inc.

<span class="mw-page-title-main">OpenZFS</span> Open-source implementation of the ZFS file system

OpenZFS is an open-source implementation of the ZFS file system and volume manager initially developed by Sun Microsystems for the Solaris operating system and now maintained by the OpenZFS Project. It supports features like data compression, data deduplication, copy-on-write clones, snapshots, and RAID-Z. It also supports the creation of virtual devices, which allows for the creation of file systems that span multiple disks.

In computing, a system virtual machine is a virtual machine (VM) that provides a complete system platform and supports the execution of a complete operating system (OS). These usually emulate an existing architecture, and are built with the purpose of either providing a platform to run programs where the real hardware is not available for use, or of having multiple instances of virtual machines leading to more efficient use of computing resources, both in terms of energy consumption and cost effectiveness, or both. A VM was originally defined by Popek and Goldberg as "an efficient, isolated duplicate of a real machine".

Virtuozzo is a software company that develops virtualization and cloud management software for cloud computing providers, managed services providers and internet hosting service providers. The company's software enables service providers to offer Infrastructure as a service, Container-as-a-Service, Platform as a service, Kubernetes-as-a-Service, WordPress-as-a-Service and other solutions.

A virtual kernel architecture (vkernel) is an operating system virtualisation paradigm where kernel code can be compiled to run in the user space, for example, to ease debugging of various kernel-level components, in addition to general-purpose virtualisation and compartmentalisation of system resources. It is used by DragonFly BSD in its vkernel implementation since DragonFly 1.7, having been first revealed in September 2006, and first released in the stable branch with DragonFly 1.8 in January 2007. The long-term goal, in addition to easing kernel development, is to make it easier to support internet-connected computer clusters without compromising local security. Similar concepts exist in other operating systems as well; in Linux, a similar virtualisation concept is known as user-mode Linux; whereas in NetBSD since the summer of 2007, it has been the initial focus of the rump kernel infrastructure.

References

  1. Hogg, Scott (2014-05-26). "Software containers: Used more frequently than most realize". Network World . Network world, Inc. Retrieved 2015-07-09. There are many other OS-level virtualization systems such as: Linux OpenVZ, Linux-VServer, FreeBSD Jails, AIX Workload Partitions (WPARs), HP-UX Containers (SRP), Solaris Containers, among others.
  2. Rami, Rosen. "Namespaces and Cgroups, the basis of Linux Containers" (PDF). Retrieved 18 August 2016.
  3. "Secure Bottlerocket deployments on Amazon EKS with KubeArmor | Containers". aws.amazon.com. 2022-10-20. Retrieved 2023-06-20.
  4. Korff, Yanek; Hope, Paco; Potter, Bruce (2005). Mastering FreeBSD and OpenBSD security. O'Reilly Series. O'Reilly Media, Inc. p. 59. ISBN   0596006268.
  5. Huang, D. (2015). "Experiences in using os-level virtualization for block I/O". Proceedings of the 10th Parallel Data Storage Workshop. pp. 13–18. doi:10.1145/2834976.2834982. ISBN   9781450340083. S2CID   3867190.
  6. "System administration guide: Oracle Solaris containers-resource management and Oracle Solaris zones, Chapter 16: Introduction to Solaris zones". Oracle Corporation. 2010. Retrieved 2014-09-02.
  7. "System administration guide: Oracle Solaris containers-resource nanagement and Oracle Solaris zones, Chapter 31: About branded zones and the Linux branded zone". Oracle Corporation. 2010. Retrieved 2014-09-02.
  8. Bryan Cantrill (2014-09-28). "The dream is alive! Running Linux containers on an illumos kernel". slideshare.net. Retrieved 2014-10-10.
  9. "3.5. Limiting your program's environment". freebsd.org.
  10. "Docker drops LXC as default execution environment". InfoQ.
  11. "Docker comes to FreeBSD". FreeBSDNews.com. July 9, 2015.
  12. "Install Docker desktop on Windows | Docker documentation". Docker. 9 February 2023.
  13. "Get started with Docker desktop for Mac". Docker documentation. December 6, 2019.
  14. "Paper - Linux-VServer". linux-vserver.org.
  15. 1 2 Graber, Stéphane (1 January 2014). "LXC 1.0: Security features [6/10]" . Retrieved 12 February 2014. LXC now has support for user namespaces. [...] LXC is no longer running as root so even if an attacker manages to escape the container, he'd find himself having the privileges of a regular user on the host.
  16. "Sylabs brings Singularity containers into commercial HPC | Top 500 supercomputer sites". www.top500.org.
  17. "SIF — Containing your containers". www.sylabs.io. 14 March 2018.
  18. Kurtzer, Gregory M.; Sochat, Vanessa; Bauer, Michael W. (May 11, 2017). "Singularity: Scientific containers for mobility of compute". PLOS ONE. 12 (5): e0177459. Bibcode:2017PLoSO..1277459K. doi: 10.1371/journal.pone.0177459 . PMC   5426675 . PMID   28494014.
  19. Bronnikov, Sergey. "Comparison on OpenVZ wiki page". OpenVZ Wiki. OpenVZ. Retrieved 28 December 2018.
  20. "I/O priorities for containers". OpenVZ Virtuozzo Containers Wiki.
  21. "Docker inside CT".
  22. "Container". OpenVZ Virtuozzo Containers Wiki.
  23. "Initial public prerelease of Virtuozzo (named ASPcomplete at that time)".
  24. "Parallels Virtuozzo now provides native support for Docker".
  25. Pijewski, Bill. "Our ZFS I/O throttle".
  26. Network virtualization and resource control (Crossbow) FAQ Archived 2008-06-01 at the Wayback Machine
  27. "Managing network virtualization and network resources in Oracle® Solaris 11.2". docs.oracle.com.
  28. Oracle Solaris 11.1 administration, Oracle Solaris zones, Oracle Solaris 10 zones and resource management E29024.pdf, pp. 356360. Available within an archive.
  29. "Contain your enthusiasm - Part two: Jails, zones, OpenVZ, and LXC". Jails were first introduced in FreeBSD 4.0 in 2000
  30. "Hierarchical resource limits - FreeBSD Wiki". Wiki.freebsd.org. 2012-10-27. Retrieved 2014-01-15.
  31. "Implementing a clonable network stack in the FreeBSD kernel" (PDF). usenix.org. 2003-06-13.
  32. "VPS for FreeBSD" . Retrieved 2016-02-20.
  33. "[Announcement] VPS // OS virtualization // alpha release". 31 August 2012. Retrieved 2016-02-20.
  34. "3.5. Limiting your program's environment". Freebsd.org. Retrieved 2014-01-15.
  35. Matthew Dillon (2006). "sys/vkernel.h". BSD cross reference. DragonFly BSD.
  36. 1 2 "vkd(4) — Virtual kernel disc". DragonFly BSD. treats the disk image as copy-on-write.
  37. 1 2 Sascha Wildner (2007-01-08). "vkernel, vcd, vkd, vke — virtual kernel architecture". DragonFly miscellaneous information manual. DragonFly BSD.
  38. "vkernel, vcd, vkd, vke - virtual kernel architecture". DragonFly On-Line Manual Pages. DragonFly BSD.
  39. "IBM fix pack information for: WPAR network isolation - United States". ibm.com. 21 July 2011.
  40. "Live application mobility in AIX 6.1". www.ibm.com. June 3, 2008.
  41. 1 2 3 4 "systemd-nspawn". www.freedesktop.org.
  42. 1 2 3 4 "2.3. Modifying control groups Red Hat Enterprise Linux 7". Red Hat Customer portal.
  43. Polvi, Alex. "CoreOS is building a container runtime, rkt". CoreOS Blog. Archived from the original on 2019-04-01. Retrieved 12 March 2019.
  44. "LXD". linuxcontainers.org. Retrieved 2021-02-11.
  45. Rootless containers with Podman and fuse-overlayfs, CERN workshop, 2019-06-04
  46. "Overview — Charliecloud 0.25 documentation" . Retrieved 4 October 2020.
  47. "Home". katacontainers.io.
  48. "Bottlerocket is a Linux-based operating system purpose-built to run containers".