Submitted Successfully!
To reward your contribution, here is a gift for you: A free trial for our video production service.
Thank you for your contribution! You can also upload a video entry or images related to this topic.
Version Summary Created by Modification Content Size Created at Operation
1 handwiki -- 1188 2022-12-01 01:45:00 |
2 format correct Meta information modification 1188 2022-12-06 03:45:15 |

Video Upload Options

Do you have a full video?

Confirm

Are you sure to Delete?
Cite
If you have any further questions, please contact Encyclopedia Editorial Office.
HandWiki. Operating-System-Level Virtualization. Encyclopedia. Available online: https://encyclopedia.pub/entry/37464 (accessed on 23 April 2024).
HandWiki. Operating-System-Level Virtualization. Encyclopedia. Available at: https://encyclopedia.pub/entry/37464. Accessed April 23, 2024.
HandWiki. "Operating-System-Level Virtualization" Encyclopedia, https://encyclopedia.pub/entry/37464 (accessed April 23, 2024).
HandWiki. (2022, December 01). Operating-System-Level Virtualization. In Encyclopedia. https://encyclopedia.pub/entry/37464
HandWiki. "Operating-System-Level Virtualization." Encyclopedia. Web. 01 December, 2022.
Operating-System-Level Virtualization
Edit

Operating-system-level virtualization, also known as containerization, refers to an operating system feature in which the kernel allows the existence of multiple isolated user-space instances. Such instances, called containers, partitions, virtual environments (VEs) or jails (FreeBSD jail or chroot jail), may look like real computers from the point of view of programs running in them. A computer program running on an ordinary operating system can see all resources (connected devices, files and folders, network shares, CPU power, quantifiable hardware capabilities) of that computer. However, programs running inside a container can only see the container's contents and devices assigned to the container. On Unix-like operating systems, this feature can be seen as an advanced implementation of the standard chroot mechanism, which changes the apparent root folder for the current running process and its children. In addition to isolation mechanisms, the kernel often provides resource-management features to limit the impact of one container's activities on other containers. System-level-virtualization is frequently implemented in remote access applications with dynamic cloud access, allowing for simultaneous two-way data streaming over closed networks.

system-level-virtualization virtual environments virtualization

1. Operation

On ordinary operating systems for personal computers, a computer program can see (even though it might not be able to access) all the system's resources. They include:

  1. Hardware capabilities that can be employed, such as the CPU and the network connection
  2. Data that can be read or written, such as files, folders and network shares
  3. Connected peripherals it can interact with, such as webcam, printer, scanner, or fax

The operating system may be able to allow or deny access to such resources based on which program requests them and the user account in the context of which it runs. The operating system may also hide those resources, so that when the computer program enumerates them, they do not appear in the enumeration results. Nevertheless, from a programming point of view, the computer program has interacted with those resources and the operating system has managed an act of interaction.

With operating-system-virtualization, or containerization, it is possible to run programs within containers, to which only parts of these resources are allocated. A program expecting to see the whole computer, once run inside a container, can only see the allocated resources and believes them to be all that is available. Several containers can be created on each operating system, to each of which a subset of the computer's resources is allocated. Each container may contain any number of computer programs. These programs may run concurrently or separately, even interact with each other.

Containerization has similarities to application virtualization: In the latter, only one computer program is placed in an isolated container and the isolation applies to file system only.

2. Uses

Operating-system-level virtualization is commonly used in virtual hosting environments, where it is useful for securely allocating finite hardware resources among a large number of mutually-distrusting users. System administrators may also use it for consolidating server hardware by moving services on separate hosts into containers on the one server.

Other typical scenarios include separating several programs to separate containers for improved security, hardware independence, and added resource management features. The improved security provided by the use of a chroot mechanism, however, is nowhere near ironclad. Operating-system-level virtualization implementations capable of live migration can also be used for dynamic load balancing of containers between nodes in a cluster.

2.1. Overhead

Operating-system-level virtualization usually imposes less overhead than full virtualization because programs in virtual partitions use the operating system's normal system call interface and do not need to be subjected to emulation or be run in an intermediate virtual machine, as is the case with full virtualization (such as VMware ESXi, QEMU or Hyper-V) and paravirtualization (such as Xen or UML). This form of virtualization also does not require hardware support in for efficient performance.

2.2. Flexibility

Operating-system-level virtualization is not as flexible as other virtualization approaches since it cannot host a guest operating system different from the host one, or a different guest kernel. For example, with Linux, different distributions are fine, but other operating systems such as Windows cannot be hosted.

Solaris partially overcomes the limitation described above with its branded zones feature, which provides the ability to run an environment within a container that emulates an older Solaris 8 or 9 version in a Solaris 10 host. Linux branded zones (referred to as "lx" branded zones) are also available on x86-based Solaris systems, providing a complete Linux userspace and support for the execution of Linux applications; additionally, Solaris provides utilities needed to install Red Hat Enterprise Linux 3.x or CentOS 3.x Linux distributions inside "lx" zones.[1][2] However, in 2010 Linux branded zones were removed from Solaris; in 2014 they were reintroduced in Illumos, which is the open source Solaris fork, supporting 32-bit Linux kernels.[3]

2.3. Storage

Some operating-system-level virtualization implementations provide file-level copy-on-write (CoW) mechanisms. (Most commonly, a standard file system is shared between partitions, and those partitions that change the files automatically create their own copies.) This is easier to back up, more space-efficient and simpler to cache than the block-level copy-on-write schemes common on whole-system virtualizers. Whole-system virtualizers, however, can work with non-native file systems and create and roll back snapshots of the entire system state.

3. Implementations

Mechanism Operating system License Available since or between Features
File system isolation Copy on Write Disk quotas I/O rate limiting Memory limits CPU quotas Network isolation Nested virtualization Partition checkpointing and live migration Root privilege isolation
chroot Most UNIX-like operating systems Varies by operating system 1982 Partial[4] No No No No No No Yes No No
Docker Linux,[5] FreeBSD,[6] Windows x64 (Pro, Enterprise and Education)[7] macOS [8] Apache License 2.0 2013 Yes Yes Not directly Yes (since 1.10) Yes Yes Yes Yes Only in Experimental Mode with CRIU [1] Yes (since 1.10)
Linux-VServer
(security context)
Linux, Windows Server 2016 GNU GPLv2 2001 Yes Yes Yes Yes[9] Yes Yes Partial[10] ? No Partial[11]
lmctfy Linux Apache License 2.0 2013 Yes Yes Yes Yes[9] Yes Yes Partial[10] ? No Partial[11]
LXC Linux GNU GPLv2 2008 Yes[12] Yes Partial[13] Partial[14] Yes Yes Yes Yes No Yes[12]
Singularity Linux BSD Licence 2015[15] Yes[16] Yes Yes No No No No No No Yes[17]
OpenVZ Linux GNU GPLv2 2005 Yes Yes (ZFS) Yes Yes[18] Yes Yes Yes[19] Partial[20] Yes Yes[21]
Virtuozzo Linux, Windows Trialware 2000[22] Yes Yes Yes Yes[23] Yes Yes Yes[19] Partial[24] Yes Yes
Solaris Containers (Zones) illumos (OpenSolaris),
Solaris
CDDL,
Proprietary
2004 Yes Yes (ZFS) Yes Partial[25] Yes Yes Yes[26][27][28] Partial[29] Partial[30][31] Yes[32]
FreeBSD jail FreeBSD, DragonFly BSD BSD License 2000[33] Yes Yes (ZFS) Yes[34] Yes Yes[35] Yes Yes[36] Yes Partial[37][38] Yes[39]
sysjail OpenBSD, NetBSD BSD License 2006–2009 Yes No No No No No Yes No No ?
WPARs AIX Commercial proprietary software 2007 Yes No Yes Yes Yes Yes Yes[40] No Yes[41] ?
iCore Virtual Accounts Windows XP Freeware 2008 Yes No Yes No No No No ? No ?
Sandboxie Windows Trialware 2004 Yes Yes Partial No No No Partial No No Yes
systemd-nspawn Linux GNU LGPLv2.1+ 2010 Yes Yes Yes[42][43] Yes[42][43] Yes[42][43] Yes[42][43] Yes ? ? Yes
Turbo Windows Freemium 2012 Yes No No No No No Yes No No Yes
RKT Linux Apache License 2.0 ? ? ? ? ? ? ? ? ? ? ?

4. Cloud Computing and Container Registry Services

Several companies offer container hosting and container image registry services:

  • Amazon EC2 Container Service (ECS)
  • AWS Elastic Container Registry (ECR)[44]
  • Google Cloud Container Registry[45]
  • Docker Trusted Registry[46]
  • Quay[47]
  • HashiCorp

References

  1. "System Administration Guide: Oracle Solaris Containers-Resource Management and Oracle Solaris Zones, Chapter 16: Introduction to Solaris Zones". Oracle Corporation. 2010. http://docs.oracle.com/cd/E19044-01/sol.containers/817-1592/zones.intro-1/index.html. Retrieved 2014-09-02. 
  2. "System Administration Guide: Oracle Solaris Containers-Resource Management and Oracle Solaris Zones, Chapter 31: About Branded Zones and the Linux Branded Zone". Oracle Corporation. 2010. http://docs.oracle.com/cd/E19044-01/sol.containers/817-1592/gchhy/index.html. Retrieved 2014-09-02. 
  3. Bryan Cantrill (2014-09-28). "The dream is alive! Running Linux containers on an illumos kernel". http://www.slideshare.net/bcantrill/illumos-lx. Retrieved 2014-10-10. 
  4. Root user can easily escape from chroot. Chroot was never supposed to be used as a security mechanism.
  5. "Docker drops LXC as default execution environment". InfoQ. http://www.infoq.com/news/2014/03/docker_0_9. 
  6. "Docker comes to FreeBSD". https://www.freebsdnews.com/2015/07/09/docker-freebsd/. 
  7. "Get started with Docker for Windows". Docker. https://docs.docker.com/docker-for-windows/. 
  8. "Get started with Docker for Mac". https://docs.docker.com/docker-for-mac/. 
  9. Utilizing the CFQ scheduler, there is a separate queue per guest.
  10. Networking is based on isolation, not virtualization.
  11. A total of 14 user capabilities are considered safe within a container. The rest may cannot be granted to processes within that container without allowing that process to potentially interfere with things outside that container.
  12. Graber, Stéphane (1 January 2014). "LXC 1.0: Security features [6/10"]. https://www.stgraber.org/2014/01/01/lxc-1-0-security-features/. Retrieved 12 February 2014. "LXC now has support for user namespaces. [...] LXC is no longer running as root so even if an attacker manages to escape the container, he’d find himself having the privileges of a regular user on the host" 
  13. Disk quotas per container are possible when using separate partitions for each container with the help of LVM, or when the underlying host filesystem is btrfs, in which case btrfs subvolumes are automatically used.
  14. I/O rate limiting is supported when using Btrfs.
  15. ""Sylabs brings Singularity containers into commercial HPC"". https://www.top500.org/news/sylabs-brings-singularity-containers-into-commercial-hpc/. 
  16. ""SIF — Containing Your Containers"". https://www.sylabs.io/2018/03/sif-containing-your-containers/. 
  17. ""Singularity: Scientific containers for mobility of compute"". http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0177459. 
  18. Available since Linux kernel 2.6.18-028stable021. Implementation is based on CFQ disk I/O scheduler, but it is a two-level schema, so I/O priority is not per-process, but rather per-container.
  19. Each container can have its own IP addresses, firewall rules, routing tables and so on. Three different networking schemes are possible: route-based, bridge-based, and assigning a real network device (NIC) to a container.
  20. Docker containers can run inside OpenVZ containers.
  21. Each container may have root access without possibly affecting other containers.
  22. "Initial public prerelease of Virtuozzo (named ASPcomplete at that time)". http://www.paul.sladen.org/vserver/aspcomplete/2000-08-25/ve-0.4.2-for-2.4.0-test6.diff.gz. 
  23. Available since version 4.0, January 2008.
  24. Docker containers can run inside Virtuozzo containers.
  25. Yes with illumos
  26. See OpenSolaris Network Virtualization and Resource Control for more details.
  27. Network Virtualization and Resource Control (Crossbow) FAQ http://www.opensolaris.org/os/project/crossbow/faq/
  28. "Managing Network Virtualization and Network Resources in Oracle® Solaris 11.2". http://docs.oracle.com/cd/E36784_01/html/E36813/index.html. 
  29. Only when top level is a KVM zone (illumos) or a kz zone (Oracle).
  30. Starting in Solaris 11.3 Beta, Solaris Kernel Zones may use live migration.
  31. Cold migration (shutdown-move-restart) is implemented.
  32. Non-global zones are restricted so they may not affect other zones via a capability-limiting approach. The global zone may administer the non-global zones.
  33. "Contain your enthusiasm - Part Two: Jails, Zones, OpenVZ, and LXC". http://www.cybera.ca/news-and-events/tech-radar/contain-your-enthusiasm-part-two-jails-zones-openvz-and-lxc/. "Jails were first introduced in FreeBSD 4.0 in 2000" 
  34. Check the "allow.quotas" option and the "Jails and File Systems" section on the FreeBSD jail man page for details. http://www.freebsd.org/cgi/man.cgi?query%3Djail&sektion%3D8
  35. "Hierarchical_Resource_Limits - FreeBSD Wiki". Wiki.freebsd.org. 2012-10-27. http://wiki.freebsd.org/Hierarchical_Resource_Limits. Retrieved 2014-01-15. 
  36. "Implementing a Clonable Network Stack in the FreeBSD Kernel". usenix.org. 2003-06-13. http://static.usenix.org/publications/library/proceedings/usenix03/tech/freenix03/full_papers/zec/zec.pdf. 
  37. "VPS for FreeBSD". http://www.7he.at/freebsd/vps/. Retrieved 2016-02-20. 
  38. "[Announcement VPS // OS Virtualization // alpha release"]. https://forums.freebsd.org/threads/34284/. Retrieved 2016-02-20. 
  39. "3.5. Limiting your program's environment". Freebsd.org. http://www.freebsd.org/doc/en/books/developers-handbook/secure-chroot.html. Retrieved 2014-01-15. 
  40. Available since TL 02.
  41. Live Application Mobility in AIX 6.1 http://www.ibm.com/developerworks/aix/library/au-aix61mobility/?ca=dgr-btw77liveappmobile61&S_TACT=105AGX59&S_CMP=GR
  42. https://www.freedesktop.org/software/systemd/man/systemd-nspawn.html#--property=
  43. https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/resource_management_guide/sec-modifying_control_groups
  44. https://aws.amazon.com/ecr/
  45. https://cloud.google.com/container-registry/
  46. https://docs.docker.com/ee/dtr/
  47. https://quay.io/
More
Information
Subjects: Others
Contributor MDPI registered users' name will be linked to their SciProfiles pages. To register with us, please refer to https://encyclopedia.pub/register :
View Times: 1.1K
Entry Collection: HandWiki
Revisions: 2 times (View History)
Update Date: 06 Dec 2022
1000/1000