SlideShare une entreprise Scribd logo
1  sur  40
Secure Container:
Kata Container & gVisor
Speaker: Mango
1
Nice to meet you
My name is Ching-Hsuan Yen, and Mango as a nickname.
- A R&D engineer in Deep Security of Trend Micro
- A CS master of NCTU
- A former leader of Linux team in NCTU CSCC
- A member of Bamboofox
2
Outline
Kubernetes: Secure Container Isolation
- Requirements and use cases
Are containers secure?
- The weakness of containers
Approaches to secure containers
- Kata Container and gVisor
3
Kubernetes: Secure Container Isolation
4
https://goo.gl/eQHuqo
Requirements: CIA
Confidentiality - a sandboxed process should not be able to access:
● application data in other pods - e.g. volumes, memory, writeable layer, etc.
● application metadata of other pods - e.g. container image names, pod & service names, pod labels,
etc.
● system metrics & resource usage
● system metadata - e.g. kubernetes version, os version, runtime version
Integrity - a sandboxed process should not be able to alter:
● processes or data outside the sandbox, e.g. mitigate confused deputy attacks, data tampering, etc.
● perform operations not required by the sandboxed application, e.g. a web server may not need to
make outgoing connections
Availability - a sandboxed process should not be able to affect the availability of processes or resources
outside the sandbox, e.g. mitigate local DoS attacks
5
Use cases
1. Sandbox vulnerable code (media library model)
2. Sandbox untrusted code (vendor blackbox model)
3. Provide maximum defense in depth (financial services model)
4. Sandbox multitenant code (hosting provider model)
5. Sandbox multitenant services
6. Mutually untrusted users want to share a cluster (KaaS model)
7. Sidecar container has distinct privileges
6
Use cases
1. Sandbox vulnerable code (media library model)
2. Sandbox untrusted code (vendor blackbox model)
3. Provide maximum defense in depth (financial services model)
4. Sandbox multitenant code (hosting provider model)
5. Sandbox multitenant services
6. Mutually untrusted users want to share a cluster (KaaS model)
7. Sidecar container has distinct privileges
7
Use cases
1. Sandbox vulnerable code (media library model)
2. Sandbox untrusted code (vendor blackbox model)
3. Provide maximum defense in depth (financial services model)
4. Sandbox multitenant code (hosting provider model)
5. Sandbox multitenant services
6. Mutually untrusted users want to share a cluster (KaaS model)
7. Sidecar container has distinct privileges
8
Use cases
1. Sandbox vulnerable code (media library model)
2. Sandbox untrusted code (vendor blackbox model)
3. Provide maximum defense in depth (financial services model)
4. Sandbox multitenant code (hosting provider model)
5. Sandbox multitenant services
6. Mutually untrusted users want to share a cluster (KaaS model)
7. Sidecar container has distinct privileges
9
Use cases
1. Sandbox vulnerable code (media library model)
2. Sandbox untrusted code (vendor blackbox model)
3. Provide maximum defense in depth (financial services model)
4. Sandbox multitenant code (hosting provider model)
5. Sandbox multitenant services
6. Mutually untrusted users want to share a cluster (KaaS model)
7. Sidecar container has distinct privileges
10
Use cases
11
Current State of Container Isolation
Namespaces - Isolate kernel data structures, such as processes, mount tables, network interfaces, and others. Not all kernel data
structures have namespace isolation, such as the clock, audit logs, and keyrings.
cgroups - Limits, controls, and accounting of compute resources and devices. Examples include limiting and accounting CPU,
memory and network usage, hiding devices, and limiting the number of process IDs.
seccomp-bpf - Whitelist (filter) linux syscalls & arguments. Useful for restricting non-namespaced syscalls, poorly supported syscalls,
and syscalls that don't have associated capabilities. Docker provides a default seccomp profile, which is compatible with most
unprivileged container workloads.
AppArmor / SELinux - A Linux Security Module (AppArmor & SELinux are mutually exclusive). Mostly useful for finer grained control
of filesystem access, but recent changes are adding in more networking controls.
Users - Core linux permission model. Mostly used for filesystem permissions (DAC) and process signaling.
Capabilities - Subdivide root user privileges into various capabilities. The docker defaults drop un-namespaced capabilities (e.g. ability
to install kernel modules, manage the network devices, and reboot the machine).
12
Attack Surface
1. Kernel
2. Daemon
3. Network
4. Storage
5. Hardware
13
Are containers secure?
14
Are containers secure?
Is it secure that downloads random container images and run it on the host.
Is it secure that CaaS providers allow tenants run their own images?
Is it possible that containers are secure as VMs?
15
Are containers secure?
Containers should be treated as a standard services e.g. nginx, postfix, sshd.
As an experienced system administrator, you should:
● Drop privileges as quickly as possible
● Run your services as non-root whenever possible
● Treat root within a container as if it is root outside of the container
16
Normal containers are not secure
Privileged container: too dangerous
Unprivileged container: no root no life
Namespaced container: sound good ?
Kernel
Container
Vulner
17
Normal containers are not secure
Privileged container: too dangerous
Unprivileged container: no root no life
Namespaced container: sound good ?
NO, not everything is namespaced.
Containers are still vulnerable.Kernel
Container
Vulner
18
Normal containers are not secure
Major kernel subsystems are not namespaced like:
1. SELinux
2. Cgroups
3. file systems under /sys
4. /proc/sys, /proc/sysrq-trigger, /proc/irq, /proc/bus
Devices are not namespaced:
1. /dev/mem
2. /dev/sd* file system devices
3. Kernel Modules
Just try to break one of them, you can own the system,
e.g. Dirty COW.
Kernel
Container
Vulner
19
Approaches to secure containers
20
How to protect the host kernel?
Keep containers out of the kernel space.
But how could container work without the host kernel?
21
How to protect the host kernel?
Keep containers out of the kernel space.
But how could container work without the host kernel?
Just forge one to containers!
22
Two ideas
gVisor: we can forge a kernel!
I means… a kernel in User Space!
Kata Container: we can forge a kernel!
I means… a kernel in Virtual Machines!
23
Two ideas
gVisor: we can forge a kernel!
I means… a kernel in User Space!
Kata Container: we can forge a kernel!
I means… a kernel in Virtual Machines!
24
Isolation
Kata Container gVisor
25
Containerd
Kata Container
Shim
Kata Shim Kata Runtime
Hypervisor (QEMU/KVM)
Guest Kernel
Kata Agent
Pod / Container namespace
Container /
Application
Container /
Application
OCI Platform
VSOCK
gRPC
26
OCI Platform
gVisor
Shim
Sentry
which acts as a VM
and a kernel
Ptrace
Container /
Appliaction
Gofer
a proxy to file systems
9p
runsc
27
Container /
Appliaction
Sentry
which acts as a
kernel
KVM
OCI Platform
gVisor: KVM (experimental)
Shim
Sentry
which acts as a VM
runsc
Intel VT
AMD-V
VM Entry
VM Exit
28
Boot time
Kata Container: 800ms
gVisor: 150ms
Docker runc: 140ms
Kata Container Booting Process
docker run
VM boot Kernel Agent
Start
Container
Prepare
Image
Prepare
Volumes
Create Start
Hot plug
29
Memory footprint
gVisor merely consumes memory as much as its runtime size.
However, memory footprint is a big issue to virtual machines.
Kata Container uses such approaches:
● Minimal rootfs
● Minimal kernel
● VM Template
● DAX/nvdimm
● Kernel Samepage Merging (KSM)
30
Host
VM
Host
VM
DAX/nvdimm
Rootfs
Shared
memory
nvdimm
DAX
Rootfs
Block device
driver
virtio-blk
ext4
VM with block device VM with DAX/nvdimm
Page
cache!
Map into
shared
memory
Page
cache!
31
Kernel Samepage Merging
Initial state
Aggressive
Standard
Slow
No trigger(30s)
No trigger(2min)
No trigger(30s)
New trigger
Trigger
Kata Container uses KSM to merge
same memory pages of kernels
between VMs.
KSM is triggered when creating a
container of Kata Container.
Thus, each kernel between VMs
would share the same memory
pages.
32
VM Network Namespace
Container Network
Namespace
Networking: Kata Container
Bridge MacVTap
VM
Tap
Pod
Container
ContainerVeth
33
Sentry
Networking: gVisor
Container Network
Namespace
Bridge
Container
Veth NetStack
gVisor Network Namespace
34
Performance
Byte Unix Benchmark & Phoronix Test Suite v7.8.0
35
Current status
Kata Container has released its first version, which supports OCI platform like
docker or kubernetes, and works fine on ARM and x86 architectures.
gVisor is still in early development and doesn’t yet support some system call
which make it unstable.
Even that, some applications have been executable on it e.g. httpd, golang,
mongo db, but many others are not e.g. nginx, elasticsearch.
36
How to use
Kata-container has deb/rpm packages on x86_64 platform.
gVisor has nightly builds. https://storage.googleapis.com/gvisor/releases/nightly/latest/runsc
Enable nested-virtualization:
$ kata-runtime kata-check
Docker version > 17.0
Kernel version > 3.17
37
Have a look, shall we?
38
Q&A
39
Reference
https://docs.google.com/presentation/d/1IX-6E2Okk_bEoAq_hkDnYP9VXgc50GX6yH5Ym2F9G94/
https://docs.google.com/document/d/1WzO_QjJFfedhsiBtfcVB2QzTWRXHEPX1xOyqDGXxO-0
https://docs.google.com/document/d/1QQ5u1RBDLXWvC8K3pscTtTRThsOeBSts_imYEoRyw8A/
https://docs.google.com/document/d/1mpjPTZkoeFV3tG59149KaIuI8LhIE-cekjFq8rRmNoQ/
https://www.kernel.org/doc/Documentation/filesystems/9p.txt
https://opensource.com/business/14/7/docker-security-selinux
https://github.com/google/gvisor
https://github.com/google/gvisor/search?q=extension%3Amd&unscoped_q=extension%3Amd
http://snmlab.cs.nchu.edu.tw/course_download.asp?id=370
http://cizixs.com/2017/02/10/network-virtualization-network-namespace
http://lettieri.iet.unipi.it/virtualization/2017/vn06.pdf
http://lameleg.com/tech/docker-architech.html
https://github.com/kata-containers/documentation/blob/master/architecture.md
https://cloudplatform.googleblog.com/2018/05/Open-sourcing-gVisor-a-sandboxed-container-runtime.html
https://github.com/misterbisson/simple-container-benchmarks
http://www.linux-kongress.org/2009/slides/system_call_tracing_overhead_joerg_zinke.pdf
40

Contenu connexe

Tendances

Comparing Next-Generation Container Image Building Tools
 Comparing Next-Generation Container Image Building Tools Comparing Next-Generation Container Image Building Tools
Comparing Next-Generation Container Image Building ToolsAkihiro Suda
 
Kubernetes Workshop
Kubernetes WorkshopKubernetes Workshop
Kubernetes Workshoploodse
 
OpenShift Virtualization- Technical Overview.pdf
OpenShift Virtualization- Technical Overview.pdfOpenShift Virtualization- Technical Overview.pdf
OpenShift Virtualization- Technical Overview.pdfssuser1490e8
 
Keeping Latency Low for User-Defined Functions with WebAssembly
Keeping Latency Low for User-Defined Functions with WebAssemblyKeeping Latency Low for User-Defined Functions with WebAssembly
Keeping Latency Low for User-Defined Functions with WebAssemblyScyllaDB
 
Kubernetes Introduction
Kubernetes IntroductionKubernetes Introduction
Kubernetes IntroductionEric Gustafson
 
Everything You Need To Know About Persistent Storage in Kubernetes
Everything You Need To Know About Persistent Storage in KubernetesEverything You Need To Know About Persistent Storage in Kubernetes
Everything You Need To Know About Persistent Storage in KubernetesThe {code} Team
 
Apache pulsar - storage architecture
Apache pulsar - storage architectureApache pulsar - storage architecture
Apache pulsar - storage architectureMatteo Merli
 
Introduction to linux containers
Introduction to linux containersIntroduction to linux containers
Introduction to linux containersGoogle
 
Rancher 2.0 Technical Deep Dive
Rancher 2.0 Technical Deep DiveRancher 2.0 Technical Deep Dive
Rancher 2.0 Technical Deep DiveLINE Corporation
 
Docker Networking Deep Dive
Docker Networking Deep DiveDocker Networking Deep Dive
Docker Networking Deep DiveDocker, Inc.
 
Operator Framework Overview
Operator Framework OverviewOperator Framework Overview
Operator Framework OverviewRob Szumski
 
[KubeCon EU 2022] Running containerd and k3s on macOS
[KubeCon EU 2022] Running containerd and k3s on macOS[KubeCon EU 2022] Running containerd and k3s on macOS
[KubeCon EU 2022] Running containerd and k3s on macOSAkihiro Suda
 
Kubernetes: A Short Introduction (2019)
Kubernetes: A Short Introduction (2019)Kubernetes: A Short Introduction (2019)
Kubernetes: A Short Introduction (2019)Megan O'Keefe
 
Docker and kubernetes
Docker and kubernetesDocker and kubernetes
Docker and kubernetesDongwon Kim
 
Hands-On Introduction to Kubernetes at LISA17
Hands-On Introduction to Kubernetes at LISA17Hands-On Introduction to Kubernetes at LISA17
Hands-On Introduction to Kubernetes at LISA17Ryan Jarvinen
 

Tendances (20)

Comparing Next-Generation Container Image Building Tools
 Comparing Next-Generation Container Image Building Tools Comparing Next-Generation Container Image Building Tools
Comparing Next-Generation Container Image Building Tools
 
Kubernetes Workshop
Kubernetes WorkshopKubernetes Workshop
Kubernetes Workshop
 
OpenShift Virtualization- Technical Overview.pdf
OpenShift Virtualization- Technical Overview.pdfOpenShift Virtualization- Technical Overview.pdf
OpenShift Virtualization- Technical Overview.pdf
 
Keeping Latency Low for User-Defined Functions with WebAssembly
Keeping Latency Low for User-Defined Functions with WebAssemblyKeeping Latency Low for User-Defined Functions with WebAssembly
Keeping Latency Low for User-Defined Functions with WebAssembly
 
Kubernetes Introduction
Kubernetes IntroductionKubernetes Introduction
Kubernetes Introduction
 
Qemu Introduction
Qemu IntroductionQemu Introduction
Qemu Introduction
 
Everything You Need To Know About Persistent Storage in Kubernetes
Everything You Need To Know About Persistent Storage in KubernetesEverything You Need To Know About Persistent Storage in Kubernetes
Everything You Need To Know About Persistent Storage in Kubernetes
 
Apache pulsar - storage architecture
Apache pulsar - storage architectureApache pulsar - storage architecture
Apache pulsar - storage architecture
 
Kubernetes Basics
Kubernetes BasicsKubernetes Basics
Kubernetes Basics
 
OpenStack Cinder
OpenStack CinderOpenStack Cinder
OpenStack Cinder
 
Introduction to kubernetes
Introduction to kubernetesIntroduction to kubernetes
Introduction to kubernetes
 
DevOps with Kubernetes
DevOps with KubernetesDevOps with Kubernetes
DevOps with Kubernetes
 
Introduction to linux containers
Introduction to linux containersIntroduction to linux containers
Introduction to linux containers
 
Rancher 2.0 Technical Deep Dive
Rancher 2.0 Technical Deep DiveRancher 2.0 Technical Deep Dive
Rancher 2.0 Technical Deep Dive
 
Docker Networking Deep Dive
Docker Networking Deep DiveDocker Networking Deep Dive
Docker Networking Deep Dive
 
Operator Framework Overview
Operator Framework OverviewOperator Framework Overview
Operator Framework Overview
 
[KubeCon EU 2022] Running containerd and k3s on macOS
[KubeCon EU 2022] Running containerd and k3s on macOS[KubeCon EU 2022] Running containerd and k3s on macOS
[KubeCon EU 2022] Running containerd and k3s on macOS
 
Kubernetes: A Short Introduction (2019)
Kubernetes: A Short Introduction (2019)Kubernetes: A Short Introduction (2019)
Kubernetes: A Short Introduction (2019)
 
Docker and kubernetes
Docker and kubernetesDocker and kubernetes
Docker and kubernetes
 
Hands-On Introduction to Kubernetes at LISA17
Hands-On Introduction to Kubernetes at LISA17Hands-On Introduction to Kubernetes at LISA17
Hands-On Introduction to Kubernetes at LISA17
 

Similaire à Secure container: Kata container and gVisor

Securing Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformSecuring Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformAll Things Open
 
Securing Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformSecuring Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformAll Things Open
 
Unraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production CloudUnraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production CloudSalman Baset
 
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker SecurityTokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker SecurityPhil Estes
 
How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016Phil Estes
 
Security on a Container Platform
Security on a Container PlatformSecurity on a Container Platform
Security on a Container PlatformAll Things Open
 
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Lions, Tigers and Deers: What building zoos can teach us about securing micro...Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Lions, Tigers and Deers: What building zoos can teach us about securing micro...Sysdig
 
Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Michael Boelen
 
Docker London: Container Security
Docker London: Container SecurityDocker London: Container Security
Docker London: Container SecurityPhil Estes
 
Lightweight Virtualization in Linux
Lightweight Virtualization in LinuxLightweight Virtualization in Linux
Lightweight Virtualization in LinuxSadegh Dorri N.
 
Containers and workload security an overview
Containers and workload security an overview Containers and workload security an overview
Containers and workload security an overview Krishna-Kumar
 
Docker Security
Docker SecurityDocker Security
Docker Securityantitree
 
Docker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and securityDocker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and securityJérôme Petazzoni
 
Container & kubernetes
Container & kubernetesContainer & kubernetes
Container & kubernetesTed Jung
 
Rootless Containers
Rootless ContainersRootless Containers
Rootless ContainersAkihiro Suda
 
Docker, Linux Containers, and Security: Does It Add Up?
Docker, Linux Containers, and Security: Does It Add Up?Docker, Linux Containers, and Security: Does It Add Up?
Docker, Linux Containers, and Security: Does It Add Up?Jérôme Petazzoni
 
The State of Kubernetes Security
The State of Kubernetes Security The State of Kubernetes Security
The State of Kubernetes Security Jimmy Mesta
 

Similaire à Secure container: Kata container and gVisor (20)

Securing Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformSecuring Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container Platform
 
Securing Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformSecuring Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container Platform
 
Unraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production CloudUnraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production Cloud
 
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker SecurityTokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker Security
 
How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016
 
Security on a Container Platform
Security on a Container PlatformSecurity on a Container Platform
Security on a Container Platform
 
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Lions, Tigers and Deers: What building zoos can teach us about securing micro...Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
 
Dockers zero to hero
Dockers zero to heroDockers zero to hero
Dockers zero to hero
 
Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?
 
Docker London: Container Security
Docker London: Container SecurityDocker London: Container Security
Docker London: Container Security
 
Lightweight Virtualization in Linux
Lightweight Virtualization in LinuxLightweight Virtualization in Linux
Lightweight Virtualization in Linux
 
Containers and workload security an overview
Containers and workload security an overview Containers and workload security an overview
Containers and workload security an overview
 
Containers > VMs
Containers > VMsContainers > VMs
Containers > VMs
 
Docker Security
Docker SecurityDocker Security
Docker Security
 
Docker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and securityDocker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and security
 
Container & kubernetes
Container & kubernetesContainer & kubernetes
Container & kubernetes
 
Rootless Containers
Rootless ContainersRootless Containers
Rootless Containers
 
Docker, Linux Containers, and Security: Does It Add Up?
Docker, Linux Containers, and Security: Does It Add Up?Docker, Linux Containers, and Security: Does It Add Up?
Docker, Linux Containers, and Security: Does It Add Up?
 
Exploring Docker Security
Exploring Docker SecurityExploring Docker Security
Exploring Docker Security
 
The State of Kubernetes Security
The State of Kubernetes Security The State of Kubernetes Security
The State of Kubernetes Security
 

Dernier

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Secure container: Kata container and gVisor

Notes de l'éditeur

  1. K8s 訂定的 Sanbox proposal
  2. K8s 訂定的 Sanbox proposal
  3. K8s 訂定的 Sanbox proposal
  4. K8s 訂定的 Sanbox proposal
  5. K8s 訂定的 Sanbox proposal
  6. 這裡的 container 指的是 container runtime 像是 runc, lxc, lxd
  7. 猜猜看 gVisor 用什麼語言實作 User space kernel
  8. Why Go? gVisor was written in Go in order to avoid security pitfalls that can plague kernels. With Go, there are strong types, built-in bounds checks, no uninitialized variables, no use-after-free, no stack overflow, and a built-in race detector.
  9. Direct Device Assignment SRIOV NVDIMM Multi-OS KSM throttling CRI-O native support MacVTap, multi-queue net Multi Architecture Multi Hypervisor Full Hotplug K8s Multi Tenancy VM templating Frakti native support Traffic Controller net
  10. Kernel 把不需要的 module 拔除,diff 預設 config 大約拔掉了 681 個 module 和 功能,有趣的是 CONFIG_RANDOMIZE_BASE (KASLR) 關掉了
  11. 一般的方式會在 host 和 VM 中各別占有 memory cache 且 效能較低 KataContainer 選擇將 rootfs 透過 shared memory 直接映射到 VM 當中 雖然會使用一個 kernel 大小的 memory 但可以透過 share 的方式 讓多個 Container 使用同一 memory ,提升效能並降低記憶體使用量
  12. 為什麼不要經過 kernel 有哪些好處