Kata Containers¶
Kata Containers is an open source community working to build a secure container runtime with lightweight virtual machines (VM's) that feel and perform like standard Linux containers, but provide stronger workload isolation using hardware virtualization technology as a second layer of defense.
How it Works¶
Kata implements the Open Containers Runtime Specification. More specifically, it implements a containerd shim that implements the expected interface for managing container lifecycles. The default containerd runtime of runc spawns a container like this:
flowchart TD
subgraph Host
containerd
runc
process[Container Process]
containerd --> runc --> process
end
When containerd receives a request to spawn a container, it will pull the container image down and then call out to the runc shim (usually located at /usr/local/bin/containerd-shim-runc-v2). runc will then create various process isolation resources like Linux namespaces (networking, PIDs, mounts etc), seccomp filters, Linux capability reductions, and then spawn the process inside of those resources. This process runs in the host kernel.
Kata spawns containers like this:
flowchart TD
subgraph Host
containerdOuter[containerd]
kata
containerdOuter --> kata
kata --> kataAgent
subgraph VM
kataAgent[Kata Agent]
process[Container Process]
kataAgent --> process
end
end
The container process spawned inside of the VM allows us to isolate the guest kernel from the host system. This is the fundamental principle of how Kata achieves its isolation boundaries.
Example¶
When Kata is installed in a system, a number of artifacts are laid down. containerd's config will be modified as such:
This file will contain configuration for various flavors of Kata runtimes. We can see the vanilla CPU runtime config here:
[plugins."io.containerd.cri.v1.runtime".containerd.runtimes.kata-qemu]
runtime_type = "io.containerd.kata-qemu.v2"
runtime_path = "/opt/kata/bin/containerd-shim-kata-v2"
privileged_without_host_devices = true
pod_annotations = ["io.katacontainers.*"]
[plugins."io.containerd.cri.v1.runtime".containerd.runtimes.kata-qemu.options]
ConfigPath = "/opt/kata/share/defaults/kata-containers/configuration-qemu.toml"
Because containerd's CRI is aware of the Kata runtimes, we can spawn Kubernetes pods:
apiVersion: v1
kind: Pod
metadata:
name: test
spec:
runtimeClassName: kata-qemu
containers:
- name: test
image: "quay.io/libpod/ubuntu:latest"
command: ["/bin/bash", "-c"]
args: ["echo hello"]
We can also spawn a Kata container by submitting a request to containerd like so:
Tip
ctr is not aware of the CRI config in /etc/containerd/config.toml. This is why you must specify the --runtime-config-path. Additionally, the --runtime value is converted into a specific binary name which containerd then searches for in its PATH. See the containerd docs for more details.