artifacts
containerd
Our great sponsors
- InfluxDB - Access the most powerful time series database as a service
- SonarLint - Clean code begins in your IDE with SonarLint
- ONLYOFFICE ONLYOFFICE Docs — document collaboration in your environment
- CodiumAI - TestGPT | Generating meaningful tests for busy devs
artifacts | containerd | |
---|---|---|
2 | 111 | |
217 | 14,031 | |
5.1% | 3.5% | |
3.8 | 9.8 | |
3 days ago | 2 days ago | |
Go | ||
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
artifacts
-
Tart – open source virtualization for Apple Silicon
One of the most interesting/unique features is the integration with OCI-compatible container registries. Tart can pull/push virtual machines from/to a registry. This feature was inspired by OCI Artifacts initiative.
containerd
-
Best virtualization solution with Ubuntu 22.04
containerd
-
Pigz: Parallel gzip for modern multi-processor, multi-core machines
Containerd will utilize unpigz if it’s on your PATH, thank me later: https://github.com/containerd/containerd/blob/main/archive/c...
- [email protected]+incompatible with ubuntu 22.04 on arm64 ?
-
Kuasar: An efficient multi-sandbox container runtime
The link to containerd Sandbox API was super interesting & helpful. https://github.com/containerd/containerd/issues/4131
Neat project. I hope we see more of this & others.
-
Setting Up Kubernetes Cluster with K3S
You have now finally deployed an enterprise-grade Kubernetes cluster with k3s. You can now deploy some work on this cluster. Some components to take note of are for ingress, you already have Traefik installed, longhorn will handle storage and Containerd as the container runtime engine.
-
Docker is deleting Open Source organisations - what you need to know
Docker itself is open-source, and has slowly been broken down into modular components that are themselves open-source. For example, most of what "run this Docker container" does has been extracted out into containerd, which is Apache licensed and used by lots of things. The Docker CE engine is now based on Moby, also Apache license, and the docker command line tool is also Apache licensed. I expect these tools to continue to be community-maintained (though maybe without the Docker name) due to their immense popularity even Docker Inc folds.
-
Docker's deleting Open Source images and here's what you need to know
If you are using containerd then you might find the "hosts" section of the configuration file useful: https://github.com/containerd/containerd/blob/main/docs/host...
-
Containerd Adds Support for a New Container Type: Wasm Containers
but there has been support for windows containers in containerd since 2018. https://github.com/containerd/containerd/pull/2538
-
What is a containerd snapshotter?
Side note: the Target field was recently added (Feb 2023 circa) as an optional field to the struct. The snapshotters currently baked in containerd do not use/do not need it so for now/rest of the document we will just say that the field was added because some future snapshotters might need it. The github issue and PR contain more details on the reasoning
-
Error setting up kubernetes cluster
From https://github.com/containerd/containerd/issues/4581 but it didn't work. Please what Am I doing wrong?
What are some alternatives?
cri-o - Open Container Initiative-based implementation of Kubernetes Container Runtime Interface
Moby - Moby Project - a collaborative project for the container ecosystem to assemble container-based systems
podman-compose - a script to run docker-compose.yml using podman
podman - Podman: A tool for managing OCI containers and pods.
colima - Container runtimes on macOS (and Linux) with minimal setup
sysbox - An open-source, next-generation "runc" that empowers rootless containers to run workloads such as Systemd, Docker, Kubernetes, just like VMs.
gvisor - Application Kernel for Containers
cri-dockerd - dockerd as a compliant Container Runtime Interface for Kubernetes
nerdctl - contaiNERD CTL - Docker-compatible CLI for containerd, with support for Compose, Rootless, eStargz, OCIcrypt, IPFS, ...
minikube - Run Kubernetes locally
fly-podman-daemon
kata-containers - Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs. https://katacontainers.io/