WikiSuite
cloud-hypervisor
Our great sponsors
WikiSuite | cloud-hypervisor | |
---|---|---|
5 | 17 | |
3,044 | 3,527 | |
0.0% | 6.7% | |
0.0 | 9.8 | |
about 1 year ago | 6 days ago | |
JavaScript | Rust | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
WikiSuite
-
Phyllome OS Desktop, alpha version, is out!
I have looked into Cockpit. I agree that it is probably the best way forward to manage virtual machines (Kimchi seems nice too).
-
ZFS fans, rejoice—RAIDz expansion will be a thing very soon
Cockpit or proxmox comes to mind. Quick Google search also came up with Kimchi.
cloud-hypervisor
-
We Replaced Firecracker with QEMU
There is no mention of cloud-hypervisor[1] (also in the rust-vmm ecosystem) in the article. It has the memory reclamation feature they require. It also support VFIO and virtiofs.
-
Hypervisor Development in Rust
https://github.com/tandasat/Hypervisor-101-in-Rust is there to help
https://github.com/cloud-hypervisor/cloud-hypervisor isn't educational necessarily but is one of the most technically progressive fastest developing highest funded vm projects ever, and there are oodles of tech talks on it. I am not qualified to make any specific recommendations, but there's tons of stuff here.
-
Firecracker internals: deep dive inside the technology powering AWS Lambda(2021)
> The goal of the Cloud Hypervisor project differs from the aforementioned projects in that it aims to be a general purpose VMM for Cloud Workloads and not limited to container/serverless or client workloads.
Firecracker is such a great piece of technology. I'm amazed that AWS actually open-sourced it. All kudos to them. We're using Firecracker at our company to allow API companies build interactive demos like this one we built for Prisma [1].
-
I'm releasing cargo-sandbox
The Chrome OS hypervisor was then evolved/forked into Firecracker and Intel's Cloud Hypervisor, with the latter supporting both Linux and Windows. Perhaps Cloud Hypervisor would serve as a good backbone for sandboxing, with its Rust implementation and focus on security?
-
Virtink : un module complémentaire de virtualisation légère pour Kubernetes …
GitHub - cloud-hypervisor/cloud-hypervisor: A Virtual Machine Monitor for modern Cloud workloads. Features include CPU, memory and device hotplug, support for running Windows and Linux guests, device offload with vhost-user and a minimal compact footprint. Written in Rust with a strong focus on security.
-
We clone a running VM in 2 seconds
Did you guys think about live migrations? https://github.com/cloud-hypervisor/cloud-hypervisor seems to support it and it shares a good amount of code with firecracker.
-
Show r/kubernetes: Virtink - Lightweight Virtualization Add-on for Kubernetes
Virtink is a Kubernetes add-on for running Cloud Hypervisor virtual machines. By using Cloud Hypervisor as the underlying hypervisor, Virtink enables a lightweight and secure way to run fully virtualized workloads in a canonical Kubernetes cluster.
- Firecracker: Lightweight Virtualization for Serverless Applications (2020)
-
Phyllome OS Desktop, alpha version, is out!
A taxing overhead would probably arise if a user relies on a complex file-system inside a VM (for instance, ZFS on the host, and BTRFS inside a VM, which is the default for Fedora installation now). The general idea is to keep the top layer as clean and simple as possible, and to not only make a few clear assumptions about the default kind of virtual machine model Phyllome OS will support : as of now, I have settled on a Q35 chipset with EFI (but the virt chipset, from the Cloud Hypervisor project, will ideally replace the Q35 chipset), virtio-devices (and their vhost counterparts, which are running on their own, outside the virtual machine monitor, and are more performant and secured as far as I understand), VFIO, etc.
-
Container security best practices: Ultimate guide
Inside the cluster my containers are Linux only. I don't believe kata-containers supports Windows containers as I don't think rust-vmm, which is used by CloudHypervisor[0], or the kata internal execution agent support it.
If I wanted to run Windows in the cluster I'd probably have to look at KubeVirt[1]. KubeVirt is oriented towards getting traditional VM workloads (ones you'd run in QEMU, Hyper-V, etc) functioning in a Kubernetes environment. While kata-containers is oriented towards giving container runtime (docker, containers, CRI-O) based workloads the protection of virtualization, with minimal friction.
Previously external to the cluster I had some Windows VMs hosted on QEMU/KVM + libvirt for experimentation with Linux and Active Directory integration, but they've since been deleted. I've got one OpenBSD server for serving up update images to my routers.
For network infra I have a number of VyOS[2] firewalls both at the edge and between VLANs, and Mikrotik devices for switching.
[0] https://github.com/cloud-hypervisor/cloud-hypervisor
What are some alternatives?
firecracker - Secure and fast microVMs for serverless computing.
kubevirt - Kubernetes Virtualization API and runtime in order to define and manage virtual machines.
kata-containers - Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs. https://katacontainers.io/
virt-manager - Desktop tool for managing virtual machines via libvirt
rusty-hermit - Hermit for Rust. [Moved to: https://github.com/hermit-os/hermit-rs]
TagSpaces - TagSpaces is an offline, open source, document manager with tagging support
DockSTARTer - DockSTARTer helps you get started with running apps in Docker.
sovereign - A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more.
Kimai 2 - Kimai is a web-based multi-user time-tracking application. Works great for everyone: freelancers, companies, organizations - everyone can track their times, generate reports, create invoices and do so much more. SaaS version available at https://www.kimai.cloud [Moved to: https://github.com/kimai/kimai]
Sandstorm - Sandstorm is a self-hostable web productivity suite. It's implemented as a security-hardened web app package manager.
UBOS - File bugs against this project for apps you'd like to see on UBOS
crosvm - The Chrome OS Virtual Machine Monitor - Mirror of https://chromium.googlesource.com/crosvm/crosvm/