Containerd

Open-source projects categorized as Containerd

Top 23 Containerd Open-Source Projects

  • colima

    Container runtimes on macOS (and Linux) with minimal setup

  • Project mention: Lcl.host: fast, easy HTTPS in your local dev environment | news.ycombinator.com | 2024-03-20

    If you don't need a GUI, the following combo works pretty well:

    - https://github.com/abiosoft/colima

    - https://github.com/peterldowns/localias

  • containerd

    An open and reliable container runtime

  • Project mention: Exploring 5 Docker Alternatives: Containerization Choices for 2024 | dev.to | 2024-03-18

    Containerd and nerdctl

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
  • lima

    Linux virtual machines, with a focus on running containers

  • Project mention: Colima k8s nix setup | dev.to | 2024-04-16

    You can run a virtual machine (e.g. lima) from inside a nix-shell, exactly as you would do with a regular shell.

  • nerdctl

    contaiNERD CTL - Docker-compatible CLI for containerd, with support for Compose, Rootless, eStargz, OCIcrypt, IPFS, ...

  • Project mention: Colima k8s nix setup | dev.to | 2024-04-16

    What about the docker-cli? colima also ships with a docker-compatible cli to interact with containerd called nerdctl. We can execute the same docker cli commands like:

  • talos

    Talos Linux is a modern Linux distribution built for Kubernetes.

  • Project mention: There are only 12 binaries in Talos Linux | news.ycombinator.com | 2024-03-04

    Super cool. I always enjoy reading about systems that challenge, well, "ossified" assumptions. An OS not providing a shell, for example? Madness! ... or is it genius, if the OS has a specific purpose...? It's thought-provoking, if nothing else.

    I'm a bit skeptical of parts. For instance, the "init" binary being less than 400 lines of golang - wow! And sure, main.go [1] is less than 400 lines and very readable. Then you squint at the list of imported packages, or look to the left at the directory list and realize main.go isn't nearly the entire init binary.

    That `talosctl list` invocation [2] didn't escape my notice either. Sure, the base OS may have only a handful of binaries - how many of those traditional utilities have been stuffed into the API server? Not that I disagree with the approach! I think every company eventually replaces direct shell access with a daemon like this. It's just that "binary footprint" can get a bit funny if you have a really sophisticated API server sitting somewhere.

    [1]: https://github.com/siderolabs/talos/blob/main/internal/app/m...

    [2]: https://www.talos.dev/v1.6/reference/cli/#talosctl-list

  • faasd

    A lightweight & portable faas engine

  • firecracker-containerd

    firecracker-containerd enables containerd to manage containers as Firecracker microVMs

  • Project mention: Savings cost for self managed K8s? | /r/kubernetes | 2023-05-03

    My team is working on multi-cloud AWS Bottlerocket remix (Azure, GCP) with opt-in support for [firecracker-containerd](https://github.com/firecracker-microvm/firecracker-containerd) for our in-house CNCF distro, investigating microkernels applicability (tldr; they are not production-ready). We test kubernetes compat and migration plans for over 40+ cherry-picked solutions, and facing numerous compat issues for every k8s update. We do have support for Container Managed Control Planes described above, as well.

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
  • veinmind-tools

    veinmind-tools 是由长亭科技自研,基于 veinmind-sdk 打造的容器安全工具集

  • kuasar

    A multi-sandbox container runtime that provides cloud-native, all-scenario multiple sandbox container solutions.

  • Project mention: The advantage of WASM compared with container runtimes | news.ycombinator.com | 2023-05-28

    Right now most early examples alas boot a container with a wasm runtime for each wasm instance, which is a sad waste. The whole advantage of wasm should be very lightweight low overhead wasm runtime instances atop a common wasm process. Having a process or container for each instance loses a ton of the benefit, makes it not much better than a regular container.

    Thankfully there is work like the Containerd Sandbox API which enables new architectures like this. https://github.com/containerd/containerd/issues/4131

    It's still being used to spawn a wasm processes per instance for now, but container runtime project Kuasar is already using the Sandbox API to save significant resources, and has already chimed in in comments on HN to express a desire to have shared-process/multi-wasm-instamxe runtimes, which could indeed allow sub ms spawning that could enable instance per request architectures. https://github.com/kuasar-io/kuasar

  • cdebug

    cdebug - a swiss army knife of container debugging

  • Project mention: Cdebug: A Swiss army knife of container debugging | news.ycombinator.com | 2024-03-13
  • nydus

    Nydus - the Dragonfly image service, providing fast, secure and easy access to container images.

  • stargz-snapshotter

    Fast container image distribution plugin with lazy pulling

  • Project mention: Tree-shaking, the horticulturally misguided algorithm | news.ycombinator.com | 2024-04-13

    A lazy chunked delivery strategy like used in the k8s stargz-snapshotter[0] project could be effective here, where it only pulls chunks as needed, but it would probably require wasm platform changes.

    [0] https://github.com/containerd/stargz-snapshotter

  • runwasi

    Facilitates running Wasm / WASI workloads managed by containerd

  • Project mention: Howto: WASM runtimes in Docker / Colima | dev.to | 2024-01-12

    cpu: 4 disk: 60 memory: 12 arch: host hostname: colima autoActivate: true forwardAgent: false # I only tested this with 'docker', not 'containerd': runtime: docker kubernetes: enabled: false version: v1.24.3+k3s1 k3sArgs: [] network: address: true dns: [] dnsHosts: host.docker.internal: host.lima.internal # Added: # - containerd-snapshotter: true (meaning containerd will be used for pulling images) docker: features: buildkit: true containerd-snapshotter: true vmType: vz rosetta: true mountType: virtiofs mountInotify: false cpuType: host # This provisioning script installs build dependencies, WasmEdge and builds the WASM runtime shims for containerd. # NOTE: this takes a LOOONG time! provision: - mode: system script: | [ -f /etc/docker/daemon.json ] && echo "Already provisioned!" && exit 0 echo "Installing system updates:" apt-get update -y apt-get upgrade -y echo "Installing WasmEdge and runwasi build dependencies:" # NOTE: packages curl, git and python3 already installed: apt-get install -y make gcc build-essential pkgconf libtool libsystemd-dev libprotobuf-c-dev libcap-dev libseccomp-dev libyajl-dev libgcrypt20-dev go-md2man autoconf automake criu pkg-config libdbus-glib-1-dev libelf-dev libclang-dev libzstd-dev protobuf-compiler apt-get clean -y - mode: user script: | [ -f /etc/docker/daemon.json ] && echo "Already provisioned!" && exit 0 # # Setting vars for this script: # # Which WASM runtimes to install (wasmedge, wasmtime and wasmer are supported): WASM_RUNTIMES="wasmedge wasmtime wasmer" # # Location of the containerd config file: CONTAINERD_CONFIG="/etc/containerd/config.toml" # # Target location for the WASM runtimes and containerd shims ($TARGET/bin and $TARGET/lib): TARGET="/usr/local" # # Install rustup: # echo "Installing rustup for building runwasi:" curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh -s -- --default-toolchain none -y source "$HOME/.cargo/env" # # Install selected WASM runtimes and containerd shims: # [[ -z "${WASM_RUNTIMES// /}" ]] && echo "No WASM runtimes selected - exiting!" && exit 0 git clone https://github.com/containerd/runwasi echo "Installing WASM runtimes and building containerd shims: ${WASM_RUNTIMES}:" sudo mkdir -p /etc/containerd/ containerd config default | sudo tee $CONTAINERD_CONFIG >/dev/null for runtimeName in $WASM_RUNTIMES; do case $runtimeName in wasmedge) echo "Installing WasmEdge:" curl -sSfL https://raw.githubusercontent.com/WasmEdge/WasmEdge/master/utils/install.sh | sudo bash -s -- -p $TARGET echo echo "`wasmedge -v` installed!" ;; wasmtime) echo "Installing wasmtime:" curl -sSfL https://wasmtime.dev/install.sh | bash sudo cp .wasmtime/bin/* ${TARGET}/bin/ rm -rf .wasmtime echo "`wasmtime -V` installed!" ;; wasmer) echo "Installing wasmer:" curl -sSfL https://get.wasmer.io | sh sudo cp .wasmer/bin/* ${TARGET}/bin/ sudo cp .wasmer/lib/* ${TARGET}/lib/ rm -rf .wasmer echo "`wasmer -V` installed!" ;; *) echo "ERROR: WASM runtime $runtimeName is not supported!" exit 1 ;; esac cd runwasi echo "Building containerd-shim-${runtimeName}:" cargo build -p containerd-shim-${runtimeName} --release echo "Installing containerd-shim-${runtimeName}-v1:" sudo install ./target/release/containerd-shim-${runtimeName}-v1 ${TARGET}/bin sudo ln -sf ${TARGET}/bin/containerd-shim-${runtimeName}-v1 ${TARGET}/bin/containerd-shim-${runtimeName}d-v1 sudo ln -sf ${TARGET}/bin/containerd-shim-${runtimeName}-v1 ${TARGET}/bin/containerd-${runtimeName}d echo "containerd-shim-${runtimeName} installed." cd .. echo "[plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.${runtimeName}]" | sudo tee -a $CONTAINERD_CONFIG >/dev/null echo " runtime_type = \"io.containerd.${runtimeName}.v1\"" | sudo tee -a $CONTAINERD_CONFIG >/dev/null done echo "containerd WASM runtimes and shims installed." # # Restart the systemctl services to pick up the installed shims. # NOTE: We need to 'stop' docker because at this point the actual daemon.json config is not yet provisioned: # echo "Restarting/reloading docker/containerd services:" sudo systemctl daemon-reload sudo systemctl restart containerd sudo systemctl stop docker sshConfig: true mounts: [] env: {}

  • usernetes

    Kubernetes without the root privileges

  • Project mention: Show HN: Usernetes: Rootless Kubernetes (Generation 2) | news.ycombinator.com | 2023-09-05
  • spegel

    Stateless cluster local OCI registry mirror.

  • Project mention: BTFS (BitTorrent Filesystem) | news.ycombinator.com | 2024-04-15
  • kubefire

    KubeFire 🔥, creates and manages Kubernetes Clusters using Firecracker microVMs

  • Project mention: KubeFire: Create and Manage Kubernetes Clusters Using Firecracker MicroVMs | news.ycombinator.com | 2023-12-20
  • nix-snapshotter

    Brings native understanding of Nix packages to containerd

  • Project mention: Tvix – A New Implementation of Nix | news.ycombinator.com | 2024-04-16

    Not super recent, but nix-snapshotter is one that I'd call awesome(but I'm also a k8s fanboi): https://github.com/pdtpartners/nix-snapshotter

    https://news.ycombinator.com/item?id=37407758

  • libvirt-k8s-provisioner

    Automate your k8s installation

  • containerd-wasm-shims

    containerd shims for running WebAssembly workloads in Kubernetes

  • WSL-Guide

    Windows Subsystem for Linux (WSL) Guide. Use WSL develop to with Kubernetes and in the Cloud (Microsoft Azure, AWS, and Google Cloud).

  • vHive

    vHive: Open-source framework for serverless experimentation

  • ansible-podman-collections

    Repository for Ansible content that can include playbooks, roles, modules, and plugins for use with the Podman tool

  • nomad-driver-containerd

    Nomad task driver for launching containers using containerd.

  • SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
NOTE: The open source projects on this list are ordered by number of github stars. The number of mentions indicates repo mentiontions in the last 12 Months or since we started tracking (Dec 2020). The latest post mention was on 2024-04-16.

Containerd related posts

Index

What are some of the best open-source Containerd projects? This list will help you:

Project Stars
1 colima 16,655
2 containerd 16,259
3 lima 13,910
4 nerdctl 7,356
5 talos 5,266
6 faasd 2,845
7 firecracker-containerd 2,038
8 veinmind-tools 1,466
9 kuasar 1,170
10 cdebug 1,086
11 nydus 1,081
12 stargz-snapshotter 1,034
13 runwasi 968
14 usernetes 838
15 spegel 778
16 kubefire 468
17 nix-snapshotter 462
18 libvirt-k8s-provisioner 405
19 containerd-wasm-shims 287
20 WSL-Guide 254
21 vHive 252
22 ansible-podman-collections 241
23 nomad-driver-containerd 203
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com