OS-level virtualization is an
operating system (OS) paradigm in which the
kernel allows the existence of multiple isolated
user space instances, called ''containers'' (
LXC
Linux Containers (LXC) is an operating-system-level virtualization method for running multiple isolated Linux systems (containers) on a control host using a single Linux kernel.
The Linux kernel provides the cgroups functionality that allows l ...
,
Solaris containers,
Docker,
Podman), ''zones'' (
Solaris containers), ''virtual private servers'' (
OpenVZ), ''partitions'', ''virtual environments'' (VEs), ''virtual kernels'' (
DragonFly BSD), or ''jails'' (
FreeBSD jail or
chroot jail
A chroot on Unix and Unix-like operating systems is an operation that changes the apparent root directory for the current running process and its children. A program that is run in such a modified environment cannot name (and therefore normally ...
). Such instances may look like real computers from the point of view of programs running in them. A computer program running on an ordinary operating system can see all resources (connected devices, files and folders,
network shares, CPU power, quantifiable hardware capabilities) of that computer. However, programs running inside of a container can only see the container's contents and devices assigned to the container.
On
Unix-like operating systems, this feature can be seen as an advanced implementation of the standard
chroot mechanism, which changes the apparent root folder for the current running process and its children. In addition to isolation mechanisms, the kernel often provides
resource-management features to limit the impact of one container's activities on other containers. Linux containers are all based on the virtualization, isolation, and resource management mechanisms provided by the
Linux kernel
The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel. It was originally authored in 1991 by Linus Torvalds for his i386-based PC, and it was soon adopted as the kernel for the GNU ope ...
, notably
Linux namespaces and
cgroups.
The term ''container'', while most popularly referring to OS-level virtualization systems, is sometimes ambiguously used to refer to fuller
virtual machine environments operating in varying degrees of concert with the host OS, e.g.
Microsoft's ''
Hyper-V containers''.
Operation
On ordinary operating systems for personal computers, a computer program can see (even though it might not be able to access) all the system's resources. They include:
# Hardware capabilities that can be employed, such as the
CPU
A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program. The CPU performs basic arithmetic, logic, controlling, and ...
and the network connection
# Data that can be read or written, such as files, folders and
network shares
# Connected
peripherals it can interact with, such as
webcam, printer, scanner, or fax
The operating system may be able to allow or deny access to such resources based on which program requests them and the
user account in the context of which it runs. The operating system may also hide those resources, so that when the computer program enumerates them, they do not appear in the enumeration results. Nevertheless, from a programming point of view, the computer program has interacted with those resources and the operating system has managed an act of interaction.
With operating-system-virtualization, or containerization, it is possible to run programs within containers, to which only parts of these resources are allocated. A program expecting to see the whole computer, once run inside a container, can only see the allocated resources and believes them to be all that is available. Several containers can be created on each operating system, to each of which a subset of the computer's resources is allocated. Each container may contain any number of computer programs. These programs may run concurrently or separately, and may even interact with one another.
Containerization has similarities to
application virtualization: In the latter, only one computer program is placed in an isolated container and the isolation applies to file system only.
Uses
Operating-system-level virtualization is commonly used in
virtual hosting environments, where it is useful for securely allocating finite hardware resources among a large number of mutually-distrusting users. System administrators may also use it for consolidating server hardware by moving services on separate hosts into containers on the one server.
Other typical scenarios include separating several programs to separate containers for improved security, hardware independence, and added resource management features. The improved security provided by the use of a chroot mechanism, however, is nowhere near ironclad. Operating-system-level virtualization implementations capable of
live migration can also be used for dynamic load balancing of containers between nodes in a cluster.
Overhead
Operating-system-level virtualization usually imposes less overhead than
full virtualization because programs in OS-level virtual partitions use the operating system's normal
system call interface and do not need to be subjected to
emulation or be run in an intermediate
virtual machine, as is the case with full virtualization (such as
VMware ESXi,
QEMU, or
Hyper-V) and
paravirtualization (such as
Xen
Xen (pronounced ) is a type-1 hypervisor, providing services that allow multiple computer operating systems to execute on the same computer hardware concurrently. It was
originally developed by the University of Cambridge Computer Laboratory an ...
or
User-mode Linux). This form of virtualization also does not require hardware support for efficient performance.
Flexibility
Operating-system-level virtualization is not as flexible as other virtualization approaches since it cannot host a guest operating system different from the host one, or a different guest kernel. For example, with
Linux, different distributions are fine, but other operating systems such as Windows cannot be hosted. Operating systems using variable input systematics are subject to limitations within the virtualized architecture. Adaptation methods including cloud-server relay analytics maintain the OS-level virtual environment within these applications.
Solaris partially overcomes the limitation described above with its
branded zones feature, which provides the ability to run an environment within a container that emulates an older
Solaris 8
Solaris is a proprietary Unix operating system originally developed by Sun Microsystems. After the Sun acquisition by Oracle in 2010, it was renamed Oracle Solaris.
Solaris superseded the company's earlier SunOS in 1993, and became known for it ...
or 9 version in a Solaris 10 host. Linux branded zones (referred to as "lx" branded zones) are also available on
x86-based Solaris systems, providing a complete Linux
userspace and support for the execution of Linux applications; additionally, Solaris provides utilities needed to install
Red Hat Enterprise Linux 3.x or
CentOS
CentOS (, from Community Enterprise Operating System; also known as CentOS Linux) is a Linux distribution that provides a free and open-source community-supported computing platform, functionally compatible with its upstream source, Red Hat En ...
3.x
Linux distributions inside "lx" zones. However, in 2010 Linux branded zones were removed from Solaris; in 2014 they were reintroduced in
Illumos, which is the open source Solaris fork, supporting 32-bit
Linux kernel
The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel. It was originally authored in 1991 by Linus Torvalds for his i386-based PC, and it was soon adopted as the kernel for the GNU ope ...
s.
Storage
Some implementations provide file-level
copy-on-write (CoW) mechanisms. (Most commonly, a standard file system is shared between partitions, and those partitions that change the files automatically create their own copies.) This is easier to back up, more space-efficient and simpler to cache than the block-level copy-on-write schemes common on whole-system virtualizers. Whole-system virtualizers, however, can work with non-native file systems and create and roll back snapshots of the entire system state.
Implementations
Linux containers not listed above include:
*
LXD, an alternative wrapper around
LXC
Linux Containers (LXC) is an operating-system-level virtualization method for running multiple isolated Linux systems (containers) on a control host using a single Linux kernel.
The Linux kernel provides the cgroups functionality that allows l ...
developed by
Canonical
*Podman, a drop-in replacement for Docker
*
Charliecloud, a set of container tools used on HPC systems
*
Kata Containers
''Kata'' is a Japanese word ( 型 or 形) meaning "form". It refers to a detailed choreographed pattern of martial arts movements made to be practised alone. It can also be reviewed within groups and in unison when training. It is practised ...
MicroVM Platform
* Bottlerocket is a Linux-based open-source operating system that is purpose-built by
Amazon Web Services for running containers on virtual machines or bare metal hosts
*
CBL-Mariner is an open-source Linux distribution that is purpose-built by Microsoft Azure and similar to Fedora CoreOS
See also
*
Container orchestration
*
Linux namespaces
*
Linux cgroups
*
Sandbox (software development)
*
Container Linux
*
Hypervisor
*
Portable application creators
*
Open Container Initiative
The Open Container Initiative (OCI) is a Linux Foundation project, started in June 2015 by Docker, to design open standards for operating-system-level virtualization (software containers), most importantly Linux containers
OS-level virtualizat ...
*
Separation kernel
A separation kernel is a type of security kernel used to simulate a distributed environment. The concept was introduced by John Rushby in a 1981 paper.John Rushby, "The Design and Verification of Secure Systems," Eighth ACM Symposium on Operatin ...
*
Serverless computing
Serverless computing is a cloud computing execution model in which the cloud provider allocates machine resources on demand, taking care of the servers on behalf of their customers. "Serverless" is a misnomer in the sense that servers are still ...
*
Snap package manager
*
Storage hypervisor
Software-defined storage (SDS) is a marketing term for computer data storage software for policy-based provisioning and management of data storage independent of the underlying hardware. Software-defined storage typically includes a form of storag ...
*
Virtual private server (VPS)
*
Virtual resource partitioning
Virtual resource partitioning (VRP) is an operating system-level virtualization technology that allocates computing resources (such as CPU & I/O) to transactions. Conventional virtualization technologies allocate resources on an operating system ...
Notes
References
External links
An introduction to VirtualizationA short intro to three different virtualization techniquesVirtualization and Containerization of Application Infrastructure: A Comparison June 22, 2015, by Mathijs Jeroen Scheepers
Containers and persistent data LWN.net, May 28, 2015, by Josh Berkus
{{DEFAULTSORT:Operating-system-level virtualization
Virtualization
Operating system technology
Operating system security
Linux containerization
Linux
Linux kernel features