[フレーム]
BT

InfoQ Software Architects' Newsletter

A monthly overview of things you need to know as an architect or aspiring architect.

View an example

We protect your privacy.

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Unlock the full InfoQ experience

Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources.

Log In
or

Don't have an InfoQ account?

Register
  • Stay updated on topics and peers that matter to youReceive instant alerts on the latest insights and trends.
  • Quickly access free resources for continuous learningMinibooks, videos with transcripts, and training materials.
  • Save articles and read at anytimeBookmark articles to read whenever youre ready.

Topics

Choose your language

InfoQ Homepage News Microsoft Adds Support for Pod Sandboxing to Azure Kubernetes Service

Microsoft Adds Support for Pod Sandboxing to Azure Kubernetes Service

Mar 20, 2023 2 min read

Write for InfoQ

Feed your curiosity. Help 550k+ global
senior developers
each month stay ahead.
Get in touch

Microsoft has released, in preview, support for pod sandboxing in the Azure Kubernetes Service (AKS). Available within all Azure regions for a subset of Azure VM sizes, pod sandboxing provides an isolation boundary between the container application and the shared kernel and compute resources of the container host.

Pod sandboxing leverages Kata Containers to provide hypervisor-based isolation per pod. Kata Containers is an open-source virtual machine that operates as a container. It is designed to provide enhanced workload isolation using hardware virtualization technologies. As Kata Containers is compliant with the Open Container Initiative (OCI), the containers work with frameworks such as Docker and Kubernetes.

Kata Containers' approach to isolation compared with traditional containers

Kata Containers' approach to isolation compared with traditional containers (credit: Kata Containers)

In response to Howard van Rooijen asking if this is "the first true 'Hard Multitenancy' implementation on Azure", Michael Withrow, senior product manager at Microsoft, replied that they are:

Getting closer to multitenancy, but this is really about kernel isolation to prevent attacks from a shared kernel perspective. There are other things in play down the road which will make multi-tenancy more of a reality.

Kata Containers on AKS run on an Azure hypervisor using Mariner AKS Container Host (MACH). Each Kata pod receives its own kernel per nested Kata guest VM. With this approach, many Kata containers can be stacked within a single guest VM with additional containers running in the parent VM.

The Mariner AKS Container Host was released in preview in the fall of 2022. Mariner is Microsoft's internal Linux distribution that is optimized to run on Azure. The Mariner image is designed to be minimal and does not include graphical components or Windows managers.

The workflow to deploy using Pod Sandboxing is similar to the traditional containerd workflow with a few exceptions. The runtimeClassName kata-mshv-vm-isolation should be added to the pod spec. This will create a VM to serve as the pod sandbox to host the container. By default, this VM has 2 GB of default memory and one CPU core. This can be adjusted via the Container resource manifest.

The following command will deploy a cluster named myAKSCluster with one node in the myResourceGroup:

az aks create --name myAKSCluster --resource-group myResourceGroup --os-sku mariner --workload-runtime KataMshvVmIsolation --node-vm-size Standard_D4s_v3 --node-count 1

The flag --workload-runtime should be set to KataMshvVmIsolation to enable the Pod Sandboxing feature. Only Mariner is supported at the moment, so the flag --os-sku should be set to mariner. The flag --node-vm-size can be set to any Azure VM size that is a generation 2 VM and supports nested virtualization.

The preview release has a number of constraints. This includes a lack of support for Microsoft Defender and Container Insights. In addition, there is no support for Container Storage Interface drivers and the Secrets Store CSI driver in the preview release.

Pod Sandboxing is available as a preview release. Withrow notes that although this feature enables hosting mixed workloads within a single tenant AKS, best practices for multitenancy should still be reviewed and followed.

About the Author

Matt Campbell

Show moreShow less

Rate this Article

Adoption
Style

This content is in the DevOps topic

Related Topics:

Related Content

The InfoQ Newsletter

A round-up of last week’s content on InfoQ sent out every Tuesday. Join a community of over 250,000 senior developers. View an example

We protect your privacy.

BT

AltStyle によって変換されたページ (->オリジナル) /