- nydus: upgrad to v2.2.0 - osbuilder: Add support for CBL-Mariner - kata-deploy: Fix bash semantics error - make only_kata work without -f - runtime-rs: ch: Implement confidential guest handling - qemu/arm64: disable image nvdimm once no firmware offered - static checks workflow improvements - A couple of kata-deploy fixes - agent: Bring in VFIO-AP device handling again - bugfix: set hostname in CreateSandboxRequest - packaging / kata-deploy builds: Add the ability to cache and consume cached components - versions: Update firecracker version - dependency: update cgroups-rs - Built-in Sandbox: add more unit tests for dragonball. Part 6 - runtime: add support for Hyper-V - runtime-rs: update load_config comment - Add support for ephemeral mounts to occupy entire sandbox's memory - runtime-rs: fix default kernel location and add more default config paths - Implement direct-volume commands handler for shim-mgmt - bugfix: modify tty_win info in runtime when handling ResizePtyRequest - bugfix: add get_ns_path API for Hypervisor - runtime-rs: add the missing default trait - packaging: Simplify get_last_modification() - utils: Make kata-manager.sh runs checks - dragonball: support pmu on aarch64 - docs: fix typo in key filename in AWS installation guide - backport rustjail systemd cgroup fix #6331 to 3.1 - main | kata-deploy: Fix kata deploy arm64 image build error - workflows: Yet more fixes for publishing the kata-deploy payload after every PR merged - rustjail: fix cgroup handling in agent-init mode - runtime/Makefile: Fix install-containerd-shim-v2 dependency - fix wrong notes for func GetSandboxesStoragePathRust() - fix(runtime-rs): add exited state to ensure cleanup - runtime-rs: add oci hook support - utils: Remove kata-manager.sh cgroups v2 check - workflows: Fixes for the `payload-after-push` action - Dragonball: update dependencies - workflows: Do not install docker - workflows: Publish kata-deploy payload after a merge - src: Fixed typo mod.rs - actions: Use `git-diff` to get changes in kernel dir - agent: don't set permission of existing directory in copy_file - runtime: use filepath.Clean() to clean the mount path - Upgrade to Cloud Hypervisor v30.0 - feat(runtime): make static resource management consistent with 2.0 - osbuilder: Include minimal set of device nodes in ubuntu initrd - kata-ctl/exec: add new command exec to enter guest VM. - kernel: Add CONFIG_SEV_GUEST to SEV kernel config - runtime-rs: Improve Cloud Hypervisor config handling - virtiofsd: update to a valid path on ppc64le - runtime-rs: cleanup kata host share path - osbuilder: fix default build target in makefile - devguide: Add link to the contribution guidelines - kata-deploy: Ensure go binaries can run on Ubuntu 20.04 - dragonball: config_manager: preserve device when update - Revert "workflows: Push the builder image to quay.io" - Remove all remaining unsafe impl - kata-deploy: Fix building the kata static firecracker arm64 package occurred an error - shim-v2: Bump Ubuntu container image to 22.04 - packaging: Cache the container used to build the kata-deploy artefacts - utils: always check some dependencies. - versions: Use ubuntu as the default distro for the rootfs-image - github-action: Replace deprecated command with environment file - docs: Change the order of release step - runtime-rs: remove unnecessary Send/Sync trait implement - runtime-rs: Don't build on Power, don't break on Power. - runtime-rs: handle sys_dir bind volume - sandbox: set the dns for the sandbox - packaging/shim-v2: Only change the config if the file exists - runtime-rs: Add basic CH implementation - release: Revert kata-deploy changes after 3.1.0-rc0 release |
||
---|---|---|
.github | ||
ci | ||
docs | ||
snap | ||
src | ||
tools | ||
utils | ||
.gitignore | ||
CODE_OF_CONDUCT.md | ||
CODEOWNERS | ||
CONTRIBUTING.md | ||
deny.toml | ||
Glossary.md | ||
LICENSE | ||
Makefile | ||
README.md | ||
utils.mk | ||
VERSION | ||
versions.yaml |

Kata Containers
Welcome to Kata Containers!
This repository is the home of the Kata Containers code for the 2.0 and newer releases.
If you want to learn about Kata Containers, visit the main Kata Containers website.
Introduction
Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs.
License
The code is licensed under the Apache 2.0 license. See the license file for further details.
Platform support
Kata Containers currently runs on 64-bit systems supporting the following technologies:
Architecture | Virtualization technology |
---|---|
x86_64 , amd64 |
Intel VT-x, AMD SVM |
aarch64 ("arm64 ") |
ARM Hyp |
ppc64le |
IBM Power |
s390x |
IBM Z & LinuxONE SIE |
Hardware requirements
The Kata Containers runtime provides a command to determine if your host system is capable of running and creating a Kata Container:
$ kata-runtime check
Notes:
This command runs a number of checks including connecting to the network to determine if a newer release of Kata Containers is available on GitHub. If you do not wish this to check to run, add the
--no-network-checks
option.By default, only a brief success / failure message is printed. If more details are needed, the
--verbose
flag can be used to display the list of all the checks performed.If the command is run as the
root
user additional checks are run (including checking if another incompatible hypervisor is running). When running asroot
, network checks are automatically disabled.
Getting started
See the installation documentation.
Documentation
See the official documentation including:
Configuration
Kata Containers uses a single configuration file which contains a number of sections for various parts of the Kata Containers system including the runtime, the agent and the hypervisor.
Hypervisors
See the hypervisors document and the Hypervisor specific configuration details.
Community
To learn more about the project, its community and governance, see the community repository. This is the first place to go if you wish to contribute to the project.
Getting help
See the community section for ways to contact us.
Raising issues
Please raise an issue in this repository.
Note: If you are reporting a security issue, please follow the vulnerability reporting process
Developers
See the developer guide.
Components
Main components
The table below lists the core parts of the project:
Component | Type | Description |
---|---|---|
runtime | core | Main component run by a container manager and providing a containerd shimv2 runtime implementation. |
runtime-rs | core | The Rust version runtime. |
agent | core | Management process running inside the virtual machine / POD that sets up the container environment. |
dragonball |
core | An optional built-in VMM brings out-of-the-box Kata Containers experience with optimizations on container workloads |
documentation | documentation | Documentation common to all components (such as design and install documentation). |
tests | tests | Excludes unit tests which live with the main code. |
Additional components
The table below lists the remaining parts of the project:
Component | Type | Description |
---|---|---|
packaging | infrastructure | Scripts and metadata for producing packaged binaries (components, hypervisors, kernel and rootfs). |
kernel | kernel | Linux kernel used by the hypervisor to boot the guest image. Patches are stored here. |
osbuilder | infrastructure | Tool to create "mini O/S" rootfs and initrd images and kernel for the hypervisor. |
agent-ctl |
utility | Tool that provides low-level access for testing the agent. |
kata-ctl |
utility | Tool that provides advanced commands and debug facilities. |
trace-forwarder |
utility | Agent tracing helper. |
runk |
utility | Standard OCI container runtime based on the agent. |
ci |
CI | Continuous Integration configuration files and scripts. |
katacontainers.io |
Source for the katacontainers.io site. |
Packaging and releases
Kata Containers is now available natively for most distributions. However, packaging scripts and metadata are still used to generate snap and GitHub releases. See the components section for further details.
Glossary of Terms
See the glossary of terms related to Kata Containers.