What are Red Hat OpenShift sandboxed containers?
Red Hat OpenShift sandboxed containers, based on the Kata Containers open source project, provide an Open Container Initiative (OCI)-compliant container runtime using lightweight virtual machines (VMs) running your workloads in their own isolated kernel. This contributes an additional layer of isolation to Red Hat’s defense-in-depth strategy.
Features & benefits
Isolated developer environments and privileges scoping
Legacy containerized workload isolation
Multi-tenancy and resource sharing (CI/CD jobs, CNFs, etc.)
Additional isolation with native Kubernetes user experience
Related blog series
The peer-pods solution extends OpenShift sandboxed containers (OSC) to run on any environment without requiring bare-metal servers or nested virtualization support (yep, it’s magic). It does this by extending Kata containers runtime (which OSC is built on) to handle VM lifecycle management using cloud provider APIs (AWS, Azure, etc...) or third-party hypervisors APIs (such as VMware vSphere).
LIST of BLOGS
August 9, 2021 - Adel Zaalouk
Are you a developer, cluster administrator or service provider? OpenShift sandboxed containers provides value on multiple fronts for different personas and use-cases. This post provides examples of where you can…read full post
August 13, 2021 - Snir Sheriber, Ariel Adam
Ready for your 101 course on how to play with sandboxed workloads? This hands-on blog will take the reader on a journey to run sandboxed workloads using Kata containers in…read full post
August 4, 2021 - Jens Freimann, Pradipta Kumar
This post provides a high-level overview of the OpenShift sandboxed containers operator, which is available as a tech-preview in OpenShift 4.8. Using the operator, a cluster administrator will be able…read full post
September 22, 2021 - Jens Freimann, Pradipta Kumar
We’re diving deeper into the internals of what the OpenShift sandboxed containers operator does going bottom-up. This post takes you behind the scenes for performing the installation and maintenance of…read full post
September 2, 2021 - Jens Freimann, Pradipta Kumar
In this post, we want to show what you can do when things go wrong. An OpenShift cluster is a complex system, and many pieces need to work together. Sometimes…read full post
November 16, 2021 - Robert Krawitz
Curious about the performance of sandboxed containers versus containers running in the node's native Linux context? This post focuses on networking performance with sandboxed pods compared with that of conventional…read full post
May 3, 2022 - Bharath N R, Pradipta Banerjee
OpenShift Pipelines based on Tekton provides a Kubernetes-native CI/CD framework to design and run your pipelines. You do not need a separate CI/CD server to manage or maintain.... A typical CI/CD pipeline is a...read full post
June 2, 2022 - Pradipta Banerjee, Jens Freimann
Performing container builds in isolated environments is one step towards defending against this threat while at the same time providing flexibility to the developers.... With OpenShift sandboxed containers, you can safely install software that needs privileged access without affecting the container host or the other containers...read full post
April 5, 2023 - Pradipta Banerjee, Jens Freimann, Ariel Adam
When debugging or tracing running workloads in Red Hat OpenShift deployments, there will frequently be a need to run the workloads with elevated privileges. This is not possible or desirable in production deployments, however, due to the risks to the cluster and other running workloads. This article demonstrates how you can leverage an OpenShift route-based deployment strategy in combination with OpenShift sandboxed containers to run such workloads with elevated privileges while ensuring the safety of the OpenShift cluster and other running workloads. Read full post
In this OpenShift Commons Briefing, Adel Zaalouk, Product Manager of OpenShift & Hybrid Platforms, introduces OpenShift sandboxed containers and gives an overview of the product and technology along with its features.
Demo showing isolating OpenShift pipeline runs using OpenShift sandboxed containers.
In this video, we show how to install the OpenShift sandboxed containers operator on top of the OpenShift Containers Platform.
Running Jenkins or similar workloads inside sandboxed containers on the OpenShift Containers Platform is quite easy. All it takes is adding a runtime class name to your workload manifest file.
In this video we'll present how to increase logs level of the different Openshift Sandboxed Containers to "debug", then, the enhanced logging can be viewed in the node's journal or to be collected by the must-gather tool.
In this video, we show how to access the OpenShift Sandboxed Containers metrics, and give an overview of the available information that they provide.
In this video, we present a use case for running CI workloads requiring elevated privileges. This is done by using the OpenShift sandboxed containers to ensure all privileged workloads the user can create are isolated and are safe to run.