这是indexloc提供的服务,不要输入任何密码
Skip to content

bodnar-dev/ignite

 
 

Repository files navigation

Weave Ignite

Ignite is a Firecracker microVM administration tool, like Docker manages runC containers. It builds VM images from OCI images, spin VMs up/down in lightning speed, and manages multiple VMs efficiently.

The idea is that Ignite makes Firecracker VMs look like Docker containers. So we can deploy and manage full-blown VM systems just like e.g. Kubernetes workloads. The images used are Docker images, but instead of running them in a container, the root filesystem of the image executes as a real VM with a dedicated kernel and /sbin/init as PID 1.

Networking is set up automatically, the VM gets the same IP as any docker container on the host would.

And Firecracker is fast! Building and starting VMs takes just some fraction of a second, or at most some seconds. With Ignite you can get started with Firecracker in no time!

Use-cases

With Ignite, Firecracker is now much more accessible for end users, which means the ecosystem can achieve the next level of momentum due to the easy onboarding path thanks to a docker-like UX.

Although Firecracker was designed with serverless workloads in mind, it can equally well boot a normal Linux OS, like Ubuntu, Debian or CentOS, running an init system like systemd.

Having a super-fast way of spinning up a new VM, with a kernel of choice, running an init system like systemd allows to run system-level applications like the kubelet, which needs to “own” the full system.

This allows for:

  • Legacy applications which cannot be containerized (e.g. they need a specific kernel)
    • Alternative, a very new type of application requiring e.g. a custom kernel
  • Reproducible, fast testing of system-wide programs (like Weave Net)
  • Super fast Kubernetes Cluster Lifecycle with multiple machines (without docker hacks)
  • A k8s-managed private VM cloud, on which a layer of k8s container clusters may run
  • No need to run containers in VMs to combine container UX with VM security and isolation, Ignite combines both!

Scope

If you want to run applications in containers with added Firecracker isolation, use firecracker-containerd. Or a similar solution like Kata Containers or gVisor, that are complementary to firecracker-containerd.

Firecracker Ignite, however, is operating at another layer. Ignite isn’t concerned with containers as the primary unit, but whole yet lightweight VMs that integrate with the container landscape.

How to use

Before starting, you might want to read about the dependencies and non-goals of Ignite in docs/REQUIREMENTS.md.

WARNING: In it's v0.X series, Ignite is in alpha, which means that it might change in backwards-incompatible ways.

asciicast

Note: At the moment ignite needs root privileges on the host to operate, for certain specific operations (e.g. mount). This will change in the future.

# Let's run the weaveworks/ignite-ubuntu docker image as a VM
# Use 2 vCPUs and 1GB of RAM, enable automatic SSH access and name it my-vm
ignite run weaveworks/ignite-ubuntu \
    --cpus 2 \
    --memory 1024 \
    --ssh \
    --name my-vm

# List running VMs
ignite ps

# List Docker (OCI) and kernel images imported into Ignite
ignite images
ignite kernels

# Get the boot logs of the VM
ignite logs my-vm

# SSH into the VM
ignite ssh my-vm

# Inside the VM you can check that the kernel version is different, and the IP address came from the Docker bridge
# Also the memory is limited to what you specify, as well as the vCPUs
> uname -a
> ip addr
> free -m
> cat /proc/cpuinfo

# Rebooting the VM tells Firecracker to shut it down
> reboot

# Cleanup
ignite rm my-vm

CLI documentation

See the CLI Reference.

Architecture

docs/architecture.png

Base images and kernels

A base image is an OCI-compliant image containing some operating system (e.g. Ubuntu). You can follow normal docker build patterns for customizing your VM's rootfs.

A kernel binary is today expected to be inside of the rootfs, at /boot/vmlinux (may be a symlink). It is also recommended to put supported kernel modules in /lib/modules if you need that. Today we couple the kernel and the base image, this will however change in future releases so you can mix and match kernel and base image OCI-images at ignite run-time.

As the upstream centos:7 and ubuntu:18.04 images from Docker Hub doesn't have all the utilities and packages you'd expect in a VM (e.g. an init system), we have packaged some reference base images and a sample kernel image to get started quickly.

These prebuilt images can be given to ignite run directly.

Contributing

Please see CONTRIBUTING.md and our Code Of Conduct.

Other interesting resources include:

Getting Help

If you have any questions about, feedback for or problems with ignite:

Your feedback is always welcome!

Maintainers

License

Apache 2.0

About

Ignite a Firecracker microVM

Resources

License

Code of conduct

Contributing

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go 93.5%
  • Shell 3.2%
  • Makefile 2.1%
  • Other 1.2%