Skip to content
This repository was archived by the owner on Aug 7, 2025. It is now read-only.

Commit 566d8fc

Browse files
ctalledorodnymolina
authored andcommitted
Updated user-guide to highlight sysbox-ee features.
1 parent ef88793 commit 566d8fc

File tree

16 files changed

+84
-299
lines changed

16 files changed

+84
-299
lines changed

docs/quickstart/kind.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ There are currently two ways you can deploy the cluster:
3030

3131
The sections below show examples of this.
3232

33-
#### -------- Sysbox-EE Feature Highlight --------
33+
#### **-------- Sysbox-EE Feature Highlight --------**
3434

3535
Sysbox-EE contains optimizations that enable deployment of K8s-in-Docker very efficiently.
3636

@@ -41,7 +41,7 @@ The sections below show examples of this.
4141
| Host storage overhead | 10 GB | 1 GB |
4242
| Cluster creation time | 2 min | 2 min |
4343

44-
#### ----------------------------------------------------------
44+
#### **----------------------------------------------------------**
4545

4646
## Using Docker to Deploy a K8s Cluster
4747

@@ -270,12 +270,12 @@ $ docker exec k8s-master cat /proc/self/uid_map
270270
This means that the root user in the container is mapped to unprivileged host
271271
user-ID 165536.
272272

273-
#### -------- Sysbox-EE Feature Highlight --------
273+
#### **-------- Sysbox-EE Feature Highlight --------**
274274

275275
Sysbox-EE assigns each container an exclusive range of Linux user-namespace user-ID mappings
276276
in order to improve cross-container isolation.
277277

278-
#### ----------------------------------------------------------
278+
#### **----------------------------------------------------------**
279279

280280
11) After you are done, bring down the cluster:
281281

docs/quickstart/security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ the user and cgroup namespaces. It has no namespaces in common with
6262
the host, which gives it stronger isolation compared to regular Docker
6363
containers.
6464

65-
#### -------- Sysbox-EE Feature Highlight --------
65+
#### **-------- Sysbox-EE Feature Highlight --------**
6666

6767
In addition, Sysbox-EE assigns each system container exclusive
6868
user-ID and group-ID mappings for each system container. This further
@@ -99,7 +99,7 @@ this new system container. This provides isolation from the host as
9999
well as from other system containers. More info on this can be found
100100
in the [Sysbox User Guide](../user-guide/security.md#user-namespace-id-mapping).
101101

102-
#### ----------------------------------------------------------
102+
#### **----------------------------------------------------------**
103103

104104
Now, let's check the capabilities of a process created by the root user inside
105105
the system container:

docs/user-guide/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
# Sysbox User Guide
1+
# Sysbox-EE User Guide
22

3-
This document describes Sysbox's features, usage, configuration, and
3+
This document describes Sysbox-EE's features, usage, configuration, and
44
limitations.
55

66
This document complements the [Sysbox Quick Start Guide](../quickstart/README.md).

docs/user-guide/concepts.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Sysbox User Guide: Concepts & Terminology
1+
# Sysbox-EE User Guide: Concepts & Terminology
22

33
These document describes concepts and terminology used by the Sysbox container
44
runtime. We use these throughout our documents.
@@ -27,11 +27,10 @@ the container runtime is typically a container manager
2727

2828
## Container Manager
2929

30-
The container manager manages the container's lifecycle, from image
31-
transfer and storage to container execution (by interacting with the container
32-
runtime).
30+
The container manager manages the container's lifecycle, from image transfer and
31+
storage to container execution (by interacting with the container runtime).
3332

34-
Examples are Docker, containerd, cri-o, etc.
33+
Examples are Docker, containerd, etc.
3534

3635
The [OCI runtime spec](https://github.com/opencontainers/runtime-spec) describes
3736
the interface between the container manager and the container

docs/user-guide/configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Sysbox User Guide: Configuration
1+
# Sysbox-EE User Guide: Configuration
22

33
This document describes Sysbox configuration.
44

docs/user-guide/deploy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Sysbox User Guide: Container Deployment
1+
# Sysbox-EE User Guide: Container Deployment
22

33
## Contents
44

@@ -89,7 +89,7 @@ A couple of tips:
8989

9090
### Using Other Container Managers
9191

92-
We officially only support the above methods to run Sysbox.
92+
We currently only support the above methods to run Sysbox.
9393

9494
However, we plan to add support for other OCI-compatible [container managers](concepts.md#container-manager) soon
9595
(e.g., [cri-o](https://cri-o.io/)).

docs/user-guide/design.md

Lines changed: 18 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Sysbox User Guide: Design Notes
1+
# Sysbox-EE User Guide: Design Notes
22

33
This document briefly describes some aspects of Sysbox's design.
44

@@ -31,18 +31,17 @@ mounts inside the system container. It's purpose is to make the system container
3131
closely resemble a virtual host while ensuring proper isolation from the rest of
3232
the system.
3333

34-
sysbox-mgr is a daemon that provides services to sysbox-runc and
35-
sysbox-fs. For example, it manages assignment of exclusive user
36-
namespace user-ID and group-ID mappings to system containers, manages
37-
some special mounts that Sysbox adds to system containers, etc.
34+
sysbox-mgr is a daemon that provides services to sysbox-runc and sysbox-fs. For
35+
example, it manages assignment user-ID and group-ID mappings to system
36+
containers, manages some special mounts that Sysbox adds to system containers,
37+
etc.
3838

39-
Together, sysbox-fs and sysbox-mgr are the "back-ends" for
40-
sysbox. Communication between the sysbox components is done via
41-
gRPC.
39+
Together, sysbox-fs and sysbox-mgr are the "back-ends" for sysbox. Communication
40+
between the sysbox components is done via gRPC.
4241

43-
Users don't normally interact with the Sysbox components directly.
44-
Instead, they use higher level apps (e.g., Docker) that interact with
45-
Sysbox to deploy system containers.
42+
Users don't normally interact with the Sysbox components directly. Instead,
43+
they use higher level apps (e.g., Docker) that interact with Sysbox to deploy
44+
system containers.
4645

4746
## Ubuntu Shiftfs Module
4847

@@ -106,11 +105,11 @@ For example, an attacker running inside the system container can
106105
create set-user-ID-root executables which can then be executed by
107106
non-root users on the host to gain root privileges.
108107

109-
Note that this vulnerability is not specific to Nestybox system
110-
containers or shiftfs; the same attack is possible with regular Docker
111-
containers because in those the root user in the container is in fact
112-
the root user on the host, so files written by the root user in the
113-
container have `root:root` ownership on the host.
108+
Note that this vulnerability is not specific to system containers or shiftfs;
109+
the same attack is possible with regular Docker containers because in those the
110+
root user in the container is in fact the root user on the host, so files
111+
written by the root user in the container have `root:root` ownership on the
112+
host.
114113

115114
To reduce the attack surface, the following security precautions are
116115
recommended:
@@ -188,9 +187,9 @@ Kubernetes and containerd work properly inside the system container.
188187
Sysbox is a fork of the [OCI runc](https://github.com/opencontainers/runc). It is mostly
189188
(but not 100%) compatible with the OCI runtime specification.
190189

191-
The incompatibilities arise from Nestybox's desire to make deployment
192-
of system containers possible with Docker (to save users the trouble
193-
of having to learn yet another tool).
190+
The incompatibilities arise from our desire to make deployment of system
191+
containers possible with Docker (to save users the trouble of having to learn
192+
yet another tool).
194193

195194
We believe these incompatibilities won't negatively affect users of
196195
Sysbox and should mostly be transparent to them.

docs/user-guide/dind.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Sysbox User Guide: Docker-in Docker
1+
# Sysbox-EE User Guide: Docker-in Docker
22

33
## Contents
44

@@ -24,10 +24,6 @@ the Docker on the host.
2424

2525
This is useful for Docker sandboxing, testing, and CI/CD use cases.
2626

27-
Moreover, it's fast and very efficient: the inner Docker uses its fast overlay2
28-
storage driver, and Sysbox has a [feature](images.md#inner-docker-image-sharing)
29-
that significantly reduces the storage overhead of the inner containers.
30-
3127
## Installing Docker inside the Container
3228

3329
The easiest way is to use a system container image that has Docker preinstalled

docs/user-guide/images.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Sysbox User Guide: System Container Images
1+
# Sysbox-EE User Guide: System Container Images
22

33
## Contents
44

@@ -35,8 +35,7 @@ how to do this.
3535
The [Nestybox Dockerhub repo](https://hub.docker.com/u/nestybox) has several images that
3636
we provide as reference for users.
3737

38-
We often use these in the examples we provide in this User-Guide, [Quickstart guide](../quickstart/README.md), and
39-
Blog (<https://blog.nestybox.com>).
38+
We often use these in the examples we provide in this User-Guide and [Quickstart guide](../quickstart/README.md).
4039

4140
The Dockerfiles are [here](../../dockerfiles). Feel free to copy them and adapt them to
4241
your needs.
@@ -59,14 +58,14 @@ This has several benefits:
5958

6059
- Improves efficiency:
6160

62-
- Sysbox has a [feature](#inner-docker-image-sharing) that maximizes sharing
61+
- Sysbox-EE has a [feature](#inner-docker-image-sharing) that maximizes sharing
6362
of preloaded inner container images across system containers. This
6463
**significantly** reduces the storage overhead on the host.
6564

6665
- Ease of use:
6766

6867
- It's easier to deploy a system container that comes preloaded with your choice
69-
of inner containers, than to pull those inner containers into system container
68+
of inner containers than to pull those inner containers into system container
7069
at runtime.
7170

7271
- Air-gapped environments:
@@ -98,10 +97,9 @@ This process also works if the system container image has containerd inside
9897
(rather than Docker). In this case, the Dockerfile must request containerd
9998
to pull the inner images.
10099

101-
Nestybox uses this feature often. For example, the
102-
[Dockerfile](../../dockerfiles/k8s-node) for our `nestybox/k8s-node` image (used
103-
for running Kubernetes-in-Docker) preloads the Kubernetes pod images using this
104-
same approach.
100+
We use this feature often. For example, the [Dockerfile](../../dockerfiles/k8s-node)
101+
for the `k8s-node` image (used for running Kubernetes-in-Docker) preloads the Kubernetes pod images using
102+
this same approach.
105103

106104
## Preloading Inner Container Images with Docker Commit
107105

@@ -124,6 +122,8 @@ This approach is helpful as a way of saving work or exporting a working system
124122
container for deployment in another machine (i.e., commit the system container
125123
image, docker push to a repo, and docker pull from another machine).
126124

125+
#### **-------- Sysbox-EE Feature Highlight --------**
126+
127127
## Inner Docker Image Sharing
128128

129129
One of the side-effects of preloading inner container images is that the system
@@ -234,3 +234,5 @@ sysbox-mgr.
234234

235235
See the [User Guide Configuration doc](configuration.md) for further info
236236
on how to do this.
237+
238+
#### **----------------------------------------------------------**

docs/user-guide/install.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Sysbox User Guide: Installation
1+
# Sysbox-EE User Guide: Installation
22

33
## Contents
44

0 commit comments

Comments
 (0)