@@ -14,6 +14,13 @@ shared by multiple services where maintenance of one affects others.
14
14
Increase stability by partitioning services into virtual NixOS systems
15
15
that can be updated individually.
16
16
17
+ ** microvm.nix** can isolate your /nix/store into exactly what is
18
+ required for the guest's NixOS: the root filesystem is a read-only
19
+ erofs/squashfs file-systems that include only the binaries of your
20
+ configuration. Of course, that holds only true until you mount the
21
+ host's /nix/store as a share for faster build times, or mount the
22
+ store with a writable overlay for Nix builds inside the VM.
23
+
17
24
## The Case Against Containers
18
25
19
26
Linux containers are not a single technology but a plethora of kernel
@@ -26,11 +33,9 @@ the attack surface to the hypervisor and its device drivers. The
26
33
resource usage however incurs some overhead when compared with
27
34
containers, with memory allocation being especially inflexible.
28
35
29
- ** microvm.nix** ships an additional security feature: the root
30
- filesystem is a read-only squashfs that includes only the binaries of
31
- your configuration. That of course holds only true unless you mount the
32
- host's /nix/store as a share for faster build times, or mount the
33
- store with a writable overlay.
36
+ ** microvm.nix** is a tool that helps you building the guest's OS and
37
+ running ways that are easier than writing a ` Dockerfile ` , once you
38
+ know how to put a NixOS config into a ` flake.nix ` file.
34
39
35
40
## Just Virtual Machines?
36
41
0 commit comments