Skip to content

Commit 533cbe6

Browse files
authored
Merge pull request #32307 from sagidlow/sandboxed-containers-understanding
KATA-681: Understanding section: moving doc from Google Docs to GitHub
2 parents 08087fa + 95a45a2 commit 533cbe6

8 files changed

+53
-29
lines changed

modules/sandboxed-containers-about-sandboxing.adoc

Lines changed: 0 additions & 7 deletions
This file was deleted.

modules/sandboxed-containers-building-blocks.adoc

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,8 @@
44

55
[id="sandboxed-containers-building-blocks_{context}"]
66

7-
= Sandboxed containers building blocks
7+
= {sandboxed-containers-first} building blocks
8+
9+
The {sandboxed-containers-operator} encapsulates all of the components from Kata containers. It manages installation, lifecycle, and configuration tasks.
10+
11+
The {sandboxed-containers-operator} is packaged in the xref:../operators/operator_sdk/osdk-working-bundle-images.adoc#osdk-working-bundle-images[Operator bundle format] as two container images. The bundle image contains metadata and is required to make the operator OLM-ready. The second container image contains the actual controller that monitors and manages the `KataConfig` resource.
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
//Module included in the following assemblies:
2+
//
3+
// * sandboxed_containers/understanding_sandboxed_containers.adoc
4+
[id="sandboxed-containers-common-terms_{context}"]
5+
= {sandboxed-containers-first} common terms
6+
7+
The following terms are used throughout the documentation.
8+
9+
Sandbox:: A sandbox is an isolated environment where programs can run. In a sandbox, you can run untested or untrusted programs without risking harm to the host machine or the operating system.
10+
+
11+
In the context of {sandboxed-containers-first}, sandboxing is achieved by running workloads in a different kernel using virtualization, providing enhanced control over the interactions between multiple workloads that run on the same host.
12+
13+
Pod:: A pod is a construct that is inherited from Kubernetes and {product-title}. It represents resources where containers can be deployed. Containers run inside of pods, and pods are used to specify resources that can be shared between multiple containers.
14+
+
15+
In the context of {sandboxed-containers-first}, a pod is implemented as a virtual machine. Several containers can run in the same pod on the same virtual machine.
16+
17+
{sandboxed-containers-operator}:: An Operator is a software component that automates operations, which are actions that a human operator could do on the system.
18+
+
19+
The {sandboxed-containers-operator} is tasked with managing the lifecycle of sandboxed containers on a cluster. It deals with operations, such as the installation and removal of sandboxed containers software and status monitoring.
20+
21+
Kata Containers:: Kata Containers is a core upstream project that is used to build {sandboxed-containers-first}. {sandboxed-containers-first} integrate Kata Containers with {product-title}.
22+
23+
KataConfig:: `KataConfig` objects represent configurations of sandboxed containers. They store information about the state of the cluster, such as the nodes on which the software is deployed.
24+
25+
{op-system} extensions:: {op-system-first} extensions are a mechanism to install optional {product-title} software. The {sandboxed-containers-operator} uses this mechanism to deploy sandboxed containers on a cluster.
26+
27+
Runtime class:: A `RuntimeClass` object describes which runtime can be used to run a given workload. A runtime class that is named `kata` is installed and deployed by the {sandboxed-containers-operator}. The runtime class contains information about the runtime that describes resources that the runtime needs to operate, such as the link:https://kubernetes.io/docs/concepts/scheduling-eviction/pod-overhead/[pod overhead].

modules/sandboxed-containers-limitations.adoc

Lines changed: 0 additions & 7 deletions
This file was deleted.

modules/sandboxed-containers-os-extensions.adoc

Lines changed: 0 additions & 7 deletions
This file was deleted.
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
//Module included in the following assemblies:
2+
//
3+
// * sandboxed_containers/understanding_sandboxed_containers.adoc
4+
5+
[id="sandboxed-containers-rhcos-extensions_{context}"]
6+
7+
= {op-system} extensions
8+
9+
The {sandboxed-containers-operator} is based on the {op-system-first} extensions concept. The sandboxed containers {op-system} extension contains RPMs for Kata, QEMU, and its dependencies. You can enable them by using the `MachineConfig` resources that the Machine Config Operator provides.

modules/sandboxed-containers-uninstalling-kata-runtime.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ This section describes how to remove and uninstall the `kata` runtime and all it
1717
oc delete kataconfig <KataConfig_CR_Name>
1818
----
1919

20-
The {sandboxed-containers} removes all resources that were initially created to enable the runtime on your cluster. After you run the command above, your cluster is restored to the state prior to the installation process.
20+
The {sandboxed-containers-operator} removes all resources that were initially created to enable the runtime on your cluster. After you run the command above, your cluster is restored to the state prior to the installation process.

sandboxed_containers/understanding-sandboxed-containers.adoc

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[id="understanding-sandboxed-containers"]
2-
= Understanding OpenShift sandboxed containers
2+
= Understanding {sandboxed-containers-first}
33
include::modules/common-attributes.adoc[]
44

55
:context: understanding-sandboxed-containers
@@ -16,13 +16,18 @@ toc::[]
1616
- Ensure proper isolation and sandboxing for testing software.
1717
- Ensure default resource containment through VM boundaries.
1818

19-
Furthermore, {sandboxed-containers-first} provide an additional option for users to choose from the type of workload they want to run to cover a wide variety of use cases.
19+
{sandboxed-containers-first} also provides users the ability to choose from the type of workload that they want to run to cover a wide variety of use cases.
20+
21+
You can use the {sandboxed-containers-operator} to perform tasks such as installation and removal, updates, and status monitoring.
2022

2123
Sandboxed containers are only supported on bare metal.
2224

23-
{op-system-first} is the only supported operating system for {product-title} 4.8.
25+
{op-system-first} is the only supported operating system for {sandboxed-containers-first} 1.0.0.
2426

25-
include::modules/sandboxed-containers-about-sandboxing.adoc[leveloffset=+1]
27+
include::modules/sandboxed-containers-common-terms.adoc[leveloffset=+1]
2628
include::modules/sandboxed-containers-building-blocks.adoc[leveloffset=+1]
27-
include::modules/sandboxed-containers-os-extensions.adoc[leveloffset=+1]
28-
include::modules/sandboxed-containers-limitations.adoc[leveloffset=+1]
29+
include::modules/sandboxed-containers-rhcos-extensions.adoc[leveloffset=+1]
30+
31+
.Additional resources
32+
33+
* xref:../post_installation_configuration/machine-configuration-tasks.adoc#rhcos-add-extensions_post-install-machine-configuration-tasks[Adding extensions to RHCOS]

0 commit comments

Comments
 (0)