gvisor/g3doc
gVisor bot a3f97a757a Merge pull request #2513 from amscanne:website-integrated
PiperOrigin-RevId: 311184385
2020-05-12 12:55:23 -07:00
..
architecture_guide Merge pull request #2513 from amscanne:website-integrated 2020-05-12 12:55:23 -07:00
user_guide Merge pull request #2513 from amscanne:website-integrated 2020-05-12 12:55:23 -07:00
BUILD Add resource model. 2020-05-06 14:15:18 -07:00
README.md Merge pull request #2513 from amscanne:website-integrated 2020-05-12 12:55:23 -07:00
community.md Merge pull request #2513 from amscanne:website-integrated 2020-05-12 12:55:23 -07:00
logo.png Update README.md to point to gvisor.dev 2019-04-09 10:20:21 -07:00
logo.txt Adapt website to use g3doc sources and bazel. 2020-05-06 14:15:18 -07:00
roadmap.md Merge pull request #2513 from amscanne:website-integrated 2020-05-12 12:55:23 -07:00

README.md

What is gVisor?

gVisor is a user-space kernel, written in Go, that implements a substantial portion of the Linux system call interface. It provides an additional layer of isolation between running applications and the host operating system.

gVisor includes an Open Container Initiative (OCI) runtime called runsc that makes it easy to work with existing container tooling. The runsc runtime integrates with Docker and Kubernetes, making it simple to run sandboxed containers.

gVisor takes a distinct approach to container sandboxing and makes a different set of technical trade-offs compared to existing sandbox technologies, thus providing new tools and ideas for the container security landscape.

gVisor can be used with Docker, Kubernetes, or directly using runsc. Use the links below to see detailed instructions for each of them:

  • Docker: The quickest and easiest way to get started.
  • Kubernetes: Isolate Pods in your K8s cluster with gVisor.
  • OCI Quick Start: Expert mode. Customize gVisor for your environment.