Posted in

Canonical 为 K8s 提供 LTS ‘无发行版’ 容器化应用程序_AI阅读总结 — 包阅AI

包阅导读总结

1. 关键词:Canonical、LTS、Distroless 容器、Kubernetes、开源软件

2. 总结:Canonical 为 K8s 提供扩展的 LTS 支持,涵盖各种平台,包括对“distroless”容器化应用的 12 年安全维护。此类容器具有诸多优势,Red Hat 也有类似的云原生计算改进举措。

3. 主要内容:

– Canonical 为 Docker 打包的开源软件提供 12 年安全支持的 LTS

– “distroless”容器适用于 Kubernetes 环境,提高计算效率

– 认证在自家及其他主要 Kubernetes 平台上运行

– 基于标准化 OCI 格式构建

– Canonical 对 deb 包的处理

– 维护 OCI 格式容器化开源应用的安全

– 接受用户对特定应用的 LTS 请求

– Ubuntu Pro 用户可使用支持的镜像

– “distroless”容器特点

– 仅包含运行应用所需文件,减少尺寸和攻击面

– 无 SSH、包管理器等,不可更新,通过替换更新

– “distroless”容器的优势

– 无需担心应用安全更新

– 快速下载和启动,提高性能

– 与 Red Hat 的比较

– Red Hat 使 RHEL 可作为容器镜像启动

– 两者都致力于优化云环境中的操作系统性能

思维导图:

文章地址:https://thenewstack.io/canonical-offers-lts-distroless-containerized-apps-for-k8s/

文章来源:thenewstack.io

作者:Joab Jackson

发布时间:2024/6/27 19:24

语言:英文

总字数:957字

预计阅读时间:4分钟

评分:86分

标签:容器,Kubernetes,Ubuntu,LTS,无发行版


以下为原文内容

本内容来源于用户推荐转载,旨在分享知识与观点,如有侵权请联系删除 联系邮箱 media@ilingban.com

Canonical is expanding Long Term Support (LTS) beyond its flagship Ubuntu Linux distribution, promising to provide 12-year security support for any Docker-packaged open source software.

These “distroless” containers would be ideal for Kubernetes environments, where they can be packed together in a pod for maximum computational efficiency.

Canonical will certify the LTS containers to run on its own MicroK8s and Charmed Kubernetes platforms, naturally.

But the LTS packages will also be certified by Canonical to run on other major production-grade Kubernetes environments, such as Red Hat OpenShift (by way of Red Hat Enterprise Linux), and VMware‘s K8s platforms: Tanzu Kubernetes Gridand vSphere with Kubernetes.

On public clouds, Canonical will officially certify containers to run on Azure, Amazon Web Services, Google, IBM and Oracle .

The images will be built on the standardized Open Container Initiative (OCI) format, so the LTS containers should run in any OCI-compliant runtime environment.

Canonical Containerizes Deb Packages

To date, Canonical uses deb packaging format to put apps on its own Linux distribution, Ubuntu. Thus far, Ubuntu and the community have produced over 36,700 deb packages. ‘Deb’ comes from Debian, which is the stock distribution Canonical uses to build its own Ubuntu distribution.

Many of these applications packaged in deb also have been containerized, using Docker and similar tools.

In this new program, Canonical will maintain 12 years of security maintenance for any open source application that has been containerized in the OCI format (such as Docker).

Many open source applications are already available, on sites such as Docker Hub. For the service, Canonical will even take requests to “LTS” your favorite open source application. It will analyze your app dependency tree and bring those packages under LTS maintenance that aren’t already covered by Ubuntu Pro.

To support a proprietary application, customers can request an LTS base image with all the needed open source dependencies.

Those with Ubuntu Pro subscriptions, which are free for the first five instances, can use the supported images, which will be updated with security fixes when needed. The same pricing structure will also be used for running “Everything LTS” containers on other certified platforms — VMware, RHEL and the public cloud hosts.

The move will also provide the company’s own Ubuntu Pro distribution with thousands of new open source upstream components, including the many new applications springing up for running generative AI applications, many of which have not yet been packaged in deb.

‘Distroless’ Containers

Regular containers, such as those packaged in Docker, can usually run across any Linux distribution that supports Docker. These traditional containers still include some operating system (OS) utilities for support, such as the Secure Shell (SSH), which allows users to log in to the container.

The distroless containers, however, include only the files, or binaries, specifically needed to run an application, reducing the size of the container and the surface area an attacker can use to exploit the software. Unnecessary packages and metadata are removed.

With distroless, containers don’t have SSH. No one can log in with “root” access. The containerized apps don’t have package managers; they can’t be updated. They are, in industry parlance, truly “immutable.” When they need to be updated, they are replaced by a new copy.

Also gone: install scripts, documentation, header files, info about other dependencies. Instead, such external information is kept in YAML files, called slices, alongside the containers. themselves.

Building a container by scratch can be tricky. Canonical uses the Debian Chisel tool for building distroless containers for the various platforms.

VIDEO

Benefits of Going ‘Distroless’

A major advantage of LTS is that the user does not have to worry about keeping their apps updated with the latest security fixes.

The company will patch any applications where a CVE-registered vulnerability is found. CVE patching is required for many government and industry security mandates, includingFIPS, FedRAMP, EU Cyber Resilience Act (CRA), FCC U.S. Cyber Trust Mark and DISA-STIG.

In addition to security, there are a number of secondary benefits to distroless containers. They can be downloaded more quickly, and they spin up more quickly. You can pack more of them into a single server.

Overall Canonical has estimated that distroless containers can offer a general overall performance boost of 20% to 25%. And you can still use existing container build systems to update your applications as well.

Along with Microsoft, Canonical has already created a set of distroless containers for .NET users.

With this method, .Net containers were trimmed by about 100MB, for a size of 6MB, compressed, the companies have estimated.

Bootable Containers from Red Hat

Canonical is not the only company rethinking how to do Linux distributions for cloud native computing. Earlier this year, Red Hat made its flagship Linux distribution RHEL bootable as a container image. All the operating code typically left out of a container, such as kernel-firmware, will be included in this image.

At the Red Hat Summit in May, Red Hat technicians demonstrated how to boot RHEL from the Podman container management console or be spun up under OpenShift, and even how to burn ISOs from the images, so they can be spun up on any machine.

Though Red Hat’s approach differs from Canonical’s, both are hammering away at the same idea: How to clear away the legacy operating system clutter for better performance in cloud environs.

Red Hat wanted to use the best technologies on “on the container side that we can bring over to the OS world so that these two worlds aren’t managed completely separately,” said Ben Breard, a Red Hat senior principal marketing manager, in a Red Hat press conference at the Summit.

YOUTUBE.COM/THENEWSTACK

Tech moves fast, don’t miss an episode. Subscribe to our YouTubechannel to stream all our podcasts, interviews, demos, and more.

GroupCreated with Sketch.