<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>Track Awesome Linux Containers Updates Weekly</title>
  <id>https://www.trackawesomelist.com/Friz-zy/awesome-linux-containers/week/feed.xml</id>
  <updated>2023-06-11T12:38:41.005Z</updated>
  <link rel="self" type="application/atom+xml" href="https://www.trackawesomelist.com/Friz-zy/awesome-linux-containers/week/feed.xml"/>
  <link rel="alternate" type="application/json" href="https://www.trackawesomelist.com/Friz-zy/awesome-linux-containers/week/feed.json"/>
  <link rel="alternate" type="text/html" href="https://www.trackawesomelist.com/Friz-zy/awesome-linux-containers/week/"/>
  <generator uri="https://github.com/bcomnes/jsonfeed-to-atom#readme" version="1.2.2">jsonfeed-to-atom</generator>
  <icon>https://www.trackawesomelist.com/favicon.ico</icon>
  <logo>https://www.trackawesomelist.com/icon.png</logo>
  <subtitle>A curated list of awesome Linux Containers frameworks, libraries and software</subtitle>
  <entry>
    <id>https://www.trackawesomelist.com/2023/23/</id>
    <title>Awesome Linux Containers Updates on Jun 05 - Jun 11, 2023</title>
    <updated>2023-06-11T12:38:41.005Z</updated>
    <published>2023-06-11T12:38:41.005Z</published>
    <content type="html"><![CDATA[<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://github.com/weaveworks/footloose" rel="noopener noreferrer">footloose (⭐1.6k)</a><br />Containers that look like Virtual Machines.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/23/"/>
    <summary>1 awesome projects updated on Jun 05 - Jun 11, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2022/3/</id>
    <title>Awesome Linux Containers Updates on Jan 17 - Jan 23, 2022</title>
    <updated>2022-01-19T21:32:23.000Z</updated>
    <published>2022-01-19T21:32:23.000Z</published>
    <content type="html"><![CDATA[<h3><p>Sandboxes</p>
</h3>
<ul>
<li><a href="https://github.com/parke/lxroot" rel="noopener noreferrer">Lxroot (⭐88)</a><br />Lxroot is a flexible, lightweight, and safer alternative to chroot and/or Docker for non-root users on Linux.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2022/3/"/>
    <summary>1 awesome projects updated on Jan 17 - Jan 23, 2022</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2021/34/</id>
    <title>Awesome Linux Containers Updates on Aug 23 - Aug 29, 2021</title>
    <updated>2021-08-27T15:47:42.000Z</updated>
    <published>2021-08-27T15:47:42.000Z</published>
    <content type="html"><![CDATA[<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://github.com/containers/youki" rel="noopener noreferrer">youki (⭐4.9k)</a><br />A container runtime written in Rust.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2021/34/"/>
    <summary>1 awesome projects updated on Aug 23 - Aug 29, 2021</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2021/27/</id>
    <title>Awesome Linux Containers Updates on Jul 05 - Jul 11, 2021</title>
    <updated>2021-07-09T05:47:14.000Z</updated>
    <published>2021-07-09T05:47:14.000Z</published>
    <content type="html"><![CDATA[<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://github.com/nestybox/sysbox" rel="noopener noreferrer">sysbox (⭐2.1k)</a><br />Sysbox is a "runc" that creates secure (rootless) containers / pods that run not just microservices, but most workloads that run in VMs (e.g., systemd, Docker, and Kubernetes), seamlessly.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2021/27/"/>
    <summary>1 awesome projects updated on Jul 05 - Jul 11, 2021</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/42/</id>
    <title>Awesome Linux Containers Updates on Oct 19 - Oct 25, 2020</title>
    <updated>2020-10-12T12:35:01.000Z</updated>
    <published>2020-10-12T12:35:01.000Z</published>
    <content type="html"><![CDATA[<h3><p>Security / Links</p>
</h3>
<ul>
<li><a href="https://platform.sh/blog/2020/the-container-is-a-lie/" rel="noopener noreferrer">The container is a lie</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/42/"/>
    <summary>1 awesome projects updated on Oct 19 - Oct 25, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/38/</id>
    <title>Awesome Linux Containers Updates on Sep 21 - Sep 27, 2020</title>
    <updated>2020-09-15T11:52:54.000Z</updated>
    <published>2020-09-15T11:52:54.000Z</published>
    <content type="html"><![CDATA[<h3><p>Dashboard</p>
</h3>
<ul>
<li><a href="https://github.com/swarmpit/swarmpit" rel="noopener noreferrer">swarmpit (⭐2.7k)</a><br />Lightweight mobile-friendly Docker Swarm management UI.</li>
</ul>
<h3><p>Security / Tools</p>
</h3>
<ul>
<li><a href="https://github.com/containers/oci-seccomp-bpf-hook" rel="noopener noreferrer">oci-seccomp-bpf-hook (⭐218)</a><br />OCI hook to trace syscalls and generate a seccomp profile.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/38/"/>
    <summary>2 awesome projects updated on Sep 21 - Sep 27, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/27/</id>
    <title>Awesome Linux Containers Updates on Jul 06 - Jul 12, 2020</title>
    <updated>2020-07-02T13:11:11.000Z</updated>
    <published>2020-07-02T13:08:50.000Z</published>
    <content type="html"><![CDATA[<h3><p>Filesystem</p>
</h3>
<ul>
<li><a href="https://github.com/GoogleContainerTools/kaniko" rel="noopener noreferrer">kaniko (⭐13k)</a><br />Kaniko is a tool to build container images from a Dockerfile, inside a container or Kubernetes cluster.</li>
</ul>

<ul>
<li><a href="https://umo.ci/" rel="noopener noreferrer">umoci</a><br />Umoci is a tool to manipulate OCI container images, and can be used as a rudimentary build tool.</li>
</ul>

<ul>
<li><a href="https://github.com/christian-korneck/docker-pushrm" rel="noopener noreferrer">docker pushrm (⭐118)</a><br />A Docker CLI plugin that that lets you push the README.md file from the current directory to a container registry. Supports Docker Hub, Quay and Harbor.</li>
</ul>
<h3><p>Dashboard</p>
</h3>
<ul>
<li><a href="https://github.com/portainer/portainer" rel="noopener noreferrer">portainer (⭐26k)</a><br />Lightweight Docker management UI.</li>
</ul>
<h3><p>Security / Links</p>
</h3>
<ul>
<li><a href="https://www.lvh.io/posts/dont-expose-the-docker-socket-not-even-to-a-container/" rel="noopener noreferrer">Don't expose the Docker socket (not even to a container)</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/27/"/>
    <summary>5 awesome projects updated on Jul 06 - Jul 12, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/4/</id>
    <title>Awesome Linux Containers Updates on Jan 28 - Feb 03, 2019</title>
    <updated>2019-01-24T13:51:07.000Z</updated>
    <published>2019-01-24T13:51:07.000Z</published>
    <content type="html"><![CDATA[<h3><p>Operating Systems</p>
</h3>
<ul>
<li><a href="https://mcl.host" rel="noopener noreferrer">MCL</a><br />MCL (<em>Minimal Container Linux</em>) is a from scratch minimal Linux OS designed specifically to run containers. It has a small footprint of ~50MB and boots within seconds. It is currently optimized to run Docker.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/4/"/>
    <summary>1 awesome projects updated on Jan 28 - Feb 03, 2019</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/3/</id>
    <title>Awesome Linux Containers Updates on Jan 21 - Jan 27, 2019</title>
    <updated>2019-01-19T15:23:23.000Z</updated>
    <published>2019-01-19T15:23:23.000Z</published>
    <content type="html"><![CDATA[<h3><p>Specifications</p>
</h3>
<ul>
<li><a href="https://github.com/deislabs/cnab-spec" rel="noopener noreferrer">Cloud Native Application Bundle Specification (⭐922)</a><br />A package format specification that describes a technology for bundling, installing, and managing distributed applications, that are by design, cloud agnostic.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/3/"/>
    <summary>1 awesome projects updated on Jan 21 - Jan 27, 2019</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2018/51/</id>
    <title>Awesome Linux Containers Updates on Dec 17 - Dec 23, 2018</title>
    <updated>2018-12-20T14:02:27.000Z</updated>
    <published>2018-12-20T14:02:27.000Z</published>
    <content type="html"><![CDATA[<h3><p>Clouds</p>
</h3>
<ul>
<li><a href="https://www.nomadproject.io/" rel="noopener noreferrer">Nomad</a><br />HashiCorp Nomad is a single binary that schedules applications and services on Linux, Windows, and Mac. It is an open source scheduler that uses a declarative job file for scheduling virtualized, containerized, and standalone applications.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2018/51/"/>
    <summary>1 awesome projects updated on Dec 17 - Dec 23, 2018</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2018/48/</id>
    <title>Awesome Linux Containers Updates on Nov 26 - Dec 02, 2018</title>
    <updated>2018-11-29T14:25:21.000Z</updated>
    <published>2018-11-29T14:25:21.000Z</published>
    <content type="html"><![CDATA[<h3><p>Hypervisors</p>
</h3>
<ul>
<li><a href="https://containerd.io/" rel="noopener noreferrer">containerd</a><br />A container runtime which can manage a complete container lifecycle - from image transfer/storage to container execution, supervision and networking.</li>
</ul>
<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://github.com/containers/libpod" rel="noopener noreferrer">podman (⭐19k)</a><br />Full management of container lifecycle.</li>
</ul>

<ul>
<li><a href="https://github.com/firecracker-microvm/firecracker" rel="noopener noreferrer">firecracker (⭐22k)</a><br />Firecracker runs workloads in lightweight virtual machines, called microVMs, which combine the security and isolation properties provided by hardware virtualization technology with the speed and flexibility of containers.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2018/48/"/>
    <summary>3 awesome projects updated on Nov 26 - Dec 02, 2018</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2018/46/</id>
    <title>Awesome Linux Containers Updates on Nov 12 - Nov 18, 2018</title>
    <updated>2018-11-17T21:08:22.000Z</updated>
    <published>2018-11-17T20:18:29.000Z</published>
    <content type="html"><![CDATA[<h3><p>Clouds</p>
</h3>
<ul>
<li><a href="https://www.alibabacloud.com/fr/product/container-service" rel="noopener noreferrer">Alibaba Cloud Container Service</a><br />Container Service is a high-performance and scalable container application management service that enables you to use Docker and Kubernetes to manage the lifecycle of containerized applications.</li>
</ul>
<h3><p>Filesystem</p>
</h3>
<ul>
<li><a href="https://github.com/wagoodman/dive" rel="noopener noreferrer">dive (⭐37k)</a><br />A tool for exploring each layer in a docker image.</li>
</ul>

<ul>
<li><a href="https://github.com/google/go-containerregistry" rel="noopener noreferrer">go-containerregistry (⭐2.5k)</a><br />Go library and CLIs for working with container registries.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2018/46/"/>
    <summary>3 awesome projects updated on Nov 12 - Nov 18, 2018</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2018/24/</id>
    <title>Awesome Linux Containers Updates on Jun 11 - Jun 17, 2018</title>
    <updated>2018-06-12T18:42:39.000Z</updated>
    <published>2018-06-12T17:49:24.000Z</published>
    <content type="html"><![CDATA[<h3><p>Filesystem</p>
</h3>
<ul>
<li><a href="https://github.com/P3GLEG/Whaler" rel="noopener noreferrer">Whaler (⭐961)</a><br />Whaler is designed to reverse engineer a Docker Image into the Dockerfile that created it.</li>
</ul>
<h3><p>Dashboard</p>
</h3>
<ul>
<li><a href="https://github.com/salihciftci/liman" rel="noopener noreferrer">Liman (⭐554)</a><br />Basic docker monitoring web application.</li>
</ul>
<h3><p>Security / Tools</p>
</h3>
<ul>
<li><a href="https://github.com/google/docker-explorer/" rel="noopener noreferrer">docker-explorer (⭐485)</a><br />A tool to help forensicate offline docker acquisitions.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2018/24/"/>
    <summary>3 awesome projects updated on Jun 11 - Jun 17, 2018</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2018/23/</id>
    <title>Awesome Linux Containers Updates on Jun 04 - Jun 10, 2018</title>
    <updated>2018-06-07T16:53:02.000Z</updated>
    <published>2018-06-07T16:53:02.000Z</published>
    <content type="html"><![CDATA[<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://github.com/hyperhq/runv" rel="noopener noreferrer">runv (⭐827)</a><br />Hypervisor-based (KVM, Xen, QEMU) Runtime for OCI. Security by isolation.</li>
</ul>
<h3><p>Filesystem</p>
</h3>
<ul>
<li><a href="https://github.com/projectatomic/skopeo" rel="noopener noreferrer">skopeo (⭐6.4k)</a><br />Work with remote images registries - retrieving information, images, signing content.</li>
</ul>

<ul>
<li><a href="https://github.com/blablacar/dgr" rel="noopener noreferrer">dgr (⭐246)</a><br />Command line utility designed to build and to configure at runtime App Containers Images (ACI) and App Container Pods (POD) based on convention over configuration.</li>
</ul>
<h3><p>Security / Tools</p>
</h3>
<ul>
<li><a href="https://github.com/google/gvisor" rel="noopener noreferrer">gvisor (⭐14k)</a><br />gVisor is a user-space kernel, written in Go, that implements a substantial portion of the Linux system surface. It includes an Open Container Initiative (OCI) runtime called runsc that provides an isolation boundary between the application and the host kernel. The runsc runtime integrates with Docker and Kubernetes, making it simple to run sandboxed containers.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2018/23/"/>
    <summary>4 awesome projects updated on Jun 04 - Jun 10, 2018</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2018/12/</id>
    <title>Awesome Linux Containers Updates on Mar 19 - Mar 25, 2018</title>
    <updated>2018-03-20T14:36:03.000Z</updated>
    <published>2018-03-19T09:03:06.000Z</published>
    <content type="html"><![CDATA[<h3><p>Operating Systems</p>
</h3>
<ul>
<li><a href="http://blog.hypriot.com/about/" rel="noopener noreferrer">HypriotOS</a><br />Minimal Debian-based operating systems that is optimized to run Docker. It made it dead easy use Docker on any Raspberry Pi.</li>
</ul>
<h3><p>Hypervisors</p>
</h3>
<ul>
<li><a href="https://github.com/tailhook/lithos/" rel="noopener noreferrer">Lithos (⭐107)</a><br />Lithos is a process supervisor and containerizer for running services. It is not intended to be system init, but rather tries to be a base tool to build container orchestration.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2018/12/"/>
    <summary>2 awesome projects updated on Mar 19 - Mar 25, 2018</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2018/11/</id>
    <title>Awesome Linux Containers Updates on Mar 12 - Mar 18, 2018</title>
    <updated>2018-03-16T07:16:37.000Z</updated>
    <published>2018-03-16T07:16:37.000Z</published>
    <content type="html"><![CDATA[<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://github.com/ihucos/plash/" rel="noopener noreferrer">plash (⭐367)</a><br />Lightweight, rootless containers.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2018/11/"/>
    <summary>1 awesome projects updated on Mar 12 - Mar 18, 2018</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2018/10/</id>
    <title>Awesome Linux Containers Updates on Mar 05 - Mar 11, 2018</title>
    <updated>2018-03-09T18:33:22.000Z</updated>
    <published>2018-03-09T18:33:22.000Z</published>
    <content type="html"><![CDATA[<h3><p>Sandboxes</p>
</h3>
<ul>
<li><a href="https://github.com/singularityware/singularity" rel="noopener noreferrer">singularity (⭐2.4k)</a><br />Universal application containers for Linux.</li>
</ul>
<h3><p>Filesystem</p>
</h3>
<ul>
<li><a href="https://github.com/jessfraz/img" rel="noopener noreferrer">img (⭐3.8k)</a><br />Standalone, daemon-less, unprivileged Dockerfile and OCI compatible container image builder.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2018/10/"/>
    <summary>2 awesome projects updated on Mar 05 - Mar 11, 2018</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2018/4/</id>
    <title>Awesome Linux Containers Updates on Jan 22 - Jan 28, 2018</title>
    <updated>2018-01-22T09:48:06.000Z</updated>
    <published>2018-01-22T09:48:06.000Z</published>
    <content type="html"><![CDATA[<h3><p>Hypervisors</p>
</h3>
<ul>
<li><a href="https://github.com/marty90/multidocker" rel="noopener noreferrer">MultiDocker (⭐42)</a><br />Create a secure multi-user Docker machine, where each user is segregated into an indepentent container.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2018/4/"/>
    <summary>1 awesome projects updated on Jan 22 - Jan 28, 2018</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2017/49/</id>
    <title>Awesome Linux Containers Updates on Dec 04 - Dec 10, 2017</title>
    <updated>2017-12-10T19:48:43.000Z</updated>
    <published>2017-12-08T11:46:43.000Z</published>
    <content type="html"><![CDATA[<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://katacontainers.io/" rel="noopener noreferrer">Kata Containers</a><br />Kata Containers is a new open source project building extremely lightweight virtual machines that seamlessly plug into the containers ecosystem.</li>
</ul>
<h3><p>Security / Tools</p>
</h3>
<ul>
<li><a href="https://github.com/buildkite/sockguard" rel="noopener noreferrer">sockguard (⭐142)</a><br />A proxy for docker.sock that enforces access control and isolated privileges.</li>
</ul>
<h3><p>Security / Links</p>
</h3>
<ul>
<li><a href="http://searchitoperations.techtarget.com/tip/When-to-use-Docker-alternatives-rkt-and-LXD" rel="noopener noreferrer">When to use-Docker alternatives rkt and LXD</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2017/49/"/>
    <summary>3 awesome projects updated on Dec 04 - Dec 10, 2017</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2017/48/</id>
    <title>Awesome Linux Containers Updates on Nov 27 - Dec 03, 2017</title>
    <updated>2017-12-03T18:53:24.000Z</updated>
    <published>2017-12-03T18:53:24.000Z</published>
    <content type="html"><![CDATA[<h3><p>Partial Access</p>
</h3>
<ul>
<li><a href="https://github.com/moby/moby" rel="noopener noreferrer">Moby (⭐66k)</a><br />A "Lego set" of toolkit components for containers software created by Docker.</li>
</ul>
<h3><p>Filesystem</p>
</h3>
<ul>
<li><a href="https://github.com/GoogleCloudPlatform/container-diff" rel="noopener noreferrer">container-diff (⭐3.5k)</a><br />A tool for analyzing and comparing container images.</li>
</ul>

<ul>
<li><a href="https://github.com/projectatomic/buildah" rel="noopener noreferrer">buildah (⭐6.4k)</a><br />A tool which facilitates building OCI container images.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2017/48/"/>
    <summary>3 awesome projects updated on Nov 27 - Dec 03, 2017</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2017/27/</id>
    <title>Awesome Linux Containers Updates on Jul 03 - Jul 09, 2017</title>
    <updated>2017-07-06T16:44:47.000Z</updated>
    <published>2017-07-04T11:10:48.000Z</published>
    <content type="html"><![CDATA[<h3><p>Specifications</p>
</h3>
<ul>
<li><a href="https://blogs.oracle.com/developers/the-microcontainer-manifesto" rel="noopener noreferrer">Oracle microcontainer manifesto</a><br />This is not a new container format, but simply a specific method for constructing a container that allows for better security and stability.</li>
</ul>
<h3><p>Clouds</p>
</h3>
<ul>
<li><a href="https://ciao-project.github.io/" rel="noopener noreferrer">CIAO</a><br />Cloud Integrated Advanced Orchestrator for Intel Clear Linux OS.</li>
</ul>
<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://github.com/oracle/railcar" rel="noopener noreferrer">railcar (⭐1.1k)</a><br />Railcar is a rust implementation of the opencontainers initiative's runtime spec. It is similar to the reference implementation runc, but it is implemented completely in rust for memory safety without needing the overhead of a garbage collector or multiple threads.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2017/27/"/>
    <summary>3 awesome projects updated on Jul 03 - Jul 09, 2017</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2017/14/</id>
    <title>Awesome Linux Containers Updates on Apr 03 - Apr 09, 2017</title>
    <updated>2017-04-09T17:02:02.000Z</updated>
    <published>2017-04-09T16:25:21.000Z</published>
    <content type="html"><![CDATA[<h3><p>Security / Tools</p>
</h3>
<ul>
<li><a href="https://github.com/aelsabbahy/goss" rel="noopener noreferrer">goss (⭐5.2k)</a><br />Quick and Easy server testing/validation.</li>
</ul>
<h3><p>Security / Links</p>
</h3>
<ul>
<li><a href="https://diogomonica.com/2017/03/27/why-you-shouldnt-use-env-variables-for-secret-data/" rel="noopener noreferrer">Why you shouldn't use ENV variables for secret data</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2017/14/"/>
    <summary>2 awesome projects updated on Apr 03 - Apr 09, 2017</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2017/13/</id>
    <title>Awesome Linux Containers Updates on Mar 27 - Apr 02, 2017</title>
    <updated>2017-04-01T10:31:21.000Z</updated>
    <published>2017-04-01T10:31:21.000Z</published>
    <content type="html"><![CDATA[<h3><p>Sandboxes</p>
</h3>
<ul>
<li><a href="https://github.com/projectatomic/bubblewrap" rel="noopener noreferrer">Bubblewrap (⭐3.2k)</a><br />Run applications in a sandbox using Linux namespaces without root privileges, with user namespacing provided via setuid binary.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2017/13/"/>
    <summary>1 awesome projects updated on Mar 27 - Apr 02, 2017</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2016/44/</id>
    <title>Awesome Linux Containers Updates on Oct 31 - Nov 06, 2016</title>
    <updated>2016-11-04T19:38:31.000Z</updated>
    <published>2016-11-04T19:38:31.000Z</published>
    <content type="html"><![CDATA[<h3><p>Security / Tools</p>
</h3>
<ul>
<li><a href="https://www.aporeto.com/trireme/" rel="noopener noreferrer">trireme</a><br />Security by segmentation for Docker and Kubernetes.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2016/44/"/>
    <summary>1 awesome projects updated on Oct 31 - Nov 06, 2016</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2016/42/</id>
    <title>Awesome Linux Containers Updates on Oct 17 - Oct 23, 2016</title>
    <updated>2016-10-18T08:12:08.000Z</updated>
    <published>2016-10-18T08:12:08.000Z</published>
    <content type="html"><![CDATA[<h3><p>Security / Links</p>
</h3>
<ul>
<li><a href="http://rhelblog.redhat.com/?s=container&amp;submit=Search" rel="noopener noreferrer">RedHat Blog</a><ul>
<li><a href="https://access.redhat.com/articles/1353593" rel="noopener noreferrer">Introduction to Linux Containers</a></li>
<li><a href="http://rhelblog.redhat.com/2015/07/07/whats-next-for-containers-user-namespaces/#more-1004" rel="noopener noreferrer">What’s Next for Containers? User Namespaces</a></li>
<li><a href="http://rhelblog.redhat.com/2015/07/29/architecting-containers-part-1-user-space-vs-kernel-space/" rel="noopener noreferrer">Architecting Containers Part 1: Why Understanding User Space vs. Kernel Space Matters</a></li>
<li><a href="http://rhelblog.redhat.com/2015/09/17/architecting-containers-part-2-why-the-user-space-matters-2/" rel="noopener noreferrer">Architecting Containers Part 2: Why the User Space Matters</a></li>
<li><a href="http://rhelblog.redhat.com/2016/10/17/secure-your-containers-with-this-one-weird-trick/" rel="noopener noreferrer">Secure Your Containers with this One Weird Trick</a></li>
</ul>
</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2016/42/"/>
    <summary>1 awesome projects updated on Oct 17 - Oct 23, 2016</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2016/41/</id>
    <title>Awesome Linux Containers Updates on Oct 10 - Oct 16, 2016</title>
    <updated>2016-10-16T15:32:25.000Z</updated>
    <published>2016-10-16T15:31:04.000Z</published>
    <content type="html"><![CDATA[<h3><p>Specifications</p>
</h3>
<ul>
<li><a href="https://github.com/projectatomic/atomicapp/tree/master/docs/spec" rel="noopener noreferrer">Nulecule Specification (⭐104)</a><br />Nulecule defines a pattern and model for packaging complex multi-container applications and services, referencing all their dependencies, including orchestration metadata in a container image for building, deploying, monitoring, and active management.</li>
</ul>
<h3><p>Clouds</p>
</h3>
<ul>
<li><a href="http://rancher.com/" rel="noopener noreferrer">Rancher</a><br />Rancher is a complete, open source platform for deploying and managing containers in production. It includes commercially-supported distributions of Kubernetes, Mesos, and Docker Swarm, making it easy to run containerized applications on any infrastructure.</li>
</ul>

<ul>
<li><a href="https://docs.docker.com/engine/swarm/" rel="noopener noreferrer">Docker Swarm</a><br />Docker Swarm is native clustering for Docker.</li>
</ul>

<ul>
<li><a href="https://azure.microsoft.com/en-us/services/container-service/" rel="noopener noreferrer">Azure Container Service</a><br />Azure Container Service optimizes the configuration of popular open source tools and technologies specifically for Azure.</li>
</ul>
<h3><p>Operating Systems</p>
</h3>
<ul>
<li><a href="https://coreos.com/" rel="noopener noreferrer">CoreOs</a><br />A lightweight Linux operating system designed for clustered deployments providing automation, security, and scalability for your most critical applications.</li>
</ul>

<ul>
<li><a href="http://rancher.com/rancher-os/" rel="noopener noreferrer">RancherOS</a><br />RancherOS is a tiny Linux distro that runs the entire OS as Docker containers.</li>
</ul>

<ul>
<li><a href="http://www.projectatomic.io/" rel="noopener noreferrer">Project Atomic</a><br />Project Atomic provides the best platform for your Linux Docker Kubernetes (LDK) application stack. Use immutable infrastructure to deploy and scale your containerized applications.</li>
</ul>

<ul>
<li><a href="https://www.ubuntu.com/cloud/snappy" rel="noopener noreferrer">Snappy Ubuntu Core</a><br />Ubuntu Core is the perfect system for large-scale cloud container deployments, bringing transactional updates to the world’s favourite container platform.</li>
</ul>

<ul>
<li><a href="https://resinos.io/" rel="noopener noreferrer">ResinOS</a><br />A host OS tailored for containers, designed for reliability, proven in production.</li>
</ul>

<ul>
<li><a href="https://github.com/vmware/photon" rel="noopener noreferrer">Photon (⭐2.8k)</a><br />Photon OS is a minimal Linux container host designed to have a small footprint and tuned for VMware platforms. Photon is intended to invite collaboration around running containerized and Linux applications in a virtualized environment.</li>
</ul>

<ul>
<li><a href="https://clearlinux.org" rel="noopener noreferrer">Clear Linux Project</a><br />The Clear Linux Project for Intel Architecture is a distribution built for various Cloud use cases.</li>
</ul>

<ul>
<li><a href="https://cargos.io/" rel="noopener noreferrer">CargOS</a><br />CargOS is a new lightweight, open source, platform for Docker hosts that aims for speed, manageability and security. Releases are built for 64-bit Intel/AMD CPUs.</li>
</ul>

<ul>
<li><a href="http://osv.io/" rel="noopener noreferrer">OSv</a><br />OSv is the open source operating system designed for the cloud. Built from the ground up for effortless deployment and management, with superior performance.</li>
</ul>
<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://github.com/indigo-dc/udocker" rel="noopener noreferrer">udocker (⭐1.1k)</a><br />A basic user tool to execute simple containers in batch or interactive systems without root privileges.</li>
</ul>

<ul>
<li><a href="https://github.com/google/lmctfy" rel="noopener noreferrer">Let Me Contain That For You (⭐3.4k)</a><br />LMCTFY is the open source version of Google’s container stack, which provides Linux application containers.</li>
</ul>

<ul>
<li><a href="https://github.com/01org/cc-oci-runtime" rel="noopener noreferrer">cc-oci-runtime (⭐416)</a><br />Intel Clear Linux OCI (Open Containers Initiative) compatible runtime.</li>
</ul>
<h3><p>Best practices</p>
</h3>
<ul>
<li><a href="https://12factor.net/" rel="noopener noreferrer">The Twelve-Factor App</a><br />The twelve-factor app is a methodology for building software-as-a-service apps.</li>
</ul>

<ul>
<li><a href="http://docs.projectatomic.io/container-best-practices/" rel="noopener noreferrer">Container Best Practices</a><br />A collaborative project to document container-based application architecture, creation and management from Project Atomic.</li>
</ul>
<h3><p>Security / Tools</p>
</h3>
<ul>
<li><a href="https://github.com/zuBux/drydock" rel="noopener noreferrer">drydock (⭐63)</a><br />Drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templates.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2016/41/"/>
    <summary>19 awesome projects updated on Oct 10 - Oct 16, 2016</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2016/34/</id>
    <title>Awesome Linux Containers Updates on Aug 22 - Aug 28, 2016</title>
    <updated>2016-08-23T21:47:52.000Z</updated>
    <published>2016-08-23T21:47:52.000Z</published>
    <content type="html"><![CDATA[<h3><p>Clouds</p>
</h3>
<ul>
<li><a href="https://virtuozzo.com" rel="noopener noreferrer">Virtuozzo</a><br />A platform, built on Virtuozzo containers, that can be easily run on top of any bare-metal or virtual servers in any public or private cloud, to automate, optimize, and accelerate internal IT and development processes.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2016/34/"/>
    <summary>1 awesome projects updated on Aug 22 - Aug 28, 2016</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2016/32/</id>
    <title>Awesome Linux Containers Updates on Aug 08 - Aug 14, 2016</title>
    <updated>2016-08-11T20:38:29.000Z</updated>
    <published>2016-08-11T20:38:29.000Z</published>
    <content type="html"><![CDATA[<h3><p>Clouds</p>
</h3>
<ul>
<li><a href="https://aws.amazon.com/ecs/" rel="noopener noreferrer">Amazon EC2 Container Service </a><br />Container management service that supports Docker containers and allows you to easily run applications on a managed cluster of Amazon EC2 instances.</li>
</ul>

<ul>
<li><a href="http://kubernetes.io/" rel="noopener noreferrer">Kubernetes</a><br />Manage a cluster of Linux containers as a single system to accelerate Dev and simplify Ops.</li>
</ul>

<ul>
<li><a href="https://mesosphere.com/" rel="noopener noreferrer">Mesosphere</a><br />The Mesosphere Datacenter Operating System (DCOS) is a new kind of operating system that spans all of the machines in your datacenter or cloud. It provides a highly elastic, and highly scalable way of deploying applications, services and big data infrastructure on shared resources.</li>
</ul>

<ul>
<li><a href="https://www.openshift.org/" rel="noopener noreferrer">OpenShift Origin</a><br />OpenShift Origin is a distribution of <a href="http://kubernetes.io/" rel="noopener noreferrer">Kubernetes</a> optimized for continuous application development and multi-tenant deployment. Origin adds developer and operations-centric tools on top of Kubernetes to enable rapid application development, easy deployment and scaling, and long-term lifecycle maintenance for small and large teams.</li>
</ul>

<ul>
<li><a href="https://github.com/cloudfoundry/warden" rel="noopener noreferrer">Warden (⭐283)</a><br />Manages isolated, ephemeral, and resource controlled environments. Part of Cloud Foundry - the open platform as a service project.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2016/32/"/>
    <summary>5 awesome projects updated on Aug 08 - Aug 14, 2016</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2016/8/</id>
    <title>Awesome Linux Containers Updates on Feb 22 - Feb 28, 2016</title>
    <updated>2016-02-26T06:58:55.000Z</updated>
    <published>2016-02-26T06:58:55.000Z</published>
    <content type="html"><![CDATA[<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://github.com/yandex/porto" rel="noopener noreferrer">porto (⭐386)</a><br />The main goal of Porto is to create a convenient, reliable interface over several Linux kernel mechanism such as cgroups, namespaces, mounts, networking etc.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2016/8/"/>
    <summary>1 awesome projects updated on Feb 22 - Feb 28, 2016</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2016/5/</id>
    <title>Awesome Linux Containers Updates on Feb 01 - Feb 07, 2016</title>
    <updated>2016-02-05T16:21:03.000Z</updated>
    <published>2016-02-05T16:21:03.000Z</published>
    <content type="html"><![CDATA[<h3><p>Dashboard</p>
</h3>
<ul>
<li><a href="https://lxc-webpanel.github.io/" rel="noopener noreferrer">LXC-Web-Panel</a><br />Web panel for LXC on Ubuntu.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2016/5/"/>
    <summary>1 awesome projects updated on Feb 01 - Feb 07, 2016</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2015/51/</id>
    <title>Awesome Linux Containers Updates on Dec 21 - Dec 27, 2015</title>
    <updated>2015-12-14T22:51:05.000Z</updated>
    <published>2015-12-14T16:42:52.000Z</published>
    <content type="html"><![CDATA[<h3><p>Hypervisors</p>
</h3>
<ul>
<li><a href="https://github.com/veggiemonk/awesome-docker#cloud-infrastructure" rel="noopener noreferrer">Docker (⭐26k)</a><br />An open platform for distributed applications for developers and sysadmins. <strong>Standard de facto</strong>.</li>
</ul>
<h3><p>Sandboxes</p>
</h3>
<ul>
<li><a href="https://github.com/google/nsjail" rel="noopener noreferrer">NsJail (⭐2.4k)</a><br />NsJail is a process isolation tool for Linux. It makes use of the namespacing, resource control, and seccomp-bpf syscall filter subsystems of the Linux kernel.</li>
</ul>
<h3><p>Security / Tools</p>
</h3>
<ul>
<li><a href="https://github.com/OpenSCAP/container-compliance" rel="noopener noreferrer">OpenSCAP (⭐239)</a><br />The OpenSCAP ecosystem provides multiple tools to assist administrators and auditors with assessment, measurement and enforcement of security baselines.</li>
</ul>
<h3><p>Security / Levels of security problems</p>
</h3>
<ul>
<li>leak to another container (bug in namespaces, filesystem) -&gt; user namespaces with different uid inside for each container: 1000 in container - 14293 and 15398 outside; security modules like selinux or apparmor</li>
</ul>

<ul>
<li>root -&gt; more of services should work on host outside; isolate sensitive functions, run as non-privileged context</li>
</ul>

<ul>
<li>full privileges -&gt; isolate on kernel level</li>
</ul>

<ul>
<li>absolute privileges -&gt; run it in separate vm</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2015/51/"/>
    <summary>7 awesome projects updated on Dec 21 - Dec 27, 2015</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2015/49/</id>
    <title>Awesome Linux Containers Updates on Dec 07 - Dec 13, 2015</title>
    <updated>2015-12-05T14:02:27.000Z</updated>
    <published>2015-12-05T14:02:27.000Z</published>
    <content type="html"><![CDATA[<h3><p>Clouds</p>
</h3>
<ul>
<li><a href="https://www.joyent.com/" rel="noopener noreferrer">Joyent</a><br />High-Performance Container-Native Infrastructure for Today's Demanding Real-Time Web and Mobile Applications.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2015/49/"/>
    <summary>1 awesome projects updated on Dec 07 - Dec 13, 2015</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2015/48/</id>
    <title>Awesome Linux Containers Updates on Nov 30 - Dec 06, 2015</title>
    <updated>2015-11-29T09:55:37.000Z</updated>
    <published>2015-11-29T09:55:37.000Z</published>
    <content type="html"><![CDATA[<h3><p>Partial Access</p>
</h3>
<ul>
<li><a href="https://criu.org/Main_Page" rel="noopener noreferrer">CRIU</a><br />Checkpoint/Restore In Userspace is a software tool for Linux operating system. Using this tool, you can freeze a running application (or part of it) and checkpoint it to a hard drive as a collection of files. CRIU integrated with Docker and LXC to implement Live migration of containers.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2015/48/"/>
    <summary>1 awesome projects updated on Nov 30 - Dec 06, 2015</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2015/47/</id>
    <title>Awesome Linux Containers Updates on Nov 23 - Nov 29, 2015</title>
    <updated>2015-11-22T15:30:39.000Z</updated>
    <published>2015-11-22T15:30:39.000Z</published>
    <content type="html"><![CDATA[<h3><p>Security / Tools</p>
</h3>
<ul>
<li><a href="https://github.com/jfrazelle/bane" rel="noopener noreferrer">bane (⭐1.1k)</a><br />Custom AppArmor profile generator for docker containers.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2015/47/"/>
    <summary>1 awesome projects updated on Nov 23 - Nov 29, 2015</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2015/46/</id>
    <title>Awesome Linux Containers Updates on Nov 16 - Nov 22, 2015</title>
    <updated>2015-11-13T19:53:39.000Z</updated>
    <published>2015-11-13T19:53:39.000Z</published>
    <content type="html"><![CDATA[<h3><p>Security / Tools</p>
</h3>
<ul>
<li><a href="https://coreos.com/blog/vulnerability-analysis-for-containers/" rel="noopener noreferrer">CoreOS Clair</a><br />Open Source Vulnerability Analysis for your Containers.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2015/46/"/>
    <summary>1 awesome projects updated on Nov 16 - Nov 22, 2015</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2015/45/</id>
    <title>Awesome Linux Containers Updates on Nov 09 - Nov 15, 2015</title>
    <updated>2015-11-05T20:04:32.000Z</updated>
    <published>2015-11-05T20:04:32.000Z</published>
    <content type="html"><![CDATA[<h3><p>Another Information Sources / Technologies for security</p>
</h3>
<ul>
<li><a href="http://doger.io/" rel="noopener noreferrer">doger.io</a><br />This page is an attempt to document the ins and outs of containers on Linux. This is not just restricted to programmers looking to implement containers or use container like features in their own code but also Sysadmins and Users who want to get more of a handle on how containers work 'under the hood'.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2015/45/"/>
    <summary>1 awesome projects updated on Nov 09 - Nov 15, 2015</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2015/44/</id>
    <title>Awesome Linux Containers Updates on Nov 02 - Nov 08, 2015</title>
    <updated>2015-10-28T17:31:48.000Z</updated>
    <published>2015-10-28T17:25:06.000Z</published>
    <content type="html"><![CDATA[<h3><p>Specifications</p>
</h3>
<ul>
<li><a href="https://wiki.freedesktop.org/www/Software/systemd/ContainerInterface/" rel="noopener noreferrer">Systemd Container Interface</a><br />Systemd is a suite of basic building blocks for a Linux system. It provides a system and service manager that runs as PID 1 and starts the rest of the system. If you write a container solution, please consider supporting the following interfaces.</li>
</ul>
<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://wiki.archlinux.org/index.php/Systemd-nspawn" rel="noopener noreferrer">systemd-nspawn</a><br />Spawn a namespace container for debugging, testing and building. Part of <a href="https://wiki.freedesktop.org/www/Software/systemd/" rel="noopener noreferrer">systemd</a>.</li>
</ul>
<h3><p>Another Information Sources / Technologies for security</p>
</h3>
<ul>
<li><a href="https://github.com/draios/sysdig-container-ecosystem" rel="noopener noreferrer">sysdig-container-ecosystem (⭐104)</a><br />The ecosystem of awesome new technologies emerging around containers and microservices can be a little overwhelming, to say the least. We thought we might be able to help: welcome to the Container Ecosystem Project.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2015/44/"/>
    <summary>3 awesome projects updated on Nov 02 - Nov 08, 2015</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2015/43/</id>
    <title>Awesome Linux Containers Updates on Oct 26 - Nov 01, 2015</title>
    <updated>2015-10-19T19:18:03.000Z</updated>
    <published>2015-10-19T19:18:03.000Z</published>
    <content type="html"><![CDATA[<h3><p>Foundations</p>
</h3>
<ul>
<li><a href="https://www.cloudfoundry.org/foundation/" rel="noopener noreferrer">Cloud Foundry Foundation</a><br />The Cloud is our foundry.</li>
</ul>
<h3><p>Clouds</p>
</h3>
<ul>
<li><a href="http://jelastic.com/" rel="noopener noreferrer">Jelastic</a><br />Unlimited PaaS and Container-Based IaaS in a Joint Cloud Solution for DevOps.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2015/43/"/>
    <summary>2 awesome projects updated on Oct 26 - Nov 01, 2015</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2015/42/</id>
    <title>Awesome Linux Containers Updates on Oct 19 - Oct 25, 2015</title>
    <updated>2015-10-18T20:54:58.000Z</updated>
    <published>2015-10-18T20:54:58.000Z</published>
    <content type="html"><![CDATA[<h3><p>Security / Links</p>
</h3>
<ul>
<li><a href="https://insights.ubuntu.com/2015/10/15/update-on-ubuntu-phone-security-issue/" rel="noopener noreferrer">Update on Ubuntu Phone security issue</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2015/42/"/>
    <summary>1 awesome projects updated on Oct 19 - Oct 25, 2015</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2015/35/</id>
    <title>Awesome Linux Containers Updates on Aug 31 - Sep 06, 2015</title>
    <updated>2015-08-27T20:07:30.000Z</updated>
    <published>2015-08-24T16:02:00.000Z</published>
    <content type="html"><![CDATA[<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://github.com/p8952/bocker" rel="noopener noreferrer">Bocker (⭐11k)</a><br />Docker implemented in around 100 lines of bash.</li>
</ul>
<h3><p>Security / Tools</p>
</h3>
<ul>
<li><a href="https://github.com/docker/docker-bench-security" rel="noopener noreferrer">Docker bench security (⭐8.4k)</a><br />The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.</li>
</ul>
<h3><p>Security / Links</p>
</h3>
<ul>
<li><a href="https://benchmarks.cisecurity.org/about/" rel="noopener noreferrer">CIS Security Benchmarks</a></li>
</ul>

<ul>
<li><a href="https://benchmarks.cisecurity.org/tools2/docker/CIS_Docker_1.6_Benchmark_v1.0.0.pdf" rel="noopener noreferrer">CIS Docker 1.6 Benchmark v1.0.0</a></li>
</ul>

<ul>
<li><a href="https://blog.docker.com/2015/05/understanding-docker-security-and-best-practices/" rel="noopener noreferrer">Understanding docker security and best practices</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2015/35/"/>
    <summary>5 awesome projects updated on Aug 31 - Sep 06, 2015</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2015/33/</id>
    <title>Awesome Linux Containers Updates on Aug 17 - Aug 23, 2015</title>
    <updated>2015-08-16T15:00:30.000Z</updated>
    <published>2015-08-16T13:09:10.000Z</published>
    <content type="html"><![CDATA[<h3><p>Foundations</p>
</h3>
<ul>
<li><a href="https://www.opencontainers.org/" rel="noopener noreferrer">OPEN CONTAINER INITIATIVE</a><br />The Open Container Initiative is a lightweight, open governance structure, to be formed under the auspices of the Linux Foundation, for the express purpose of creating open industry standards around container formats and runtime.</li>
</ul>

<ul>
<li><a href="https://cncf.io/" rel="noopener noreferrer">Cloud Native Computing Foundation</a><br />The Cloud Native Computing Foundation will create and drive the adoption of a new set of common container technologies informed by technical merit and end user value, and inspired by Internet-scale computing.</li>
</ul>
<h3><p>Specifications</p>
</h3>
<ul>
<li><a href="https://github.com/opencontainers/specs" rel="noopener noreferrer">Open Container Specifications (⭐2.9k)</a><br />This project is where the Open Container Initiative Specifications are written. This is a work in progress.</li>
</ul>

<ul>
<li><a href="https://github.com/coreos/rkt/blob/master/Documentation/app-container.md" rel="noopener noreferrer">App Container basics (⭐8.8k)</a><br />App Container (appc) is an open specification that defines several aspects of how to run applications in containers: an image format, runtime environment, and discovery protocol.</li>
</ul>
<h3><p>Clouds</p>
</h3>
<ul>
<li><a href="https://cloud.google.com/container-engine/" rel="noopener noreferrer">Google Cloud Platform</a><br />Run Docker containers on Google Cloud Platform, powered by Kubernetes. Google Container Engine actively schedules your containers, based on declared needs, on a managed cluster of virtual machines.</li>
</ul>
<h3><p>Hypervisors</p>
</h3>
<ul>
<li><a href="https://github.com/lxc/lxd" rel="noopener noreferrer">LXD (⭐4k)</a><br />Daemon based on liblxc offering a REST API to manage LXC containers.</li>
</ul>

<ul>
<li><a href="https://openvz.org/" rel="noopener noreferrer">OpenVZ</a><br />OpenVZ is container-based virtualization for Linux. OpenVZ creates multiple secure, isolated Linux containers (otherwise known as VEs or VPSs) on a single physical server enabling better server utilization and ensuring that applications do not conflict.</li>
</ul>
<h3><p>Containers</p>
</h3>
<ul>
<li><a href="https://github.com/opencontainers/runc" rel="noopener noreferrer">runc (⭐11k)</a><br />runc is a CLI tool for spawning and running containers according to the OCS specification.</li>
</ul>

<ul>
<li><a href="https://github.com/coreos/rkt" rel="noopener noreferrer">Rocket (⭐8.8k)</a><br />rkt (pronounced "rock-it") is a CLI for running app containers on Linux. rkt is designed to be composable, secure, and fast. Based on AppC specification.</li>
</ul>

<ul>
<li><a href="https://github.com/lxc/lxc" rel="noopener noreferrer">LXC (⭐4.1k)</a><br />LXC is the well known set of tools, templates, library and language bindings. It's pretty low level, very flexible and covers just about every containment feature supported by the upstream kernel.</li>
</ul>

<ul>
<li><a href="https://github.com/tailhook/vagga" rel="noopener noreferrer">Vagga (⭐1.8k)</a><br />Vagga is a fully-userspace container engine inspired by Vagrant and Docker, specialized for development environments.</li>
</ul>

<ul>
<li><a href="https://github.com/xemul/libct" rel="noopener noreferrer">libct (⭐101)</a><br />Libct is a containers management library which provides convenient API for frontend programs to rule a container during its whole lifetime.</li>
</ul>

<ul>
<li><a href="https://libvirt.org/drvlxc.html" rel="noopener noreferrer">libvirt</a><br />A big toolkit to interact with the virtualization capabilities of recent versions of Linux (and other OSes).</li>
</ul>
<h3><p>Sandboxes</p>
</h3>
<ul>
<li><a href="https://l3net.wordpress.com/projects/firejail/" rel="noopener noreferrer">Firejail</a><br />Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces, seccomp-bpf and Linux capabilities.</li>
</ul>

<ul>
<li><a href="https://github.com/subuser-security/subuser" rel="noopener noreferrer">Subuser (⭐881)</a><br />Securing the Linux desktop with Docker.</li>
</ul>

<ul>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/Specifications/SnappyConfinement" rel="noopener noreferrer">Snappy</a><br />Snappy Ubuntu Core is a new rendition of Ubuntu with transactional updates - a minimal server image with the same libraries as today’s Ubuntu, but applications are provided through a simpler mechanism.</li>
</ul>

<ul>
<li><a href="https://wiki.gnome.org/Projects/SandboxedApps" rel="noopener noreferrer">xdg-app</a><br />xdg-app is a system for building, distributing and running sandboxed desktop applications on Linux.</li>
</ul>
<h3><p>Partial Access</p>
</h3>
<ul>
<li><a href="http://man7.org/linux/man-pages/man1/nsenter.1.html" rel="noopener noreferrer">nsenter</a><br />Run program with namespaces of other processes. Part of the util-linux.</li>
</ul>

<ul>
<li><a href="http://man7.org/linux/man-pages/man8/ip-netns.8.html" rel="noopener noreferrer">ip-netns</a><br />Process network namespace management. Part of the iproute2.</li>
</ul>

<ul>
<li><a href="http://man7.org/linux/man-pages/man1/unshare.1.html" rel="noopener noreferrer">unshare</a><br />Run program with some namespaces unshared from parent. Part of the util-linux.</li>
</ul>

<ul>
<li><a href="https://github.com/zalando/python-nsenter" rel="noopener noreferrer">python-nsenter (⭐136)</a><br />This Python package allows entering Linux kernel namespaces (mount, IPC, net, PID, user and UTS) by doing the "setns" syscall.</li>
</ul>

<ul>
<li><a href="https://pypi.python.org/pypi/butter" rel="noopener noreferrer">butter</a><br />Python library to interface to low level linux features (inotify, fanotify, timerfd, signalfd, eventfd, containers) with asyncio support.</li>
</ul>

<ul>
<li><a href="https://github.com/Friz-zy/pyspaces" rel="noopener noreferrer">pyspaces (⭐87)</a><br />Works with Linux namespaces through glibc with pure python.</li>
</ul>
<h3><p>Security / Links</p>
</h3>
<ul>
<li><a href="https://opensource.com/business/14/7/docker-security-selinux" rel="noopener noreferrer">Are Docker containers really secure?</a></li>
</ul>

<ul>
<li><a href="https://opensource.com/business/14/9/security-for-docker" rel="noopener noreferrer">Bringing new security features to Docker</a></li>
</ul>

<ul>
<li><a href="http://www.slideshare.net/jpetazzo/docker-linux-containers-lxc-and-security" rel="noopener noreferrer">Docker, Linux Containers (LXC), and security</a></li>
</ul>

<ul>
<li><a href="http://www.itworld.com/article/2920349/security/for-containers-security-is-problem-1.html" rel="noopener noreferrer">For containers, security is problem #1</a></li>
</ul>

<ul>
<li><a href="https://mjg59.dreamwidth.org/33170.html" rel="noopener noreferrer">Linux Container Security</a></li>
</ul>

<ul>
<li><a href="https://news.ycombinator.com/item?id=10030868" rel="noopener noreferrer">Ask HN: Best Linux sandbox?</a></li>
</ul>
<h3><p>Security / Levels of security problems</p>
</h3>
<ul>
<li>regular application</li>
</ul>

<ul>
<li>always untrusted -&gt; know it</li>
</ul>

<ul>
<li>suid bit -&gt; mount with nosuid</li>
</ul>

<ul>
<li>limit available syscall -&gt; seccomp-bpf, grsec</li>
</ul>

<ul>
<li>system services like cron, ssh</li>
</ul>

<ul>
<li>run as root -&gt; isolate via bastion host or vm</li>
</ul>

<ul>
<li>using /dev -&gt; "devices" control group<br />The following device nodes are created in the container by default.<br />The Docker images are also mounted with nodev, which means that even if a device node was pre-created in the image, it could not be used by processes within the container to talk to the kernel.<br />/dev/console,/dev/null,/dev/zero,/dev/full,/dev/tty*,/dev/urandom,/dev/random,/dev/fuse</li>
</ul>

<ul>
<li>root calls -&gt; capabilities (cap_sys_admin warning!)<br />Here is the current list of capabilities that Docker uses: chown, dac_override, fowner, kill, setgid, setuid, setpcap, net_bind_service, net_raw, sys_chroot, mknod, setfcap, and audit_write.<br />Docker removes several of these capabilities including the following:<br />CAP_SETPCAP     Modify process capabilities<br />CAP_SYS_MODULE     Insert/Remove kernel modules<br />CAP_SYS_RAWIO     Modify Kernel Memory<br />CAP_SYS_PACCT     Configure process accounting<br />CAP_SYS_NICE     Modify Priority of processes<br />CAP_SYS_RESOURCE     Override Resource Limits<br />CAP_SYS_TIME     Modify the system clock<br />CAP_SYS_TTY_CONFIG     Configure tty devices<br />CAP_AUDIT_WRITE     Write the audit log<br />CAP_AUDIT_CONTROL     Configure Audit Subsystem<br />CAP_MAC_OVERRIDE     Ignore Kernel MAC Policy<br />CAP_MAC_ADMIN     Configure MAC Configuration<br />CAP_SYSLOG     Modify Kernel printk behavior<br />CAP_NET_ADMIN     Configure the network<br />CAP_SYS_ADMIN     Catch all<br />uses /proc, /sys -&gt; remount ro, drop cap_sys_admin; security modules like selinux or apparmor; some part of this fs are "namespace-aware"<br />Docker mounts these file systems into the container as "read-only" mount points.<br />. /sys<br />. /proc/sys<br />. /proc/sysrq-trigger<br />. /proc/irq<br />. /proc/bus<br />Copy-on-write file systems<br />Docker uses copy-on-write file systems. This means containers can use the same file system image as the base for the container. When a container writes content to the image, it gets written to a container specific file system. This prevents one container from seeing the changes of another container even if they wrote to the same file system image. Just as important, one container can not change the image content to effect the processes in another container.</li>
</ul>

<ul>
<li>uid 0 -&gt; user namespaces, uid 0 mappet to random uid outside</li>
</ul>

<ul>
<li>system services like devices, network, filesystems</li>
</ul>

<ul>
<li>kernel drivers, network stack, security policies</li>
</ul>

<ul>
<li>general like immutable infrastructure</li>
</ul>

<ul>
<li>container is ro</li>
</ul>

<ul>
<li>write to small separate rw nosuid part</li>
</ul>
<h3><p>Security / Technologies for security</p>
</h3>
<ul>
<li>SELinux</li>
</ul>

<ul>
<li>Cgroups</li>
</ul>

<ul>
<li>file systems under /sys</li>
</ul>

<ul>
<li>/proc/sys, /proc/sysrq-trigger, /proc/irq, /proc/bus</li>
</ul>

<ul>
<li>/dev/mem</li>
</ul>

<ul>
<li>/dev/sd* file system devices</li>
</ul>

<ul>
<li>kernel modules</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2015/33/"/>
    <summary>50 awesome projects updated on Aug 17 - Aug 23, 2015</summary>
  </entry>
</feed>