Skip to content

docs(kubernetes): add runtimeClass-based sandbox isolation guide#284

Open
liuxiaopai-ai wants to merge 1 commit intoalibaba:mainfrom
liuxiaopai-ai:codex/docs-k8s-security-isolation
Open

docs(kubernetes): add runtimeClass-based sandbox isolation guide#284
liuxiaopai-ai wants to merge 1 commit intoalibaba:mainfrom
liuxiaopai-ai:codex/docs-k8s-security-isolation

Conversation

@liuxiaopai-ai
Copy link
Contributor

Summary

  • add a new Sandbox Security Isolation (RuntimeClass) section in kubernetes/README.md and kubernetes/README-ZH.md
  • document isolation boundaries and trade-offs across runc, gVisor, Kata, and Firecracker-backed runtimes
  • provide concrete OpenSandbox CRD examples using runtimeClassName in BatchSandbox.spec.template and Pool.spec.template
  • include caveats for node scheduling, runtime handler prerequisites, and compatibility validation

Why

Kubernetes users need clear guidance on selecting stronger isolation runtimes for untrusted workloads, and how that maps directly to OpenSandbox CRDs.

Closes #174

Validation

  • documentation-only change
  • examples align with PodTemplateSpec usage in OpenSandbox CRDs

@CLAassistant
Copy link

CLAassistant commented Mar 1, 2026

CLA assistant check
All committers have signed the CLA.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Add sandbox security isolation section (Kata Container/Firecracker microVM/gVisor)

2 participants