Issue Bottlerocket 1.8, distribution based on isolated containers

published release Linux-Distribution Bottlerct 1.8.0 , developed with the participation of Amazon for the effective and safe launch of isolated containers. The tools and control components of the distribution are written in Rust and are distributed under the licenses of MIT and APACHE 2.0. supported launch of Bottlerocket in clusters Amazon ECS, VMWARE and AWS Eks Kubernetes, as well as composure arbitrary assemblies and editors allowing the use of various orchestration tools for containers. And an automatically updated indivisible system image, including the Linux nucleus and a minimum systemic environment, including only the components necessary for launching containers. System manager Systemd, GlibC library, assembly tools are involved
Buildroot, GRUB bootloader, network configurator wicked , Runtime for isolated Containerd containers, the orchestration of the Kubernetes orchestns, authentication AWS-Am-AUTHETHETOR Amazon Ecs.

Tools for orchestration of containers are delivered in a separate control container , which is turned on by default and controlled through API and AWS SSM Agent. The basic image does not have a command shell, SSH server and interpreted languages ​​(for example, there is no Python or Perl)-the administrator and debug tools are made in A separate service container , which is disconnected by default.

the key difference from similar distributions, such as Fedora Coreos, Centos/Red Hat Atomic Host, is the primary orientation to provide maximum safety in the context of strengthening the protection of the system from possible threats, complicating the operation of vulnerabilities in the components of the OS and increasing the insulation of containers. Containers are created using the standard Linux – CGROUPS nucleus mechanisms, names and secComp spaces. For additional isolation in the distribution, Selinux is used in “Enforming”.

/Media reports.