Generated by GPT-5-mini| KubeVirt | |
|---|---|
| Name | KubeVirt |
| Developer | Red Hat |
| Initial release | 2017 |
| Repository | GitHub |
| License | Apache License 2.0 |
| Platform | Kubernetes |
KubeVirt
KubeVirt is an open-source virtualization add-on that enables running full-featured virtual machines on top of container orchestration platforms. It integrates with Red Hat, IBM, Google, Amazon Web Services, Microsoft Azure, GitHub, Linux Foundation projects and ecosystem tools to bring traditional virtual machine workloads into cloud-native environments. The project interfaces with Kubernetes primitives while interoperating with ecosystem projects such as Prometheus, Grafana, Istio, OpenShift, Tekton', Helm, and Ansible.
KubeVirt provides a layer that allows users to manage virtual machines alongside containers using common control plane APIs. It was initiated to bridge virtualization practices from incumbents like VMware, Microsoft Hyper-V, Xen Project, and KVM into modern orchestration stacks influenced by Google Kubernetes Engine, Amazon EKS, Azure Kubernetes Service, and distributions like Red Hat OpenShift. Stakeholders include contributors from enterprises such as Red Hat, Intel, Nokia, Canonical, VMware, and community members associated with projects like containerd, CRI-O, etcd, and CNCF initiatives.
KubeVirt's architecture embeds a virtualization layer into the Kubernetes control plane by introducing custom resources and controllers. Core components interact with existing projects such as Container Network Interface, CNI, CoreDNS, Flannel, Calico, Weave Net, and Multus for networking. The runtime relies on kernel-level hypervisors exemplified by KVM and collaborates with tooling like qemu, libvirt, and virtctl. Observability and telemetry integrate with Prometheus, Grafana, OpenTelemetry, and logging stacks like Elasticsearch, Fluentd, Loki, and Kibana. Storage patterns use solutions from Ceph, Rook, GlusterFS, Longhorn, and cloud block stores such as Amazon EBS, Google Persistent Disk, and Azure Disk.
Installing KubeVirt is typically performed via kubectl manifests, Helm, or distribution-specific operators, and is compatible with platforms like OpenShift Container Platform, Minikube, Kind, k3s, and managed clusters from Google Cloud Platform, AWS, and Azure. Prerequisites often reference cluster components like etcd, kube-apiserver, kubelet, and networking plugins such as Calico or Cilium. CI/CD pipelines for deployment can be implemented with Jenkins, Tekton, GitLab CI, or Argo CD and incorporate automation tools like Ansible and Terraform for infrastructure provisioning. Vendor integrations and certification processes sometimes involve organizations such as Red Hat Certification teams and standards bodies like Open Container Initiative.
Key features include VirtualMachine and VirtualMachineInstance custom resources, live migration, snapshotting, and hardware passthrough. Component integrations include controllers and webhooks that interact with kube-scheduler, kube-controller-manager, and admission systems like OPA and Kyverno for policy enforcement. Management UIs and CLIs leverage Kubernetes Dashboard, Lens, kubectl, virtctl, and projects like OpenShift Console and Rancher. Backup and restore workflows coordinate with tools such as Velero and Restic, while image and artifact pipelines use Harbor, Quay, Docker Hub, and signing systems like Notary and sigstore.
KubeVirt supports migration of legacy workloads from VMware vSphere and Hyper-V into container-native infrastructures, consolidation of mixed workloads in data centers run by operators from Equinix, DigitalOcean, Linode, and telco deployments by Nokia and Ericsson. Typical workflows include CI/CD for virtualized appliances alongside microservices managed by Argo Workflows, policy-driven scheduling using OPA, and multi-tenant isolation patterns coordinated with Istio and Linkerd. Edge and telco use cases align with OpenNESS, ONAP, and OPNFV initiatives, while research and HPC scenarios integrate with schedulers and batch systems like Slurm, PBS, and Grid Engine.
The project follows open governance models common in cloud-native communities and receives contributions from corporations and independent contributors associated with GitHub, Apache Software Foundation-style practices, and events such as KubeCon, OpenShift Commons, DevOpsDays, Linux Foundation summits, and regional meetups. Testing and CI commonly interact with infrastructures like Prow, Jenkins X, and cloud CI runners from Travis CI and CircleCI. Documentation, design proposals, and roadmaps appear in repositories and issue trackers on platforms used by Red Hat, Intel, Canonical, and community working groups.
Security relies on Kubernetes constructs such as Role-Based Access Control and network policies, integrating with projects like SPIFFE, SPIRE, Vault for secrets, and Kube-bench for compliance scanning. Networking leverages CNI plugins including Calico, Cilium, Multus, Flannel, and SDN solutions in enterprise stacks from Red Hat OpenShift and VMware NSX-T. Hardware security features interact with platform technologies from Intel SGX, AMD SEV, and TPM providers, while image provenance and attestation workflows can use sigstore, Notary, and Keycloak for identity federation.
Category:Virtualization Category:Kubernetes ecosystem