summaryrefslogtreecommitdiffhomepage
path: root/content/_index.html
diff options
context:
space:
mode:
Diffstat (limited to 'content/_index.html')
-rw-r--r--content/_index.html51
1 files changed, 0 insertions, 51 deletions
diff --git a/content/_index.html b/content/_index.html
deleted file mode 100644
index e2a78364d..000000000
--- a/content/_index.html
+++ /dev/null
@@ -1,51 +0,0 @@
-+++
-title = "gVisor"
-linkTitle = "gVisor"
-description = "A container sandbox runtime focused on security, efficiency, and ease of use."
-+++
-
-{{< blocks/cover image_anchor="top" height="auto" color="primary" title="gVisor" >}}
-<div class="mx-auto">
- <p class="lead">A container sandbox runtime focused on <strong>security</strong>, <strong>efficiency</strong>, and <strong>ease of use</strong>.</p>
- <a class="btn btn-lg btn-primary mr-3 mb-4" href="./docs/user_guide/quick_start/docker/">Quick Start<i class="fas fa-arrow-alt-circle-right ml-2"></i></a>
- <a class="btn btn-lg btn-secondary mr-3 mb-4" href="https://github.com/google/gvisor" rel="noopener">GitHub <i class="fab fa-github ml-2"></i></a>
-</div>
-{{< /blocks/cover >}}
-
-{{% blocks/lead color="secondary" %}}
-gVisor is an open-source, <a href="https://www.opencontainers.org/" target="_blank" rel="noopener">OCI-compatible</a> sandbox runtime that provides a virtualized container environment. It runs containers with a new <a href="https://en.wikipedia.org/wiki/User_space" target="_blank" rel="noopener">user-space</a> kernel, delivering a low overhead container security solution for high-density applications.
-
-gVisor integrates with <a href="https://www.docker.com/" target="_blank" rel="noopener">Docker</a>, <a href="https://containerd.io/" target="_blank" rel="noopener">containerd</a> and <a href="https://kubernetes.io/" target="_blank" rel="noopener">Kubernetes</a>, making it easier to improve the security isolation of your containers while still using familiar tooling. Additionally, gVisor supports a variety of underlying mechanisms for intercepting application calls, allowing it to run in diverse host environments, including cloud-hosted virtual machines.
-{{% /blocks/lead %}}
-
-{{< blocks/section color="dark" >}}
-
-{{% blocks/feature icon="fas fa-lock" title="Defense in Depth" %}}
-Each sandbox has its own user-space kernel, providing additional protection from host kernel vulnerabilities.
-{{% /blocks/feature %}}
-
-{{% blocks/feature icon="fas fa-feather-alt" title="Lightweight" %}}
-Runs as a normal process and uses the host kernel for memory management and scheduling.
-{{% /blocks/feature %}}
-
-{{% blocks/feature icon="fab fa-linux" title="Zero Configuration" %}}
-Capable of running most Linux applications unmodified, with zero configuration.
-{{% /blocks/feature %}}
-
-{{< /blocks/section >}}
-
-{{< blocks/section color="white" >}}
-
-{{% blocks/feature icon="fas fa-book" title="Read the Docs" %}}
-Read the [documentation](./docs/) to understand gVisor, its architecture and trade-offs, and how to use it.
-{{% /blocks/feature %}}
-
-{{% blocks/feature icon="fas fa-code-branch" title="Contribute to gVisor" %}}
-Anyone is welcome to be a gVisor contributor. Please check out the [community information](./docs/community/) to get started.
-{{% /blocks/feature %}}
-
-{{% blocks/feature icon="fab fa-github" title="Give Feedback" %}}
-File feature requests, bugs, and compatibility issues on <a href="https://github.com/google/gvisor/issues" target="_blank" rel="noopener">GitHub</a>.
-{{% /blocks/feature %}}
-
-{{< /blocks/section >}}