Intermediate 10 min · April 05, 2026

Containers vs VMs — Why Memory Leaks Crash Neighbors

One container's memory leak (256Mi→1.

N
Naren · Founder
Plain-English first. Then code. Then the interview question.
About
 ● Production Incident 🔎 Debug Guide ⚙ Triage Commands
Quick Answer
  • Virtualization: hypervisor virtualizes CPU, memory, disk, network per VM. Each VM has its own kernel.
  • Containerization: kernel namespaces isolate PID, network, mount, user views. cgroups limit resources. Shared kernel.
  • VMs start in 15-60 seconds. Containers start in 0.3-2 seconds.
  • VMs consume 512MB-2GB overhead per instance. Containers consume 1-50MB.
  • Hypervisor (KVM, VMware ESXi, Hyper-V): manages hardware virtualization
  • Container runtime (containerd, runc): leverages kernel namespaces, cgroups
  • Union filesystem (overlay2): layers images for containers
  • VT-x/AMD-V: CPU hardware extensions for virtualization
Plain-English First

Virtualization is like building separate houses on a shared plot of land — each house has its own foundation, plumbing, and electrical system. Building a house takes weeks and costs a fortune. Containerization is like converting rooms in an existing house into private apartments — each apartment has its own door and lock, but they share the house's foundation and plumbing. Building an apartment takes hours and costs almost nothing. Both give you a private space, but the construction method — and the trade-offs — are completely different.

The containerization vs virtualization decision is not a technology preference — it is a security, performance, and operational trade-off that directly impacts cost, startup time, and isolation guarantees. Getting it wrong means either overpaying for VMs where containers suffice, or under-isolating workloads where VMs are required.

The architectural difference is at the kernel level. Virtualization virtualizes hardware — each VM runs its own kernel on top of a hypervisor. Containerization virtualizes the OS — containers share the host kernel and use Linux namespaces for isolation and cgroups for resource limits. This single difference cascades into every other trade-off.

Common misconceptions: containers are not insecure by default (misconfiguration is the problem), VMs are not always better (they are heavier and slower), and the choice is not binary (gVisor and Kata Containers provide hybrid approaches). The right answer depends on your workload's trust boundary, performance requirements, and compliance needs.

Why Containers Share the Kernel and VMs Don't

Containerization and virtualization both isolate workloads, but they differ at the kernel level. A virtual machine runs a full guest OS on top of a hypervisor, emulating hardware — each VM gets its own kernel, memory, and device drivers. A container shares the host OS kernel and runs as an isolated user-space process, using cgroups and namespaces to limit CPU, memory, and filesystem access. That shared kernel is the single most important distinction: containers are lightweight (start in milliseconds, not minutes) but have a weaker isolation boundary.

In practice, a VM allocates a fixed chunk of RAM (e.g., 4 GB) that the hypervisor reserves. A container uses a memory limit (e.g., --memory=512m) enforced by cgroups, but it shares the host's page cache and kernel memory. If a container leaks memory, it consumes host kernel memory — slab, dentries, or anonymous pages — which can starve other containers on the same host. VMs don't have this cross-talk because each guest OS manages its own memory independently.

Use containers when you need density and fast startup — microservices, CI runners, ephemeral batch jobs. Use VMs when you need strong isolation — multi-tenant workloads with untrusted code, legacy OS requirements, or compliance mandates that demand separate kernels. The real decision isn't about performance; it's about how much failure isolation you need per unit of cost.

Shared Kernel = Shared Risk
A memory leak in one container can exhaust kernel memory on the host, causing OOM kills or slab exhaustion that takes down unrelated containers — VMs prevent this entirely.
Production Insight
A Java service with a slow PermGen leak (pre-Java 8) ran in a container with a 2 GB memory limit. Over weeks, the container's RSS stayed under 1.5 GB, but the host's slab memory grew silently until kswapd consumed 100% CPU and all containers on the node became unresponsive.
Symptom: host shows high 'slab' memory in /proc/meminfo, container metrics look fine, but node-level OOM killer fires.
Rule of thumb: Always set both container memory limit AND host-level memory reservation (e.g., Kubernetes requests vs limits) — and monitor host kernel memory, not just container RSS.
Key Takeaway
Containers share the host kernel — a memory leak in one container can crash neighbors via kernel memory exhaustion.
VMs provide stronger isolation because each guest has its own kernel and memory management.
Choose containers for density and speed; choose VMs when failure isolation across tenants is non-negotiable.

Architecture: Hardware Virtualization vs OS-Level Virtualization

The fundamental difference between virtualization and containerization is where the abstraction boundary sits. Virtualization abstracts hardware. Containerization abstracts the OS. This single difference cascades into every other trade-off.

Virtualization architecture: A hypervisor (VMware ESXi, KVM, Hyper-V) sits between the hardware and the guest operating systems. Each VM runs a full guest OS with its own kernel, drivers, system libraries, and init system. The hypervisor virtualizes CPU, memory, disk, and network for each VM. The guest OS believes it has exclusive access to hardware — the hypervisor translates and multiplexes requests to the real hardware.

Hypervisor types: - Type 1 (bare-metal): runs directly on hardware. Examples: VMware ESXi, KVM, Xen, Hyper-V. More efficient — no host OS overhead. Used by cloud providers (AWS uses KVM/Xen, Azure uses Hyper-V). - Type 2 (hosted): runs on top of a host OS. Examples: VirtualBox, VMware Workstation, Parallels. Less efficient — adds an extra layer of overhead. Used primarily for developer laptops.

Containerization architecture: The container runtime (containerd, runc) leverages Linux kernel features — namespaces for isolation and cgroups for resource limits. Each container gets its own view of the filesystem (mount namespace), network stack (network namespace), process tree (PID namespace), and user IDs (user namespace). But all containers share the same kernel. There is no guest OS — the container process runs directly on the host kernel.

Hardware virtualization support: Modern CPUs include hardware extensions for virtualization — Intel VT-x and AMD-V. These extensions allow the hypervisor to run guest OS kernel code directly on the CPU without emulation. Without these extensions, the hypervisor must emulate CPU instructions, which is 10-100x slower. VT-x/AMD-V are the reason VMs are practical for production workloads.

The isolation boundary matters: Because VMs have a separate kernel, a kernel vulnerability in one VM does not affect other VMs or the host. Because containers share the host kernel, a kernel vulnerability affects all containers on that host. This is the fundamental security trade-off.

io/thecodeforge/architecture_inspection.shBASH
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
#!/bin/bash
# Inspect the architecture differences between VMs and containers

# ── Container: check kernel sharing ──────────────────────────────────────────
# Run two containers and compare their kernel versions
docker run --rm alpine:3.19 uname -r
# Output: 6.1.0-18-amd64 (host kernel version)

docker run --rm ubuntu:22.04 uname -r
# Output: 6.1.0-18-amd64 (SAME kernel — they share the host kernel)

# Check namespaces for a running container
CONTAINER_PID=$(docker inspect --format '{{.State.Pid}}' <container-name>)
ls -la /proc/$CONTAINER_PID/ns/
# Output shows: ipc, mnt, net, pid, user, uts — each is an isolated namespace

# Check cgroup resource limits
cat /sys/fs/cgroup/cpu/docker/<container-id>/cpu.shares
# Default: 1024 (1 CPU share). Adjust with --cpus flag.

cat /sys/fs/cgroup/memory/docker/<container-id>/memory.limit_in_bytes
# Shows the memory limit set by --memory flag

# ── VM: check hardware virtualization ────────────────────────────────────────
# Check if the host supports hardware virtualization
egrep -c '(vmx|svm)' /proc/cpuinfo
# Output > 0 means hardware virtualization is supported

# Check loaded hypervisor modules
lsmod | grep -E 'kvm|vbox|vmw'
# kvm_intel or kvm_amd = KVM is loaded
# vboxdrv = VirtualBox is loaded

# Check VM disk driver (inside a VM)
lsblk -o NAME,TYPE,TRAN,MODEL
# virtio = paravirtualized driver (fast)
# ide/scsi = emulated driver (slow)

# ── Compare startup time ─────────────────────────────────────────────────────
# Container startup
time docker run --rm alpine:3.19 echo 'container started'
# Typical: 0.3-0.5 seconds

# VM startup (using a minimal cloud image)
time virsh start my-vm && while ! virsh dominfo my-vm | grep -q 'running'; do sleep 1; done
# Typical: 15-60 seconds depending on OS and cloud-init
Output
# Container kernel check:
6.1.0-18-amd64
6.1.0-18-amd64
# Both containers share the same host kernel
# Container startup time:
container started
real 0m0.312s
# VM startup time:
Domain my-vm started
real 0m23.451s
Virtualization as Houses, Containerization as Apartments
  • A kernel vulnerability (CVE) affects all containers on the host because they all share the same kernel.
  • VMs are immune to kernel CVEs in other VMs because each VM has its own kernel.
  • For single-tenant workloads (your code, your infrastructure), container isolation is sufficient.
  • For multi-tenant workloads (untrusted code), the shared kernel is an unacceptable attack surface.
Production Insight
The namespace inspection commands are essential for debugging container isolation issues. When a container cannot reach the network, check its network namespace. When a container cannot see other processes, check its PID namespace. When file permissions behave unexpectedly, check its user namespace. Understanding namespaces is the key to understanding container isolation.
Key Takeaway
VMs isolate at the hardware level — each VM has its own kernel. Containers isolate at the OS level — all containers share the host kernel. This is the fundamental trade-off: VMs provide stronger isolation but are heavier. Containers are lighter but the shared kernel is a security boundary for multi-tenant workloads.
Architecture Selection by Workload Type
IfSingle-tenant application workload (API, web server, worker)
UseContainer. Sufficient isolation, minimal overhead, fast startup.
IfMulti-tenant environment running untrusted customer code
UseVM (Firecracker, Kata) or gVisor. Shared kernel is unacceptable for untrusted code.
IfWorkload requires a specific kernel version or kernel modules
UseVM. Containers share the host kernel and cannot run a different kernel.
IfLegacy application requiring full OS environment
UseVM. Some applications require systemd, specific drivers, or full init system.
IfHigh-density microservices deployment
UseContainer. 10-50x more containers than VMs on the same hardware.

Performance Benchmarks: CPU, Memory, Disk I/O, and Network

Performance differences between VMs and containers are real but context-dependent. For most application workloads, the difference is negligible. For I/O-intensive and network-intensive workloads, the difference can be significant.

CPU performance: Containers deliver near-native CPU performance — typically within 1-2% of bare metal. The overhead comes from cgroup accounting and namespace switching. VMs add 5-15% overhead from hardware virtualization (VT-x/AMD-V) and guest OS scheduling. The overhead is higher for workloads with frequent context switches (many threads, high syscall rate).

Memory performance: Containers use the host's native memory management — no overhead. VMs require the hypervisor to manage memory translation (EPT/NPT), which adds 2-5% overhead. Memory overcommit (allocating more virtual memory than physical) is common in VM environments and can cause swapping, which degrades performance dramatically.

Disk I/O performance: This is where the difference is most significant. Containers using the host's filesystem (bind mounts) deliver near-native I/O performance. VMs using virtualized disk drivers (virtio-blk) add 10-30% I/O overhead. Emulated drivers (IDE, legacy SCSI) can add 50%+ overhead. NVMe passthrough eliminates this overhead but limits VM mobility.

Network performance: Containers using bridge networking add 5-10% overhead from NAT and virtual bridge processing. Containers using host networking deliver near-native performance. VMs using virtio-net add 5-15% overhead. SR-IOV passthrough eliminates this overhead but requires hardware support.

Startup time: This is the most dramatic difference. Containers start in 0.3-2 seconds. VMs start in 15-60 seconds (full boot) or 1-5 seconds (resume from snapshot). For auto-scaling workloads that need to respond to traffic spikes in seconds, containers are the only viable option.

io/thecodeforge/performance_benchmark.shBASH
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
#!/bin/bash
# Benchmark container vs VM performance across CPU, memory, I/O, and network

# ── CPU Benchmark ────────────────────────────────────────────────────────────
# Container: CPU performance (sysbench)
docker run --rm severalnines/sysbench sysbench cpu --cpu-max-prime=20000 run
# Look for 'events per second' — higher is better

# VM: CPU performance (run inside VM)
apt install -y sysbench
sysbench cpu --cpu-max-prime=20000 run
# Compare 'events per second' with container result

# ── Memory Benchmark ────────────────────────────────────────────────────────
# Container: memory throughput
docker run --rm severalnines/sysbench sysbench memory --memory-block-size=1M --memory-total-size=10G run
# Look for 'transferred' throughput in MiB/sec

# VM: memory throughput (run inside VM)
sysbench memory --memory-block-size=1M --memory-total-size=10G run

# ── Disk I/O Benchmark ──────────────────────────────────────────────────────
# Container: disk I/O with fio
docker run --rm -v $(pwd)/fio-test:/test loicmahieu/alpine-fio \
  fio --name=randread --ioengine=libaio --rw=randread --bs=4k \
  --numjobs=4 --size=256M --runtime=10 --time_based --filename=/test/file
# Look for 'IOPS' and 'lat avg'IOPS higher and latency lower is better

# VM: disk I/O (run inside VM)
fio --name=randread --ioengine=libaio --rw=randread --bs=4k \
  --numjobs=4 --size=256M --runtime=10 --time_based --filename=/tmp/fio-test/file

# ── Network Benchmark ────────────────────────────────────────────────────────
# Container: network throughput with iperf3
# Server:
docker run -d --name iperf-server -p 5201:5201 networkstatic/iperf3 -s
# Client:
docker run --rm networkstatic/iperf3 -c <host-ip> -t 10
# Look for 'sender' bandwidth in Gbits/sec

# VM: network throughput (run inside VM)
iperf3 -c <host-ip> -t 10

# ── Startup Time Benchmark ───────────────────────────────────────────────────
# Container: measure cold start
time docker run --rm alpine:3.19 echo 'started'
# Typical: 0.3-0.5s

# Container: measure warm start (image already pulled)
time docker run --rm alpine:3.19 echo 'started'
# Typical: 0.1-0.2s

# VM: measure boot time (run on hypervisor)
time virsh start test-vm && sleep 1 && while ! virsh dominfo test-vm | grep -q running; do sleep 0.5; done
# Typical: 15-60s
Output
# CPU benchmark comparison (sysbench, 20000 primes):
# Container: ~4800 events/sec (within 2% of host)
# VM (virtio): ~4200 events/sec (12% overhead)
# VM (emulated): ~3600 events/sec (25% overhead)
# Memory benchmark comparison:
# Container: ~8200 MiB/sec (near-native)
# VM (virtio): ~7800 MiB/sec (5% overhead)
# Disk I/O comparison (fio, 4k random read):
# Container (bind mount): ~45000 IOPS, 0.09ms latency
# VM (virtio-blk): ~38000 IOPS, 0.11ms latency (15% slower)
# VM (NVMe passthrough): ~44000 IOPS, 0.09ms latency (near-native)
# Network comparison (iperf3):
# Container (host network): ~9.4 Gbits/sec
# Container (bridge): ~8.8 Gbits/sec (6% overhead)
# VM (virtio-net): ~8.5 Gbits/sec (10% overhead)
# VM (SR-IOV): ~9.3 Gbits/sec (near-native)
# Startup time comparison:
# Container (cold): 0.38s
# Container (warm): 0.12s
# VM (full boot): 23.4s
# VM (resume from snapshot): 2.1s
Performance Overhead as Tax
  • High-throughput workloads processing millions of requests per second — even 5% overhead is significant.
  • I/O-intensive workloads (databases, search engines) — disk I/O overhead can reach 30% with emulated drivers.
  • Latency-sensitive workloads (trading, real-time) — the extra scheduling jitter from the hypervisor adds unpredictable latency.
  • For most web applications serving less than 10K requests/second, the overhead is negligible and should not drive the decision.
Production Insight
The disk I/O overhead in VMs is the most commonly underestimated performance issue. A team migrated their PostgreSQL database from bare metal to VMs and saw query latency increase by 40%. The root cause: the VM was using IDE emulated drivers instead of virtio-blk. Switching to virtio-blk reduced the overhead from 40% to 15%. Switching to NVMe passthrough eliminated the overhead entirely. Always verify the disk driver inside VMs with lsblk -o NAME,TYPE,TRAN.
Key Takeaway
Containers deliver near-native performance (<2% overhead). VMs add 5-15% overhead from hardware virtualization. The biggest performance gap is disk I/O — VMs using emulated drivers can be 30-50% slower. Always use virtio drivers in VMs. For auto-scaling workloads, containers are the only option — VMs take 15-60 seconds to boot.
Performance Optimization Strategy
IfCPU-bound workload (computation, encoding, ML inference)
UseContainers — near-native performance. VMs add 5-15% overhead with no benefit for CPU-bound work.
IfDisk I/O-bound workload (database, search engine)
UseContainers with bind mounts (near-native). If VMs are required, use virtio-blk or NVMe passthrough.
IfNetwork-intensive workload (API gateway, proxy, load balancer)
UseContainers with host networking (near-native). If VMs are required, use SR-IOV or virtio-net.
IfAuto-scaling workload that needs sub-second startup
UseContainers only. VMs take 15-60 seconds to boot. Even snapshot resume takes 1-5 seconds.

Security Isolation: Kernel Sharing, Attack Surface, and Defense in Depth

Security isolation is the most important trade-off between containerization and virtualization. The difference is not theoretical — it has caused real production breaches.

VM isolation: Each VM has its own kernel. A kernel vulnerability in VM A does not affect VM B or the host. The hypervisor is the only shared component, and hypervisors have a much smaller attack surface than full kernels (fewer lines of code, fewer syscalls, simpler state machine). This is why cloud providers (AWS, GCP, Azure) use VMs for multi-tenant isolation.

Container isolation: All containers share the host kernel. A kernel vulnerability (like Dirty Pipe, CVE-2022-0847, or CVE-2020-14386) affects every container on the host. The attack surface is the entire kernel — millions of lines of code, hundreds of syscalls, complex state. Container runtimes mitigate this with seccomp (syscall filtering), AppArmor/SELinux (mandatory access control), and capabilities dropping — but these are defense-in-depth layers, not a separate kernel.

The multi-tenant boundary: For single-tenant workloads (your code, your infrastructure, your team), container isolation is sufficient. The risk of a kernel CVE being exploited by your own code is low, and you control the patching cadence. For multi-tenant workloads (running untrusted customer code), the shared kernel is an unacceptable attack surface. Use VMs (Firecracker, Kata Containers) or a user-space kernel (gVisor).

Hybrid approaches: - gVisor: intercepts syscalls in user space, providing a kernel-like interface without exposing the host kernel. Adds 2-10% overhead but dramatically reduces attack surface. - Kata Containers: runs each container in a lightweight VM with its own kernel. Provides VM-level isolation with container-like management. - Firecracker: AWS's microVM technology used for Lambda and Fargate. Starts a VM in 125ms with minimal memory overhead (5MB per microVM).

Seccomp and capabilities: Even within the container isolation model, seccomp and capabilities provide defense in depth. The default seccomp profile blocks ~44 dangerous syscalls. Dropping all capabilities (--cap-drop=ALL) and adding back only what is needed minimizes the blast radius of a compromised container.

io/thecodeforge/security_isolation.shBASH
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
#!/bin/bash
# Security isolation inspection and hardening

# ── Check container security features ────────────────────────────────────────

# Check seccomp profile (syscall filtering)
docker inspect <container> --format '{{.HostConfig.SecurityOpt}}'
# Output: [seccomp=/path/to/profile.json] or [seccomp=unconfined]
# Default profile blocks ~44 dangerous syscalls out of ~300+

# Check if container is running as root
docker exec <container> id
# uid=0(root) = running as root (bad in production)
# uid=1000(appuser) = running as non-root (good)

# Check capabilities (fine-grained privilege control)
docker inspect <container> --format '{{.HostConfig.CapAdd}} {{.HostConfig.CapDrop}}'
# CapDrop: [ALL] CapAdd: [NET_BIND_SERVICE] = minimal privileges

# Check AppArmor profile
docker inspect <container> --format '{{.AppArmorProfile}}'
# docker-default = AppArmor is active (good)
# unconfined = no AppArmor (bad in production)

# ── Check if running on gVisor (user-space kernel) ───────────────────────────
docker info | grep -i runtime
# runsc = gVisor runtime (enhanced isolation)
# runc = standard runtime (standard isolation)

# Run a container with gVisor
docker run --runtime=runsc --rm alpine:3.19 dmesg | head -5
# gVisor intercepts syscalls — dmesg output differs from standard Linux

# ── Check VM isolation (inside a VM) ─────────────────────────────────────────
# Each VM has its own kernel — verify with different kernel versions
docker run --rm alpine:3.19 uname -r  # Shows host kernel
# Inside VM: uname -r  # Shows guest kernel (can be different)

# Check if the hypervisor exposes hardware virtualization
egrep -c '(vmx|svm)' /proc/cpuinfo
# > 0 = hardware virtualization available

# ── Kernel CVE check (critical for container hosts) ──────────────────────────
# Check kernel version
uname -r

# Cross-reference with known CVEs
# Example: Dirty Pipe affects kernels 5.8 through 5.16.10
# If uname -r shows 5.10.0-amd64, the host is vulnerable
# Fix: apt update && apt upgrade linux-image-$(uname -r)
Output
# Container security check:
[seccomp=/etc/docker/seccomp/default.json]
uid=1000(appuser) gid=1000(appgroup)
CapDrop: [ALL] CapAdd: [NET_BIND_SERVICE]
docker-default
# gVisor runtime:
runtimes: runsc
# Kernel version check:
5.10.0-18-amd64
# This kernel version is vulnerable to Dirty Pipe (CVE-2022-0847)
# Must be patched to 5.10.104+ or 5.15.26+
Security Isolation as Walls vs Rules
  • The kernel is the most privileged code on the system — it controls all hardware access, memory, and processes.
  • A kernel vulnerability allows any process (including container processes) to bypass all isolation mechanisms.
  • VMs have a separate kernel per instance — a vulnerability in one kernel does not affect others.
  • Containers mitigate this with seccomp and AppArmor, but these are kernel features — they cannot protect against kernel bugs.
Production Insight
The seccomp default profile blocks ~44 dangerous syscalls (mount, reboot, kexec_load, etc.) but allows the rest. For high-security environments, create a custom seccomp profile that blocks all syscalls except those required by your application. This dramatically reduces the attack surface. Use strace or auditd to determine which syscalls your application actually uses, then build a minimal profile.
Key Takeaway
VMs isolate at the kernel level — a kernel CVE in one VM does not affect others. Containers share the host kernel — a kernel CVE affects all containers. For single-tenant workloads, container isolation is sufficient. For multi-tenant or untrusted code, use gVisor, Kata Containers, or Firecracker.
Security Isolation Selection
IfSingle-tenant workload, trusted code, controlled patching
UseStandard containers with seccomp, AppArmor, non-root user, and dropped capabilities.
IfMulti-tenant workload, untrusted customer code
UsegVisor (runsc) for moderate overhead or Firecracker/Kata for full VM isolation.
IfCompliance requirement (PCI-DSS, SOC 2) mandating kernel isolation
UseVMs. Compliance auditors typically require a separate kernel per tenant.
IfServerless platform (running arbitrary customer functions)
UseFirecracker microVMs. AWS Lambda uses this — 125ms VM startup, 5MB overhead per VM.

Operational Trade-offs: Scaling, Density, Patching, and Debugging

Beyond architecture and performance, the operational differences between VMs and containers determine day-to-day engineering velocity.

Scaling speed: Containers scale in seconds — start a new container, it is ready to serve traffic in 1-2 seconds. VMs scale in minutes — boot a new VM, wait for cloud-init, install dependencies, start the application. For auto-scaling workloads that respond to traffic spikes, containers are the only option that provides sub-minute scaling.

Density: On the same hardware, you can run 10-50x more containers than VMs. A server with 64GB RAM might run 10-15 VMs (each consuming 2-4GB for the guest OS alone) or 100-200 containers (each consuming 50-200MB for the application only). This density difference directly impacts infrastructure cost.

Patching: VM patching requires updating the guest OS inside each VM — either manually, with configuration management (Ansible, Puppet), or with golden image rebuilds. Container patching requires rebuilding the image with an updated base layer and redeploying — a single docker build && docker push. Container patching is faster and more reproducible because the image is immutable.

Debugging: VMs provide a full OS environment — you can SSH in, install debugging tools, inspect logs, and run diagnostics. Containers are minimal by design — many production containers do not have a shell, let alone debugging tools. Debugging containers requires docker exec (if a shell exists), docker logs, or sidecar containers with debugging tools.

Networking: VMs typically use the hypervisor's virtual switch (vSwitch) or the cloud provider's VPC networking. Containers use software-defined networking (bridge, overlay, macvlan). VM networking is simpler to reason about (standard IP networking). Container networking adds complexity (DNS-based service discovery, overlay encapsulation, ingress routing mesh) but provides better integration with orchestration platforms.

Immutability: Container images are immutable — once built, they do not change. Deployments replace the entire container with a new image. This eliminates configuration drift. VMs are mutable by default — you can SSH in and modify the filesystem. Configuration drift in VMs is a common source of 'works on staging but not production' bugs.

io/thecodeforge/operational_comparison.shBASH
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
#!/bin/bash
# Operational comparison: scaling, density, patching, and debugging

# ── Scaling: container vs VM auto-scaling ─────────────────────────────────────

# Container: scale from 1 to 10 replicas in seconds
docker compose up -d --scale api=10
# All 10 containers are ready in 2-5 seconds

# VM: scale from 1 to 10 instances (AWS example)
aws autoscaling set-desired-capacity \
  --auto-scaling-group-name my-asg \
  --desired-capacity 10
# New VMs take 2-5 minutes to boot, run cloud-init, and become healthy

# ── Density: compare resource usage ──────────────────────────────────────────

# Container: check resource usage per container
docker stats --no-stream --format '{{.Name}}: {{.MemUsage}}'
# Typical output:
# api-1: 85MiB / 15.55GiB
# api-2: 92MiB / 15.55GiB
# postgres: 120MiB / 15.55GiB
# Total: ~300MB for 3 containers

# VM: check resource usage per VM (inside each VM)
free -h
# Typical output:
# total: 3.8GiB  used: 1.2GiB  (OS overhead alone)
# Total: 1.2GB per VM just for the OS, before the application starts

# ── Patching: container rebuild vs VM patching ───────────────────────────────

# Container: rebuild with updated base image
docker build --no-cache -t my-app:patched .
docker push my-app:patched
# Entire patch process: 2-5 minutes, fully automated, reproducible

# VM: patch guest OS (run inside VM)
apt update && apt upgrade -y
# Or rebuild golden image with packer/ansible
# Entire patch process: 10-30 minutes per VM, or hours for golden image rebuild

# ── Debugging: container vs VM ───────────────────────────────────────────────

# Container: exec into running container
docker exec -it <container> sh
# Limited tools — production containers often have no shell

# Container: use a debug sidecar
docker run --rm -it --pid=container:<target> --net=container:<target> \
  nicolaka/netshoot bash
# Full debugging toolkit without modifying the production container

# VM: SSH into running VM
ssh user@vm-ip
# Full OS environment — install any debugging tool
Output
# Container scaling:
[+] Running 10/10
✔ Container api-1 Started
✔ Container api-2 Started
...
✔ Container api-10 Started
# All ready in 3.2 seconds
# Container density:
api-1: 85MiB / 15.55GiB
api-2: 92MiB / 15.55GiB
postgres: 120MiB / 15.55GiB
# 3 containers using ~300MB total
# VM density (same 64GB server):
# 10-15 VMs (each using 2-4GB for OS overhead)
# vs 100-200 containers (each using 50-200MB for app only)
Operational Overhead as Friction
  • Debugging: VMs have a full OS with all tools available. Containers are minimal and often lack a shell.
  • Networking: VM networking is standard IP networking. Container networking adds abstraction layers (DNS, overlay, routing mesh).
  • Compliance: auditors understand VMs. Container isolation requires more explanation and evidence.
  • Legacy applications: some applications require systemd, specific kernel modules, or full OS features that only VMs provide.
Production Insight
The density advantage of containers has a hidden cost: resource contention. Running 200 containers on a 64GB server means each container has ~320MB of headroom. A single memory leak in one container can trigger OOM kills across the server, affecting unrelated containers. Always set memory limits (--memory) on every production container and monitor host-level resource usage with docker stats and Prometheus node_exporter.
Key Takeaway
Containers scale in seconds, VMs scale in minutes. Containers are 10-50x denser than VMs. Container patching is a single image rebuild; VM patching requires per-instance updates. VMs have an advantage in debugging (full OS) and networking (standard IP). Choose based on deployment frequency and operational maturity.
Operational Strategy Selection
IfTeam deploys multiple times per day, needs fast scaling
UseContainers. Sub-second startup, automated patching, fast rollbacks.
IfTeam deploys weekly, has dedicated ops team managing VMs
UseVMs are acceptable. The operational overhead is amortized over longer deployment cycles.
IfNeed to debug complex production issues interactively
UseVMs have an advantage — full OS with all tools. For containers, use debug sidecars (nicolaka/netshoot).
IfRunning 50+ services on shared infrastructure
UseContainers with orchestration (Kubernetes, ECS). Density and automation advantages dominate.

The Hybrid Middle Ground: gVisor, Kata Containers, and Firecracker

The containerization vs virtualization debate is not binary. Three technologies provide hybrid approaches that combine the best of both worlds — at the cost of added complexity.

gVisor (Google): A user-space kernel that intercepts container syscalls and implements them in Go. The container process never directly touches the host kernel. gVisor implements ~70 of the ~400 Linux syscalls, filtering out the rest. This dramatically reduces the attack surface while maintaining container-like startup speed (1-2 seconds). The trade-off: 2-10% performance overhead and limited syscall compatibility (some applications do not work with gVisor).

Kata Containers: Runs each container in a lightweight VM with its own kernel. Provides VM-level isolation with container-like management (Docker, Kubernetes integration). Each Kata container is a microVM — it starts in 1-3 seconds and uses 20-50MB of overhead. The trade-off: higher overhead than standard containers but lower than full VMs.

Firecracker (AWS): A microVM technology designed for serverless workloads. AWS Lambda and Fargate use Firecracker to run each function in its own microVM. Firecracker starts a VM in 125ms with 5MB of memory overhead. The trade-off: limited device support (no GPU, no USB), designed for short-lived workloads, and requires KVM support.

When to use each: - gVisor: moderate-security multi-tenant workloads where syscall compatibility is acceptable - Kata Containers: high-security multi-tenant workloads requiring a real kernel per tenant - Firecracker: serverless platforms running short-lived, stateless functions

The cost of hybrid approaches: gVisor adds 2-10% overhead. Kata adds 10-20% overhead. Firecracker adds 3-8% overhead. All three add operational complexity — custom runtimes, different debugging workflows, and limited ecosystem support compared to standard containers or full VMs. Use them when the security benefit justifies the complexity cost.

io/thecodeforge/hybrid_runtimes.shBASH
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
#!/bin/bash
# Configure and compare hybrid runtimes

# ── gVisor: user-space kernel ────────────────────────────────────────────────

# Install gVisor
(
  set -e
  ARCH=$(uname -m)
  URL="https://storage.googleapis.com/gvisor/releases/release/latest/${ARCH}"
  wget ${URL}/runsc ${URL}/runsc.sha512 \
    ${URL}/containerd-shim-runsc-v1 ${URL}/containerd-shim-runsc-v1.sha512
  sha512sum -c runsc.sha512 -c containerd-shim-runsc-v1.sha512
  rm -f *.sha512
  chmod a+rx runsc containerd-shim-runsc-v1
  sudo mv runsc containerd-shim-runsc-v1 /usr/local/bin
)

# Configure Docker to use gVisor
cat <<EOF | sudo tee /etc/docker/daemon.json
{
  "runtimes": {
    "runsc": {
      "path": "/usr/local/bin/runsc",
      "runtimeArgs": ["--platform=systrap"]
    }
  }
}
EOF
sudo systemctl restart docker

# Run a container with gVisor
docker run --runtime=runsc --rm alpine:3.19 uname -a
# Output shows gVisor kernel info instead of host kernel

# ── Kata Containers: lightweight VMs ────────────────────────────────────────

# Install Kata Containers (Ubuntu)
sudo apt install -y kata-runtime kata-proxy kata-shim

# Configure Docker to use Kata
cat <<EOF | sudo tee /etc/docker/daemon.json
{
  "runtimes": {
    "kata": {
      "path": "/usr/bin/kata-runtime"
    }
  }
}
EOF
sudo systemctl restart docker

# Run a container with Kata (it is actually a VM)
docker run --runtime=kata --rm alpine:3.19 dmesg | head -3
# Output shows a separate kernel — this is a VM, not a container

# ── Compare startup times ────────────────────────────────────────────────────
echo '--- Standard container ---'
time docker run --rm alpine:3.19 echo done
# ~0.3s

echo '--- gVisor container ---'
time docker run --runtime=runsc --rm alpine:3.19 echo done
# ~0.5s (2x slower than standard, but still fast)

echo '--- Kata container (microVM) ---'
time docker run --runtime=kata --rm alpine:3.19 echo done
# ~1.5s (5x slower, but provides full kernel isolation)
Output
# Standard container:
done
real 0m0.312s
# gVisor container:
done
real 0m0.543s
# Kata container (microVM):
done
real 0m1.487s
Hybrid Runtimes as Security Layers
  • gVisor has lower overhead (2-10%) vs Kata (10-20%) because it does not run a full VM.
  • gVisor starts faster (~0.5s) vs Kata (~1.5s) because there is no VM boot process.
  • Kata provides stronger isolation (real kernel per tenant) but at higher cost.
  • Choose gVisor for moderate-security workloads. Choose Kata for high-security or compliance-driven workloads.
Production Insight
AWS Lambda uses Firecracker microVMs to achieve both isolation and speed. Each Lambda function runs in its own microVM that starts in 125ms. This is the hybrid approach that proved the containerization vs virtualization debate is not binary — you can have near-container speed with near-VM isolation. If you are building a serverless platform, study Firecracker's architecture.
Key Takeaway
The containerization vs virtualization choice is not binary. gVisor provides a user-space kernel for moderate isolation with low overhead. Kata Containers provides full VM isolation with container-like management. Firecracker provides microVMs that start in 125ms. Choose the hybrid approach that matches your security requirements and performance budget.

Cost Analysis: Infrastructure Spend, Operational Overhead, and Hidden Costs

The cost difference between containerization and virtualization extends beyond the infrastructure bill. It includes operational overhead, scaling efficiency, and hidden costs that appear at scale.

Infrastructure cost: Containers are 10-50x denser than VMs. A workload that requires 20 VMs (each t3.medium at $30/month = $600/month) might run on 5 containers on a single c5.xlarge ($130/month). The savings compound at scale — a team running 200 microservices saves $10K-50K/month by using containers instead of VMs.

Operational cost: VMs require more operational overhead — OS patching, configuration management, monitoring agents per VM, and manual scaling. Containers are patched by rebuilding an image (automated in CI/CD), configured declaratively (Docker Compose, Kubernetes), and scaled automatically by orchestrators. The operational savings are harder to quantify but often exceed the infrastructure savings.

Hidden costs of containers: - Resource limit enforcement: without --memory and --cpus, one container can starve others. Enforcing limits requires monitoring and tuning. - Orchestration complexity: Kubernetes adds a layer of complexity that requires dedicated platform engineers. - Security hardening: container hosts require kernel patching, seccomp profiles, and network policies — all of which require expertise. - Image storage: Docker images consume registry storage. Without cleanup policies, storage costs grow unbounded.

Hidden costs of VMs: - Over-provisioning: teams often provision VMs larger than needed to avoid performance issues. This wastes 30-50% of allocated resources. - Configuration drift: VMs are mutable. Over time, manual changes create drift that makes reproducibility impossible. - Boot time: VMs take 15-60 seconds to boot. Auto-scaling must over-provision to handle traffic spikes, wasting resources during normal load.

io/thecodeforge/cost_analysis.shBASH
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
#!/bin/bash
# Compare infrastructure costs between VMs and containers

# ── VM cost calculation (AWS example) ────────────────────────────────────────
# 20 microservices, each on a t3.medium (2 vCPU, 4GB RAM)
VM_COUNT=20
VM_COST_PER_MONTH=30  # t3.medium on-demand price
TOTAL_VM_COST=$((VM_COUNT * VM_COST_PER_MONTH))
echo "VM cost: $VM_COUNT VMs x \$ $VM_COST_PER_MONTH/month = \$ $TOTAL_VM_COST/month"

# ── Container cost calculation (AWS EKS example) ─────────────────────────────
# Same 20 microservices on 3 c5.xlarge nodes (4 vCPU, 8GB RAM each)
NODE_COUNT=3
NODE_COST_PER_MONTH=130  # c5.xlarge on-demand price
EKS_COST=75  # EKS cluster management fee
TOTAL_CONTAINER_COST=$((NODE_COUNT * NODE_COST_PER_MONTH + EKS_COST))
echo "Container cost: $NODE_COUNT nodes x \$ $NODE_COST_PER_MONTH/month + \$ $EKS_COST EKS fee = \$ $TOTAL_CONTAINER_COST/month"

# ── Savings ──────────────────────────────────────────────────────────────────
SAVINGS=$((TOTAL_VM_COST - TOTAL_CONTAINER_COST))
PERCENT_SAVED=$((SAVINGS * 100 / TOTAL_VM_COST))
echo "Monthly savings: \$ $SAVINGS ($PERCENT_SAVED% reduction)"

# ── Operational overhead comparison ──────────────────────────────────────────
echo ""
echo "Operational overhead per month:"
echo "VM patching (20 VMs x 30 min): 10 hours"
echo "Container patching (rebuild + deploy): 30 minutes"
echo "VM scaling (manual or ASG lag): 5-15 min per event"
echo "Container scaling (Kubernetes HPA): 10-30 sec per event"
echo "VM monitoring agents (20 instances): 20 agents"
echo "Container monitoring (DaemonSet): 1 agent per node (3 total)"
Output
# VM cost:
VM cost: 20 VMs x $30/month = $600/month
# Container cost:
Container cost: 3 nodes x $130/month + $75 EKS fee = $465/month
# Savings:
Monthly savings: $135 (22% reduction)
# Operational overhead:
VM patching (20 VMs x 30 min): 10 hours
Container patching (rebuild + deploy): 30 minutes
VM scaling (manual or ASG lag): 5-15 min per event
Container scaling (Kubernetes HPA): 10-30 sec per event
VM monitoring agents (20 instances): 20 agents
Container monitoring (DaemonSet): 1 agent per node (3 total)
Cost as Iceberg
  • Multi-tenant environments where the shared kernel risk justifies the infrastructure premium.
  • Compliance requirements that mandate kernel-level isolation (PCI-DSS, SOC 2).
  • Legacy applications that cannot be containerized without significant refactoring.
  • Workloads that require GPU passthrough, USB devices, or specific kernel modules.
Production Insight
The biggest hidden cost of containers is orchestration complexity. Kubernetes requires dedicated platform engineers to operate — networking, storage, RBAC, upgrades, and debugging. A team that saves $10K/month on infrastructure but needs to hire a $150K/year platform engineer is not saving money. Factor in operational expertise when comparing costs.
Key Takeaway
Containers save 20-80% on infrastructure costs through density. Operational savings from automated patching and scaling often exceed infrastructure savings. The hidden cost of containers is orchestration complexity — factor in platform engineering headcount. The hidden cost of VMs is over-provisioning and configuration drift.
● Production incidentPOST-MORTEMseverity: high

Cloud Migration from VMs to Containers Saves $40K/Month but Introduces Noisy Neighbor Outages

Symptom
Multiple services reported 503 errors simultaneously. Kubernetes pods were being OOM-killed and rescheduled. The cluster's aggregate memory usage spiked to 95% within 10 minutes. Pods from unrelated services were being evicted. The team checked pod events: 'The node was low on resource: memory. Container X was using 1.2Gi, which exceeds its request of 256Mi.'
Assumption
The team assumed a traffic spike was consuming more memory than expected. They checked application metrics — traffic was normal. They assumed a Kubernetes bug — they checked the kubelet logs, which showed normal scheduling behavior. They assumed a node-level issue — they checked the underlying EC2 instance, which had plenty of free memory.
Root cause
One service had a memory leak that grew from 256Mi to 1.2Gi over 6 hours. The container had no memory limit (--memory was not set in the deployment spec). The container consumed the node's available memory. The kernel OOM killer selected processes to kill based on oom_score — it killed pods from unrelated services that happened to have higher oom_score values. In the VM setup, each service had its own VM with a fixed 2GB RAM — a memory leak in one VM could not affect other VMs. The migration to shared container infrastructure removed this isolation boundary.
Fix
1. Added memory limits to every container: --resources.limits.memory based on load testing. 2. Added memory requests that match limits (to disable overcommit for critical services). 3. Deployed resource quotas per namespace to prevent any team from consuming more than their allocation. 4. Added Prometheus alerts for container memory usage exceeding 80% of limit. 5. Kept the most critical services (payment, auth) on dedicated node pools with taints and tolerations. 6. Documented that containerization trades VM-level isolation for density and cost savings — and that resource limits are mandatory, not optional.
Key lesson
  • VMs provide per-instance isolation — a resource leak in one VM cannot affect others. Containers share nodes — without resource limits, one container can starve others.
  • Resource limits (--memory, --cpu) are mandatory in shared container environments. Without them, the kernel OOM killer may kill the wrong container.
  • When migrating from VMs to containers, the isolation model changes fundamentally. Audit every resource limit before migration.
  • Keep the most critical services on dedicated node pools with taints and tolerations. This restores VM-like isolation for the services that need it most.
  • The cost savings from containerization are real ($40K/month in this case), but they come with an operational responsibility to enforce resource boundaries.
Production debug guideFrom noisy neighbors to kernel panics — systematic debugging paths.6 entries
Symptom · 01
Container performance degraded — CPU or I/O latency spiked without application changes.
Fix
Check for noisy neighbors — other containers on the same host competing for resources. Run docker stats to see CPU and memory usage per container. Check cgroup limits: cat /sys/fs/cgroup/cpu/<container-cgroup>/cpu.shares. If no limits are set, one container can starve others. Fix: set --cpus and --memory limits on all production containers.
Symptom · 02
VM startup takes 5+ minutes, delaying auto-scaling during traffic spikes.
Fix
Check if the VM is using a full OS image vs a minimal image. Check if cloud-init or first-boot scripts are running. Check hypervisor resource contention. Fix: use pre-baked AMI/images with applications already installed. Consider containers for workloads that need sub-second scaling.
Symptom · 03
Container escape suspected — process running on host outside of any container.
Fix
Check host processes: ps aux | grep -v 'docker\|containerd'. Check /proc for unexpected processes. Check kernel version for known CVEs: uname -r and cross-reference with CVE databases. Fix: isolate the host, patch the kernel, investigate the escape vector, and migrate to gVisor or Kata if running untrusted code.
Symptom · 04
VM memory overhead consuming too much host RAM — fewer VMs fit than expected.
Fix
Check guest OS memory usage: free -h inside each VM. Check hypervisor overhead: the hypervisor itself consumes memory for each VM (typically 30-100MB per VM). Check if memory overcommit is enabled. Fix: use containers for workloads that do not need full OS isolation. Enable KSM (Kernel Same-page Merging) for VM memory deduplication.
Symptom · 05
Container network performance is 20-30% slower than expected.
Fix
Check if the container is using the bridge driver (adds NAT overhead) or host networking. Check if VXLAN overlay is in use (adds encapsulation overhead). Run iperf3 between containers and compare with host-to-host. Fix: use host networking for latency-sensitive workloads. Use macvlan for direct L2 access. Optimize MTU for overlay networks.
Symptom · 06
VM disk I/O is slow — database queries take 3x longer than on bare metal.
Fix
Check if the VM is using virtio drivers (paravirtualized) or emulated drivers. Check disk scheduler: cat /sys/block/vda/queue/scheduler. Check if the hypervisor storage backend is overcommitted. Fix: use virtio-blk or virtio-scsi drivers. Use NVMe passthrough for latency-sensitive workloads. Switch to containers with direct host filesystem access for databases.
★ Containerization vs Virtualization Triage Cheat SheetFirst-response commands when performance degradation, isolation concerns, or resource contention is reported.
Container performance degraded — noisy neighbor suspected.
Immediate action
Check per-container resource usage and cgroup limits.
Commands
docker stats --no-stream
cat /sys/fs/cgroup/memory/docker/<container-id>/memory.limit_in_bytes
Fix now
Set --cpus and --memory limits on all production containers. Use --cpus=1.0 --memory=512m as starting point.
VM startup is slow — auto-scaling cannot keep up with traffic.+
Immediate action
Check VM boot time and cloud-init duration.
Commands
systemd-analyze blame (inside VM)
cloud-init analyze show (inside VM)
Fix now
Use pre-baked AMIs with applications installed. Consider containers for sub-second scaling requirements.
Suspected container escape — unexpected process on host.+
Immediate action
Isolate the host and check for kernel CVEs.
Commands
uname -r && apt list --installed 2>/dev/null | grep linux-image
ps aux | grep -v 'dockerd\|containerd\|docker' | grep -v grep
Fix now
Patch kernel immediately. Migrate to gVisor or Kata Containers for untrusted workloads. Rotate all secrets accessible from the host.
VM memory overhead too high — cannot fit expected number of VMs.+
Immediate action
Check per-VM memory usage and hypervisor overhead.
Commands
virsh dommemstat <vm-name> (KVM) or esxtop (VMware)
free -h (inside each VM)
Fix now
Enable KSM for memory deduplication. Use containers for workloads that do not need full OS isolation.
Container network latency is higher than expected.+
Immediate action
Check network driver and overlay configuration.
Commands
docker network inspect <network> --format '{{.Driver}}'
iperf3 -c <target-container-ip> (from inside container)
Fix now
Use host networking for latency-sensitive workloads. Check MTU settings for overlay networks (should be 1450 for VXLAN, not 1500).
VM disk I/O is slow — database queries degraded.+
Immediate action
Check disk driver and hypervisor storage backend.
Commands
lsblk -o NAME,TYPE,TRAN (inside VM — check for virtio)
iostat -x 1 5 (inside VM)
Fix now
Ensure virtio-blk or virtio-scsi drivers are used. Use NVMe passthrough for latency-sensitive databases. Consider containers with direct host filesystem access.
Containerization vs Virtualization: Complete Comparison
AspectContainersVirtual MachinesHybrid (gVisor/Kata/Firecracker)
Isolation boundaryOS-level (namespaces, cgroups)Hardware-level (hypervisor)User-space kernel (gVisor) or microVM (Kata/Firecracker)
KernelShared host kernelSeparate kernel per VMUser-space kernel (gVisor) or separate kernel (Kata/Firecracker)
Startup time0.3-2 seconds15-60 seconds (full boot), 1-5s (snapshot)0.5s (gVisor), 1.5s (Kata), 0.125s (Firecracker)
Memory overhead1-50MB per container512MB-2GB per VM (guest OS)5-50MB (gVisor), 20-50MB (Kata), 5MB (Firecracker)
CPU overhead<2%5-15%2-10% (gVisor), 5-15% (Kata), 3-8% (Firecracker)
Disk I/O overhead<5% (bind mount)10-30% (virtio), 50%+ (emulated)5-15% (gVisor), 10-20% (Kata)
Density (per 64GB host)100-200 containers10-15 VMs50-100 (gVisor), 30-60 (Kata), 100+ (Firecracker)
Security isolationGood (seccomp, AppArmor)Strong (separate kernel)Strong (gVisor syscall filtering) or Strong (Kata/Firecracker separate kernel)
Multi-tenant safeNo (shared kernel)Yes (separate kernel)Yes (all three)
ImmutabilityYes (images are immutable)No (mutable by default)Yes (all three)
Patching speedMinutes (rebuild image)Hours (update VM or rebuild golden image)Minutes (rebuild image with new runtime)
Infrastructure costLow (high density)High (low density)Medium (moderate density)
Operational complexityMedium (orchestration required)Low (standard OS management)High (custom runtimes, limited ecosystem)
Best forMicroservices, CI/CD, stateless appsLegacy apps, strong isolation, complianceMulti-tenant SaaS, serverless, moderate security

Key takeaways

1
Containers share the host kernel
they start in milliseconds and use megabytes of memory. VMs have a separate kernel — they are heavier but provide stronger isolation.
2
The shared kernel is the fundamental security trade-off. A kernel CVE affects all containers on the host. For multi-tenant or untrusted workloads, use gVisor, Kata, or Firecracker.
3
Containers deliver near-native performance (<2% overhead). VMs add 5-15% overhead. The biggest gap is disk I/O
always use virtio drivers in VMs.
4
Containers scale in seconds, VMs scale in minutes. Containers are 10-50x denser. Choose based on deployment frequency and scaling requirements.
5
The containerization vs virtualization debate is not binary. gVisor, Kata Containers, and Firecracker provide hybrid approaches that combine container-like speed with VM-like isolation.
6
Infrastructure cost savings from containers are real (20-80%), but factor in orchestration complexity and platform engineering headcount for total cost of ownership.
INTERVIEW PREP · PRACTICE MODE

Interview Questions on This Topic

FAQ · 6 QUESTIONS

Frequently Asked Questions

01
Are containers less secure than VMs?
02
When should I use a VM instead of a container?
03
How much slower are VMs compared to containers?
04
What is gVisor and when should I use it?
05
Can I run containers inside a VM?
06
How do I calculate the total cost of ownership for containers vs VMs?
🔥

That's Docker. Mark it forged?

10 min read · try the examples if you haven't

Previous
Introduction to Docker
2 / 18 · Docker
Next
Docker vs Virtual Machine