Run containers as isolated microVMs with hardware-level security, fast startup, and production-ready orchestration features.
# Initialize a cluster in one command
curl -fsSL https://swarmcracker.restuhaqza.dev/install.sh | sudo bash -s -- init
# Join workers to the cluster
swarmcracker join <manager-ip>:4242 --token SWMTKN-1-...
Production-grade container orchestration with microVM isolation
Each container gets its own kernel via KVM, providing hardware-level security and strong workload isolation.
Services, scaling, rolling updates, secrets management - all the features you expect from modern orchestration.
MicroVMs boot in milliseconds with minimal overhead, combining container speed with VM security.
KVM virtualization provides stronger isolation than container namespaces, protecting against kernel exploits.
Cross-node VM communication with VXLAN overlay networks, supporting multi-node clusters out of the box.
Zero-downtime deployments with health monitoring and automatic rollback on failure.
From container image to isolated microVM in seconds
Run swarmcracker init to set up the manager node with automatic token generation.
Worker nodes join the cluster using the provided token, forming a SwarmKit cluster.
Deploy container images that automatically run as isolated Firecracker microVMs.
Scale services, perform rolling updates, and monitor health through SwarmKit.
Get started in minutes with our automated installer
# Initialize a new SwarmCracker cluster
curl -fsSL https://swarmcracker.restuhaqza.dev/install.sh | sudo bash -s -- init
# With VXLAN overlay (multi-node)
curl -fsSL https://swarmcracker.restuhaqza.dev/install.sh | sudo bash -s -- init \
--vxlan-enabled \
--vxlan-peers 192.168.1.11,192.168.1.12
# Get join token for workers
sudo cat /var/lib/swarmkit/join-tokens.txt
Join the growing community of developers using SwarmCracker for secure, isolated container orchestration.
View on GitHub