Quoting Sebastian Bachmann (m...@free-minds.net):
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi,
> We are currently migrating from openvz to lxc and now we facing a
> problem which can be solved quickly but this would cause other trouble
> I'm trying to prevent.
> We had in all our VZ Containers a directory mounted from the host,
> which contains configs and shared stuff. This is now really mandatory
> for all containers, so it would be bad if we woudnt have it anymore.
> we solved the problem on the OpenVZ side with a common-mount script
> which gets the VZID from the config file and mounts the stuff into
> /var/lib/vz/root/$VZID/shared/folder
> 
> so we need the same thing for lxc... Otherwise we would have to put in
> the mount path into every lxc config file and for about 30 LXC's this
> would create a mess...
> 
> I found this Post on the mailinglist:
> http://www.mail-archive.com/lxc-devel@lists.sourceforge.net/msg01204.html

Doesn't look like that's made it in.  Don't remember noticing that patch
before (sorry, Andre), but it looks like a worthwhile feature, +1 from me.

> which says something about excactly what we would need. is this
> feature allready implemented? I couldnt find anything in the man page
> that it would...
> 
> with this feature we could write a common-config file which is
> included into every lxc config and could work, beside one fact: how
> does the common script know where to mount? Is is possible to use
> variables inside the config? so is the lxc.rootfs also a variable, i
> can use in my config?

Assuming you mean to replace the $rootfs in the mount target spot,
don't!  Just use the relative pathname.  I.e.

lxc.mount.entry = proc    proc   proc    nodev,noexec,nosuid 0 0
lxc.mount.entry = /shared shared none    bind 0 0

> thanks a lot, maybe someone has come up with a solution allready!
> 
> sebastian
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.12 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
> 
> iQEcBAEBAgAGBQJPmFbLAAoJEAhgHfpCPcybyAoH/3e2Zj2GbOVxaO0OWDigBvaT
> wvIPPAYqMONt5hmLZnYDZuBttHaLMcx9JWCNQB8wCaB4gS54XPoAXDvlNjiFfUN7
> lZvs+PnuBl6ODvawGRjTCtQK1zzZQQmqwq5MMB/2Sk6uOz024Uk7AJrBSprAZvbQ
> BcsFewEhzVNmS33vTsg3DY7/2jSYFeWJq7wZHIiSkBfoBR0XjKKxPQxSh7p82BBg
> gPf1+0VGCgEU6yuMXUuLKv6Z9WZzUvNr27hSOFq+w5UHXFeihK17bpDprSjWX4xT
> xITjni7Z/616l9uhzZmR5aI0WWBKz9U3C4gcY2n03SRuCOE00VciLBORofY1cYo=
> =5Q1Q
> -----END PGP SIGNATURE-----
> 
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and 
> threat landscape has changed and how IT managers can respond. Discussions 
> will include endpoint security, mobile security and the latest in malware 
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Lxc-users mailing list
> Lxc-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/lxc-users

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Lxc-users mailing list
Lxc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-users

Reply via email to