Signed-off-by: Serge Hallyn serge.hal...@canonical.com
---
templates/lxc-ubuntu.in |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/templates/lxc-ubuntu.in b/templates/lxc-ubuntu.in
index 2be8680..d116f4c 100644
--- a/templates/lxc-ubuntu.in
+++
Particularly for LTS releases, which many people will want to use in
their containers, it is not wise to not use release-security and
release-updates. Furthermore the fix allowing ssh to allow the container
to shut down is in lucid-updates only.
With this patch, after debootstrapping a
Quoting Ulli Horlacher (frams...@rus.uni-stuttgart.de):
On Mon 2011-10-24 (18:56), Ulli Horlacher wrote:
vms1 is an Ubuntu 10.04 based host system (4 * Xeon 64bit) with:
root@vms1:/lxc# uname -a
Linux vms1 2.6.38-11-server #50~lucid1-Ubuntu SMP Tue Sep 13 22:10:53 UTC
2011 x86_64
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
On 10/24/2011 02:07 PM, Ulli Horlacher wrote:
On Mon 2011-10-24 (12:03), Greg Kurz wrote:
C/R and live migration is a complicated matter for LXC containers.
I have assumed nothing else...
No status for the moment... I guess people who
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
On 09/14/2011 10:27 PM, Serge E. Hallyn wrote:
Otherwise you get 'lxc.utsname =' in config, instead of the
actual hostname being filled in.
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/850205
Index: lxc/src/lxc/lxc-clone.in
Hi
Quoting Ulli Horlacher (frams...@rus.uni-stuttgart.de):
vms1 is an Ubuntu 10.04 based host system (4 * Xeon 64bit) with:
root@vms1:/lxc# uname -a
Linux vms1 2.6.38-11-server #50~lucid1-Ubuntu SMP Tue Sep 13 22:10:53 UTC
2011 x86_64 GNU/Linux
root@vms1:/lxc# lxc-version
lxc version:
Quoting Daniel Baumann (daniel.baum...@progress-technologies.net):
On 10/20/2011 11:25 AM, Clemens Perz wrote:
does anybody know about a minimized, actively maintained distribution,
that brings everything to run a container, and thats it?
being a debian developer (and maintainer of lxc in
Quoting Ulli Horlacher (frams...@rus.uni-stuttgart.de):
On Thu 2011-10-20 (09:00), Papp Tamas wrote:
On 10/20/2011 12:54 AM, Ulli Horlacher wrote:
On Wed 2011-10-19 (22:11), Papp Tamas wrote:
What version of lxc package do you use?
See my first mail:
lxc version: 0.7.4.1
Quoting Ulli Horlacher (frams...@rus.uni-stuttgart.de):
On Thu 2011-10-20 (16:39), Ulli Horlacher wrote:
On Thu 2011-10-20 (09:18), Serge E. Hallyn wrote:
And everytime I run lxc-start I get a new veth interface:
root@vms1:/lxc# ifconfig | grep veth
vethCmnezx Link
Quoting Ryan Campbell (ryan.campb...@gmail.com):
fedora 13
lxc 0.7.2-1.fc13
I've used lxc-setcap to allow non-root to run lxc-start. This seems to
work OK, until LXC attempts to launch init. Init fails with init:
Need to be root.
I would expect init to be launched using the 0 UID of
Quoting Papp Tamas (tom...@martos.bme.hu):
On 10/18/2011 04:47 PM, Serge E. Hallyn wrote:
http://wiki.ubuntu.com/UserNamespace
I've got a few patches to send yet for tightening down some remaining
privilege leaks, then we should be ready to start relaxing things to make
them usable
Quoting LACROIX Jean Marc (jeanmarc.lacr...@free.fr):
hi mailing list,
I am running Debian Squeeze (V6.02) container with lxc 0.7.2-1
I have a problem with autofs daemon on lxc container
We know there are some problems with autofs and namespaces. If you try
to automount a dir in a container
Quoting Jäkel, Guido (g.jae...@dnb.de):
I think there is about 80% overlap between the two projects but
enough differences to be interesting. I'll take a closer look at your
script looking for ideas I may have missed, and I invite you to do the same.
@Derek: well-spoken.
@Daniel
Quoting Ulli Horlacher (frams...@rus.uni-stuttgart.de):
On Thu 2011-10-06 (09:14), Ulli Horlacher wrote:
Then attach the patch to the bug making sure that it's flagged as a
patch. This should ensure someone will look at it, sadly not for Oneiric
(11.10) but hopefully for Precise
Quoting Derek Simkowiak (de...@simkowiak.net):
Hello,
I have just published a new Open Source LXC container creation
script, called lxc-ubuntu-x. It implements all the latest best
practices I found on the web, and introduces some new features. I am
using this script in a
Quoting Daniel Baumann (daniel.baum...@progress-technologies.net):
On 09/30/2011 03:21 PM, Serge E. Hallyn wrote:
Thanks, Derek, at a first glance this looks pretty neat. I'll have to
try it out (and package it, if noone else does) when I get a bit more time.
i think it's the wrong
Quoting Thomas Schweikle (t...@vr-web.de):
Hi!
I'd like to migrate containers from one host to an other while they
are running. Is this possible? It is for kvm guests. For lxc-guests too?
No. Some people are working on a new set of checkpoint/restart patches,
but that'll be awhile and might
Quoting Robert Pendell (shi...@elite-systems.org):
python crash
Traceback (most recent call last):
File /home/shinji/trunk/chromite/bin/parallel_emerge, line 116, in
module
KILLED = multiprocessing.Event()
File /usr/lib64/python2.6/multiprocessing/__init__.py, line 206, in
Event
Quoting Mark Clarkson (mark.clark...@smorg.co.uk):
Hi,
On a Fedora 15 host (systemd) with lxc 0.7.5, centos container fails to
start:
... mountpoint for old rootfs is '/usr/local/lib/lxc/rootfs/mnt'
... ERRORlxc_conf - Invalid argument - pivot_root syscall failed
... ERROR
Quoting Arie Skliarouk (sklia...@gmail.com):
I want to bind-mount an directory inside of a running container.
If I mount the directory using bind mount, the container does not see
files in it.
It is important to me to be able to do the mounts and umounts from the
host machine, as we are
Quoting Kristian Kirilov (d3v1...@d3v1ous.info):
...
lxc-checkconfig show this status:
blackbird:~# lxc-checkconfig
Kernel config /proc/config.gz not found, looking in other places...
Found kernel config file /boot/config-3.0.4
--- Namespaces ---
Namespaces: enabled
Utsname namespace:
If multiple cgroups are mounted under /sys/fs/cgroup, then the
original check ends up looking for /sys/fs/cgroup/cgroup.clone_children,
which does not exist because that is just a tmpfs.
So make sure to check an actual cgroupfs.
Signed-off-by: Serge Hallyn serge.hal...@canonical.com
---
In addition to needing info Iliyan mentioned - what kernel are you running?
Is it a standard backport kernel? Do you know if a kernel update coincides
with the performance degredation showing up?
Quoting Iliyan Stoyanov (i...@ilf.me):
Hi Ivan,
you should probably do a monitoring with iostat
End the command with ';', which is needed, and put the hostname in
quotes (which doesn't really seem needed, but shown in man page).
Signed-off-by: Serge Hallyn serge.hal...@canonical.com
---
src/lxc/lxc-clone.in |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git
Otherwise you get 'lxc.utsname =' in config, instead of the
actual hostname being filled in.
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/850205
Index: lxc/src/lxc/lxc-clone.in
===
--- lxc.orig/src/lxc/lxc-clone.in
Quoting Axel Schöner (axel.schoe...@gmx.de):
Hello,
i need some feedback and suggestions for this project. If there are
similar solutions please let me know.
I want to build a solution for creating and starting a container on user
login
(via ssh or shell). The user should be
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
On 08/04/2011 04:30 PM, Serge E. Hallyn wrote:
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
On 07/28/2011 08:19 PM, Serge E. Hallyn wrote:
It breaks with multiple cgroup mounts unless /etc/mtab is linked
to /proc/self/mounts (which
This is more consistent with other lxc commands
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/820720
Index: ephemeral/src/lxc/lxc-ps.in
===
--- ephemeral.orig/src/lxc/lxc-ps.in2011-08-03 22:28:39.854937920 -0500
Hi, do you have any objections to this patch? It adds a '-Q' option
to lxc-monitor to have lxc-monitor quit when the monitored container
stops.
This is used by lxc-start-ephemeral to track a container's death.
Index: ephemeral/src/lxc/lxc_monitor.c
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
On 07/28/2011 08:19 PM, Serge E. Hallyn wrote:
It breaks with multiple cgroup mounts unless /etc/mtab is linked
to /proc/self/mounts (which it is not in Ubuntu, for instance).
Signed-off-by: Serge Hallyn serge.hal...@canonical.com
Hi
like lxc-ps and lxc-ls, lxc-netstat breaks if there is not an 'lxc' cgroup
mount and /etc/mtab is not a link to /proc/mounts.
Author: Serge Hallyn serge.hal...@canonical.com
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/819319
Forwarded: no
Index: lxc/src/lxc/lxc-netstat.in
If ns cgroup is mounted, then when lxc-unshare runs, the kernel automatically
creates a new cgroup for the task. So lxc-unshare tries to delete it. But
if ns cgroup is not mounted, that cgroup does not get created, and now
lxc-unshare spits an error.
Author: Serge Hallyn
Quoting Andre Nathan (an...@digirati.com.br):
Hi Mike
On Wed, 2011-08-03 at 17:52 -0400, Michael H. Warfield wrote:
That's v4 syntax. Does it not work at all? Did you try this:
echo ::/0 @ /smack/netlabel
Not having tried this myself at all, I'm just asking. If it doesn't
Quoting Iliyan ILF Stoyanov (i...@ilf.me):
On the other side, would someone be so kind to point me in the right
direction (either documentation, source or anything else available) that
I can follow so that I set up lxc container just with the LXC tools. I
Ramez Hanna has posted a new fedora
Otherwise apt fails during and after debootstrap.
Signed-off-by: Serge Hallyn serge.hal...@canonical.com
Index: lxc-0.7.4.2/templates/lxc-ubuntu.in
===
--- lxc-0.7.4.2.orig/templates/lxc-ubuntu.in2011-07-27 16:32:44.297421437
It breaks with multiple cgroup mounts unless /etc/mtab is linked
to /proc/self/mounts (which it is not in Ubuntu, for instance).
Signed-off-by: Serge Hallyn serge.hal...@canonical.com
Index: lxc/src/lxc/lxc-ps.in
===
---
If /var/run is a symlink to /run in the container, then opening
/proc/pid/root/var/run/utmp will end up opening the host's utmp.
Therefore the hack detecting shutdown through utmp fails.
Signed-off-by: Serge Hallyn serge.hal...@canonical.com
Index: lxc/src/lxc/utmp.c
Quoting Vinay Wagh (vinay.h.w...@gmail.com):
Hi,
I had an architectural question on containers. I wanted to use containers to
run multiple instances of the same application with different resource
allocation (CPU, memory). The problem is that I have user/kernel space
drivers that access
When '-b user' is specified to lxc-ubuntu container creation template, do
not automatically add all the groups of which user is a member on the host,
to user's groups in the container.
Signed-off-by: Serge Hallyn serge.hal...@ubuntu.com
---
templates/lxc-ubuntu.in |3 ---
1 files changed, 0
Quoting Devendra K. Modium (dmod...@isi.edu):
Hi All
I am trying to run the Ubuntu LXC container on top
of RHEL. Everything runs fine. /sbin/init , console dhcpclient etc.
But even though sshd demon gets started. I am not able to ssh into the
container.
I debbuged and noticed that
Quoting C Anthony Risinger (anth...@xtfx.me):
there it would seem. however, while i could *maybe* see the rootfs
being an unconditional slave, i would NOT want to see any lxc
default/enforcement preventing container - host propagation on a
globally recursive scale. im of the opinion that the
Quoting Michael H. Warfield (m...@wittsend.com):
On Tue, 2011-07-19 at 13:34 -0500, Serge E. Hallyn wrote:
Quoting C Anthony Risinger (anth...@xtfx.me):
there it would seem. however, while i could *maybe* see the rootfs
being an unconditional slave, i would NOT want to see any lxc
(sorry, just realized postfix has been messing up my email)
Quoting Michael H. Warfield (m...@wittsend.com):
Unfortunately, I also still find that if there's a -o remount,ro in the
halt/reboot script, it still sets /dev/pts to ro and that still
propagates to the host and to the other
(sorry, just realized postfix has been messing up my email, hope this
comes through ok)
Quoting C Anthony Risinger (anth...@xtfx.me):
On Jul 15, 2011 12:01 PM, Michael H. Warfield m...@wittsend.com wrote:
Unfortunately, I also still find that if there's a -o remount,ro in the
halt/reboot
Quoting Joerg Gollnick (code4lxc+l...@wurzelbenutzer.de):
Hello Serge,
I think that the main point is the initial setup of the cgroup (directory)
structure.
systemd
tmpfs on /sys/fs/cgroup type tmpfs (rw,nosuid,nodev,noexec,relatime,mode=755)
cgroup on /sys/fs/cgroup/systemd type cgroup
Quoting Papp Tamas (tom...@martos.bme.hu):
On 2011-07-18 15:14, Serge E. Hallyn wrote:
It should be possible, but you have to set it up in advance. You can
create a /lxcshare directory on the host, make sure it is slave
(mount --make-rslave /lxcshare) and bind-mount that into the container
Quoting C Anthony Risinger (anth...@xtfx.me):
You'd also need to --make-shared the host mount before --bind'ing and
--make-slave'ing to the container ... by default mounts are --private.
Not with all distros, but it's definately the safe and right thing to
do, good point.
thanks,
-serge
With this patch, lxc works for me both with all cgroups mounted with
ns cgroup on /cgroup, and with libcgroup mounting all cgroups
separately.
To do this, instead of looking for one cgroup called 'lxc' or
otherwise taking the first cgroup we find, we actually create a
container in every mounted
(sorry for the extra traffic.)
With this patch, lxc works for me both with all cgroups mounted with
ns cgroup on /cgroup, and with libcgroup mounting all cgroups
separately.
To do this, instead of looking for one cgroup called 'lxc' or
otherwise taking the first cgroup we find, we actually
Quoting Michael H. Warfield (m...@wittsend.com):
cd /sys/fs/cgroup
for d in `/bin/ls`; do
echo 1 $d/cgroup.clone_children
done
Doing this step alone broke lxc totally for me, with or without the
patch below. This was on Fedora 15 testing with lxc 0.7.4.2 as well as
Do
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
fedora 15 has a patched kernel with utrace.
By patched, you mean utrace is not upstream?
Are we sure, utrace is pid namespace aware ?
I've not looked at it, no.
My natty container booted on fedora 15 but is stuck at:
\_ lxc-start -n natty
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
I reported the problem some month ago.
https://bugzilla.redhat.com/show_bug.cgi?id=636210
When running a debian container, there is no problem.
Dude, does redhat have a maintainer for the package? I think
they informally closed the bug
Quoting Michael H. Warfield (m...@wittsend.com):
On Sun, 2011-06-26 at 14:00 -0500, Serge E. Hallyn wrote:
Quoting Michael H. Warfield (m...@wittsend.com):
Thanks, Michael, good catch.
Now wait a minute. Is that a typo here:
No it's not, but:
char *s = index(retbuf
Gah! Wrong patch. Here is the right one. Sorry about that.
Subject: [PATCH 3/2] lxc-ubuntu template: set lxc.arch in config
Otherwise the container works fine, except uname -a reports x86_64,
not i686.
And unfortunately debootstrap and lxc.arch each accept only the
opposite of each other
Argh, sorry. But this is it. Now it works again :)
Now I'm going to stop with patches for a bit, and just keep stuff
in
https://code.launchpad.net/~serge-hallyn/ubuntu/oneiric/lxc/update-templates/
Signed-off-by: Serge Hallyn serge.hal...@ubuntu.com
---
templates/lxc-ubuntu.in |6 +-
This way I can do
lxc-create -t ubuntu -f /etc/lxc.conf -n u1 -- -x
and have -x passed to the template
Signed-off-by: Serge Hallyn serge.hal...@ubuntu.com
---
src/lxc/lxc-create.in |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/src/lxc/lxc-create.in
Otherwise the container works fine, except uname -a reports x86_64,
not i686.
And unfortunately debootstrap and lxc.arch each accept only the
opposite of each other (i386 vs i686) :)
Signed-off-by: Serge Hallyn serge.hal...@ubuntu.com
---
templates/lxc-ubuntu.in |9 +++--
1 files
Create an lxc-clone script to clone containers. It should probably
be factored into helpers and then enhanced, in particular to convert
between LVM and non-LVM containers, create non-snapshot LVM clones,
support loopback devices, and, when stable enough, to use
overlayfs, btrfs, etc.
But this is
Quoting Trent W. Buck (t...@cyber.com.au):
Serge Hallyn serge.hal...@canonical.com
writes:
Next, upstart's mountall consults /lib/init/fstab. That's the one
which will usually prevent container startup from proceeding. The
lxcguest package for ubuntu will force upstart to mount an
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
What do you think is the best way to do this? We could allow the user
to specify a 'firstboot' script, which gets copied into root directory
of the container. Maybe boot the container when it's done, run
/firstboot.sh, and shut down. Or just
Quoting Justin Cormack (jus...@specialbusservice.com):
How do I make sure my container does have a private network namespace?
Network namespaces are enabled on my system, but I cant find the
documentation anywhere about how to turn this on when I create a
container (only the clone
I've replaced most of my previous use of kvm and cloud instances for bug
investigations with lxc instances. To emulate my older workflows, I've
created lxc-clone. My diff against the current natty lxc package is
attached. I've written up how I use this at s3hh.wordpress.com. Briefly,
I have a
Quoting Justin Cormack (jus...@specialbusservice.com):
On Wed, 2011-03-30 at 10:32 -0500, Serge E. Hallyn wrote:
Quoting Justin Cormack (jus...@specialbusservice.com):
This one didnt work...
lxc.utsname = vm1
lxc.tty = 4
lxc.network.type = veth
lxc.network.flags = up
Quoting Ramez Hanna (rha...@informatiq.org):
I have been working on a fedora template that actually works
febootstrap is not anymore producing fedora rootfs but rather a minimal
Really, febootstrap can't be used to create a rootfs at all any more?
fedora appliance
my solution works by using
Quoting Goran Cetusic (goran.cetu...@gmail.com):
I'm running hundreds of nodes executing commands at startup. Not really
suitable.
I don't understand what you mean by that. Does it just mean you don't
have time to port the kernel patch and send it to lkml?
The answer to your other email,
Quoting Christoph Mitasch (cmita...@thomas-krenn.com):
Hi,
I just resolved it, it was related to Apparmor on the host.
The host has a rule regarding bind (/etc/apparmor.d/usr.sbin.named), but
bind has changed the pid file from Lenny (/var/run/bind/run/named.pid)
to Squeeze
Let me first off admit that I have not gotten checkpoint/restart
to work with the ckpt-v23-rc1-pids tree. But hopefully this will
help make it easier to debug that.
Ideally (and eventually), the lxc toolsuite will be used for
checkpoint/restart. However, c/r is too unflexible and lxc too
Quoting Geordy Korte (gko...@gmail.com):
On Wed, Mar 16, 2011 at 3:00 PM, Daniel Lezcano daniel.lezc...@free.frwrote:
On 03/16/2011 02:16 PM, Serge E. Hallyn wrote:
Had some time to spare and decided that I would pitch in. Attached a
simple
dialog system that will allow you to start
Quoting Matt Rechenburg (m...@openqrm.com):
Dear LXC Team,
thanks again for the great work! Really like lxc.
I would like to ask about the status of checkpoint/restore functionality
in lxc.
Just checked the latest tools and got lxc-checkpoint: 'checkpoint'
function not implemented
Quoting Stuart Johnson (stu...@stu.org.uk):
maybe just define what you want. Gathering ideas could/would inspire
someone to implement it.
Regards
Erkan
Ideally I want a simple ncurses application that shows you what
containers are active, and allows simple functionality, such as
Quoting Trent W. Buck (trentb...@gmail.com):
I have a container that autobuilds packages (debs with pbuilder, live
CDs with live-build). These scripts use chroots, and want to populate
(but not use) a bunch of device files within the chroot's /dev.
I found that to make this work, I need to
Quoting Trent W. Buck (t...@cybersource.com.au):
Serge E. Hallyn serge.hal...@canonical.com
writes:
Quoting Trent W. Buck (trentb...@gmail.com):
A race condition in my containers means that occasionally
/var/run/screen/ isn't present when startup finishes and I SSH in.
This results
Quoting Patrick Westphal (patrick.westp...@inqbus.de):
Am 20.01.2011 16:29, schrieb Sergio Daniel Troiano:
Andre,
I'm using Slackware and i've compiled lxc-7.2 because when i tried
to use lxc-7.3 i couldnt mount anything within the container.
You have to create a root enviroment , i use
Quoting Cal Webster (cwebs...@ec.rr.com):
I've looked at OpenVZ but it apparently cannot coexist with SELinux,
Do you know why? Do you have any references for this?
-serge
--
Protect Your Site and Customers from
Quoting Reiner Herrmann (rei...@reiner-h.de):
I have hardlinked some files into an lxc container to share them with
someone. The files belong to uid 1000 on the host, but inside the
container there also exists a user with uid 1000.
Because they have the same uid, the user from the container is
Quoting Cal Webster (cwebs...@ec.rr.com):
On Fri, 2011-01-14 at 11:59 -0600, Serge E. Hallyn wrote:
Quoting Cal Webster (cwebs...@ec.rr.com):
I've looked at OpenVZ but it apparently cannot coexist with SELinux,
Do you know why? Do you have any references for this?
None of the OpenVZ
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
On 11/29/2010 03:53 PM, Serge E. Hallyn wrote:
Hi,
at UDS-N we had a session on 'fine-tuning containers'. The focus was
things we can do in the next few months to improve containers. The
meeting proeedings can be found at
https
Hi,
at UDS-N we had a session on 'fine-tuning containers'. The focus was
things we can do in the next few months to improve containers. The
meeting proeedings can be found at
https://wiki.ubuntu.com/UDSProceedings/N/CloudInfrastructure#Make%20LXC%20ready%20for%20production
We have a few work
Quoting Brian K. White (br...@aljex.com):
On 12/13/2010 1:03 PM, Stéphane Graber wrote:
On Tue, 2010-11-30 at 03:06 +, Serge E. Hallyn wrote:
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
On 11/29/2010 03:53 PM, Serge E. Hallyn wrote:
Hi,
at UDS-N we had a session on 'fine
Quoting Trent W. Buck (t...@cybersource.com.au):
Serge E. Hallyn serge.hal...@canonical.com
writes:
Quoting Trent W. Buck (t...@cybersource.com.au):
Unfortunately, lxc 0.7's utmp detect requires /var/run to NOT be a
tmpfs. The shipped lxc-ubuntu script works around this by deleting
Quoting Trent W. Buck (t...@cybersource.com.au):
Unfortunately, lxc 0.7's utmp detect requires /var/run to NOT be a
tmpfs. The shipped lxc-ubuntu script works around this by deleting the
ifstate file and not mounting a tmpfs on /var/run, but to me that is
simply waiting for something else to
Quoting Matt Rechenburg (m...@openqrm.com):
Hi Lxc team,
actually I would vote against a loop mount.
Note that this wouldn't take the place of LVMs :) But since
LVMs require you to have installed your distro in a particular
way to begin with (or add a new disk), not everyone is able
to use
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
On 11/30/2010 04:06 AM, Serge E. Hallyn wrote:
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
Looks like we'll be starting small anyway, so let's just try skype. Anyone
interested in joining, please send me your skype id.
What
Quoting Michael H. Warfield (m...@wittsend.com):
It seems to me that a little extension to lxc-create which creates
the container inside a loopback fs would be pretty neat.
Wouldn't simply adding the rootfs to the fstab conf with the file system
image and the -o loop option do it? I
Quoting Trent W. Buck (trentb...@gmail.com):
Serge E. Hallyn serge.hal...@canonical.com
writes:
Quoting Trent W. Buck (t...@cybersource.com.au):
I encountered, isolated, and worked around this issue.
Symptom: gettys don't start in the container. runlevel(8) reports
unknown instead
A few comments:
1. To remove the directories, rmdir all descendent directories. I'd
think something like 'find . -type d -print0 | xargs rmdir' would
do.
2. You can prevent this from happening by using a notify-on-release
handler.
3. This should stop happening when lxc (soon) switches
Quoting Brian K. White (br...@aljex.com):
On 11/5/2010 1:34 PM, Serge E. Hallyn wrote:
A few comments:
1. To remove the directories, rmdir all descendent directories. I'd
think something like 'find . -type d -print0 | xargs rmdir' would
do.
I can't delete _anything_
Quoting Brian K. White (br...@aljex.com):
I don't know how to track down if there is possibly some process that is
part of the cgroup even though lxc-ps doesn't show any.
Examine every single process and verify that it's part of the host or
another container until I find one I can't account
Quoting Miroslav Lednicky (ledni...@avonet.cz):
Hello,
it is the same problem as I have may be:
http://sourceforge.net/mailarchive/forum.php?thread_name=4CD297E2.2030806%40avonet.czforum_name=lxc-users
I don't know what can I do with it.
Server reboot is necessary ...
I fired
Quoting Brian K. White (br...@aljex.com):
! wait, you are saying just ignore the fact that there are files in
the directories and try to remove the directories, uh directly?
nj9:~ # find /cgroup/nj10-014 -type d -delete
nj9:~ # ls -lR /cgroup/nj10-014
ls: cannot access
Quoting Walter Stanish (walter.stan...@saffrondigital.com):
Therefore I humbly propose:
- the establishment of /var/lib/lxc as the default top-level
directory for guest filesystems
AFAICS we are still using /var/cache/lxc right now.
Hrrm interesting, I haven't seen that come through
Quoting Pierre-François Bonnefoi (pierre-francois.bonne...@unilim.fr):
hello,
I've encountered a new problem :
I would like to decrease the disk usage of my container by sharing some big
directories.
When I try to share the /lib directory between my host under Ubuntu 10.04
with my guest
Quoting Mark C. Hawkins (mhawk...@medalist.com.au):
I setup a couple of lucid containers using bodhi.zazen post @
http://blog.bodhizazen.net/linux/lxc-configure-ubuntu-lucid-containers/
Instead of using debootstrap I downloaded some pre-made containers from some
source.
Part of the
Quoting Walter Stanish (walter.stan...@saffrondigital.com):
http://lxc.git.sourceforge.net/git/gitweb.cgi?p=lxc/lxc;a=commitdiff_plain;h=c01d62f21b21ba6c2b8b78ab3c2b37cc8f8fd265
This commit only moves the location of the 'templates', which are
just scripts that install a guest fs. It
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
On 10/20/2010 04:32 PM, Lionel.BAILLERGEAU wrote:
Hello,
I'm trying to set-up a NFS server on one of my containers.
Everything goes fine (portmap, NFS statd, mounting nfsd filesystem
in /proc and rpc.mountd are OK...) but when I try to
Quoting richard -rw- weinberger (richard.weinber...@gmail.com):
On Tue, Oct 5, 2010 at 11:23 AM, Daniel Lezcano daniel.lezc...@free.fr
wrote:
Yep. The cgroup can be remounted in the container but you can prevent the
access to the directory with SMACK or SeLinux. There is a good document at
Quoting Daniel Lezcano (daniel.lezc...@free.fr):
On 10/04/2010 10:54 PM, richard -rw- weinberger wrote:
Hi Daniel!
On Mon, Oct 4, 2010 at 9:51 PM, Daniel Lezcanodaniel.lezc...@free.fr
wrote:
On 10/04/2010 06:18 PM, richard -rw- weinberger wrote:
On Sun, Oct 3, 2010 at
Quoting John Lewis (jle...@johnlewis.ie):
Hi All,
I created a new container the other week using the template script
bundled with the latest stable version of LXC. I figured it would
probably be ok to do that even though I only have the userspace tools
that come with Ubuntu 10.04 (0.6.5
Hi,
Ubuntu releases are developed in 6 month cycles. Right now we are
in the planning stages for the next release, Natty Narwhal. We are
collecting ideas for features or feature pieces for that cycle. For
server specifically, we are doing so at
https://wiki.ubuntu.com/ServerTeam/NattyIdeaPool.
Quoting l...@jelmail.com (l...@jelmail.com):
Hi, I just tried to mount a filesystem in a container and I got this:
[root ~]# lxc-start -n mycontainer
lxc-start: Operation not permitted - failed to mount '/dev/sdd1' on
'/srv/lxc/mycontainer/mnt'
lxc-start: failed to setup the mounts for
1 - 100 of 125 matches
Mail list logo