[lxc-users] Remove garbage lxcbr0 interfaces

2015-07-28 Thread Matlink
doesn't properly refresh the bridge number in such a case. Thanks, -- Matlink - Sysadmin matlink.fr 0x186BB3CA.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ lxc-users mailing list lxc-users

Re: [lxc-users] Run GUI in LXD 2.0+

2017-04-15 Thread Matlink
Well, the lxc 1.0 version didn't require any network stack: it mounted the X11 required files in the container. However in lxc 2.0 I would like a solution like this, not using x2go or ssh X11 forwarding. The ideal solution for me would be to be able to run 'lxc exec test firefox' to run

Re: [lxc-users] Resolve .lxc domain with Ubuntu 17.04

2017-04-17 Thread Matlink
For me, simply adding the lxc bridge IP address to DNS resolvers made me able to resolve *.lxd domains from the host machine. -- Matlink Le 17 avril 2017 13:42:36 GMT+02:00, Simos Xenitellis <simos.li...@googlemail.com> a écrit : >On Thu, Apr 13, 2017 at 10:49 PM, Norberto Bensa >&

[lxc-users] Run GUI in LXD 2.0+

2017-04-14 Thread Matlink
optimal for me). Has someone be able to run GUI via X11-only on LXD 2.0+ ? Thanks, Matlink signature.asc Description: OpenPGP digital signature ___ lxc-users mailing list lxc-users@lists.linuxcontainers.org http://lists.linuxcontainers.org/listinfo

Re: [lxc-users] Resolve .lxc domain with Ubuntu 17.04

2017-04-18 Thread Matlink
Mon, Apr 17, 2017 at 6:23 PM, Norberto Bensa > <nbensa+lxcus...@gmail.com <mailto:nbensa+lxcus...@gmail.com>> wrote: > > That used to work, but from 17.04 (on the desktop editions, both > ubuntu and kubuntu) adding the ip of the bridge to /etc/resolv.conf >

Re: [lxc-users] Resolve .lxc domain with Ubuntu 17.04

2017-04-17 Thread Matlink
Yes, added it via network manager GUI (nm-applet) -- Matlink Le 17 avril 2017 18:44:57 GMT+02:00, Simos Xenitellis <simos.li...@googlemail.com> a écrit : >On Mon, Apr 17, 2017 at 6:16 PM, Matlink <matl...@matlink.fr> wrote: >> For me, simply adding the lxc bridge IP add

Re: [lxc-users] how to set raw.idmap?==?utf-8?q? (bot uid and gid) on container creation?

2017-06-24 Thread Matlink
Try $ lxc launch images:ubuntu/trusty/amd64 testct2 -c "$(echo -e 'raw.idmap=uid 1000 33\ngid 1002 33')" -- Matlink Le 24 juin 2017 05:54:07 GMT+02:00, Tomasz Chmielewski <man...@wpkg.org> a écrit : >This one works: > >$ lxc launch images:ubuntu/trusty/amd64 testct1 -

Re: [lxc-users] UID > 65535 is not correctly mapped

2017-06-15 Thread Matlink
à 19:13, Matlink a écrit : > > Stéphane made a post to anwser this : > > https://stgraber.org/2017/06/15/custom-user-mappings-in-lxd-containers/ > > > Le 14/06/2017 à 16:41, Matlink a écrit : >> >> Hello community, >> >> I wanted to use GUI apps in my c

Re: [lxc-users] UID > 65535 is not correctly mapped

2017-06-15 Thread Matlink
Stéphane made a post to anwser this : https://stgraber.org/2017/06/15/custom-user-mappings-in-lxd-containers/ Le 14/06/2017 à 16:41, Matlink a écrit : > > Hello community, > > I wanted to use GUI apps in my containers, I followed the great howto > here > https://blog.sim

[lxc-users] UID > 65535 is not correctly mapped

2017-06-14 Thread Matlink
ng similar? -- Matlink - Sysadmin matlink.fr Sortez couverts, chiffrez vos mails : https://café-vie-privée.fr/ XMPP/Jabber : matl...@matlink.fr Clé publique PGP : 0x186BB3CA Empreinte Off-the-record : 572174BF 6983EA74 91417CA7 705ED899 DE9D05B2 signature.asc Description: OpenPGP digital

[lxc-users] Processes number limit

2017-12-04 Thread Matlink
Hello, Is it possible, within LXD, to limit the number of processes a container can create, to block any fork bomb attack? I know it's possible from the host and with cgroup, but is there any mechanism included in LXD, such as setting a value in the container configuration? Thanks, -- Matlink

Re: [lxc-users] Processes number limit

2017-12-04 Thread Matlink
Well, I'm answering myself: lxc config set limits.processes 100 Le 04/12/2017 à 14:35, Matlink a écrit : > Hello, > > Is it possible, within LXD, to limit the number of processes a container > can create, to block any fork bomb attack? > > I know it's possible from the ho