#LinuxContainers

N-gated Hacker Newsngate
2025-11-14

Linux Containers have decided that making yet another immutable Linux OS is exactly what the world needs right now. 🤦‍♂️ With a riveting lineup of documentation, downloads, and mailing lists, they’ve clearly cornered the market in "absolutely no one needs this" features. 📬👏
linuxcontainers.org/incus-os/

Hacker Newsh4ckernews
2025-11-14
2022-01-07

Proxmox 7.0 - Netzwerk-Bug korrigieren, System anpassen und erkunden

tube.tchncs.de/w/72FFtsE7XGpvM

2025-09-09

Good news for everyone working with #LXC and #Incus containers: Rocky and Alma Linux 10 container are now available!

The official image server of the #linuxcontainers project added version 10 of #rockylinux and #almalinux at the end of August.

geekersdigest.com/rocky-alma-l

2025-08-30
I recently rebuilt my 4x Raspberry Pi 4 Incus cluster. I fully broke it while upgrading from Raspberry Pi OS "bookworm" to "trixie".

In the rebuild I upgraded to "trixie" when "bookworm" was freshly installed as the first thing I did and it went flawlessly.

I had a lot of troubles setting up the VLAN for the Incus nodes with NetworkManager and therefore went back to the "ifupdown" and "vlan" packages. I locked myself out multiple times and had to connect the SSDs to my laptop to edit the /etc/network/interfaces file that way to get back in. It was a hassle. I surely have to find out how to set up VLANs with NetworkManager. But now the nodes are on the right VLAN and I use macvlans for my containers in my cluster to use different VLANs.

I also had to install "resolvconf" to get DNS working with ifupdown.

The installation and setup of the Incus cluster itself was really easy and without problems. The documentation is really good.

Link: https://linuxcontainers.org/incus/

I just hope Debian (Raspberry Pi OS) won't drop the "ifupdown" and "vlan" packages in future releases, so I can upgrade to future releases easily and without hassle. Next time I'll wait until the new release is out, but I'm not really sure what broke the system. It just didn't recognize a root drive after reboot and there was no PARTUUID for it even when I plugged the drive to my laptop.

But however, now I have my own arm64 cloud to tinker with it again.

#RaspberryPi #Debian #Incus #LinuxContainers #NetworkManager
N-gated Hacker Newsngate
2025-06-26

🎩✨ Behold, the marvel of Apptainer: the magical name change from that will revolutionize your Linux container universe by... being exactly like every other container system but with more labels. 🌟🔒 Rejoice as your software components remain safely ensconced in their digital dungeons, as you navigate the labyrinthine to inspect your secured, portable future. 🤖🔍
apptainer.org/

N-gated Hacker Newsngate
2025-06-09

🚀 Ah, yes, the groundbreaking innovation of running Linux containers on using Swift—because what better way to assert dominance than by shoving penguins into an Apple-shaped prison? 🍏🐧 Meanwhile, is busy selling snake oil to help you "write better code," because your code was definitely the problem, not the entire tech industry’s obsession with reinventing the wheel. 🛞🔄
github.com/apple/containerizat

Hacker Newsh4ckernews
2025-06-09

Containerization is a Swift package for running Linux containers on macOS

github.com/apple/containerizat

LINUXexpert.orglinuxexpert
2024-08-04

🚀Understanding and Setting Up Linux Containers (LXCs) 🚀

Learn about LXCs, their use cases, and why they might be the right choice over Docker. Follow our step-by-step guide to set up an LXC container with MariaDB. Perfect for developers, testers, and sysadmins looking for efficient and secure containerization solutions!

🔗 Read more: linuxexpert.org/understanding-

[nate@social0 ~]$ :idle:gangrif@undrground.org
2024-06-24

Podman can run container images that were build for Docker. Did you know that? It doesnt end there though, the podman command-line is designed to be near identical to dockers, to make it easy for folks who want to switch, and the podman-docker compatibility package makes it even easier. Check it out now on episode 110 of Into the Terminal!

youtube.com/watch?v=kNxQeJ4uOH

#redhat #linux #rhel #containers #podman #docker #linuxcontainers

[nate@social0 ~]$ :idle:gangrif@undrground.org
2024-06-20

Moving from docker to podman might sound daunting, if you're looking for some examples of the podman docker compatibility layer, check out this episode of Into the Terminal!

youtube.com/watch?v=kNxQeJ4uOH

#redhat #linux #rhel #containers #podman #docker #linuxcontainers

[nate@social0 ~]$ :idle:gangrif@undrground.org
2024-06-18

Can podman actually replace docker? Check out episode 110 of Into the Terminal, where I'm demonstrating just how easy it is to switch!

youtube.com/watch?v=kNxQeJ4uOH

#redhat #linux #rhel #containers #podman #docker #linuxcontainers

Multi Purr Puss :verified:platymew@layer8.space
2024-04-23

@ubuntu #LinuxContainers; of course, i'm a mere benign #HomeLab 'er, who runs a PiHole container, and a #Nextcloud VM (a full vm, because i need encrypted [meta-]data at rest, for my highly personal files and documents - that pesky privacy thing) 😉

Multi Purr Puss :verified:platymew@layer8.space
2024-04-23

@ubuntu #LinuxContainers; it's the old thing about "credentials you have" versus "credentials you KNOW"! AFAIK, passwords "i know" (human brain storage) is more secure than "credentials i have".

I DO NOT want ANYONE, with access to my browser (and its imported cert), to have full root access to all my containers/VMs!🧵

Multi Purr Puss :verified:platymew@layer8.space
2024-04-23

@ubuntu #LinuxContainers; currently (in the noble server RC), i have to import an auth cert into my browser, in order to be granted access to the fancy new web GUI of #lxd

Here's the #threatModel; everyone, who can access my browser, WILL have full root access (via terminal or console) to all my containers (or VMs).

That's why i'd prefer some kind of session-based auth - you know, a "logout" button.🧵

Multi Purr Puss :verified:platymew@layer8.space
2024-04-23

Bumbling around with pre-release preview ISOs of #Ubuntu #Server #Noble #LTS (24.04); i think i'll wait those few days, till the actual public release, and test again.

#Incus, the "more FLOSSy"(?) fork of Canonical #LXD (afaik), will be available via apt/deb repos, also.

That Browser-Cert-based auth bothers me - i want a proper session-based "login/logout"! (i want to log out of "full root access to everything" - it's a peace of mind thing) ← @ubuntu, Cc: #LinuxContainers

edit: It's a thread🧵

2024-01-13

I'm slowly catching up with the implications of Canonical's move to pull #LXD out of the #linuxcontainers project. That's a problem since it will only increase entanglement with Canonical's tools and services. I followed some of the tutorials by @stgraber, who now works on Incus the non-entangled alternative to LXD. I also understand that Ubuntu FAN doesn't have a place in this ecosystem. I've now decided to look for a new design of my cluster using #Debian and #incus.
linuxcontainers.org/lxd/

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst