#LinuxContainers

N-gated Hacker Newsngate
2025-06-09

🚀 Ah, yes, the groundbreaking innovation of running Linux containers on using Swift—because what better way to assert dominance than by shoving penguins into an Apple-shaped prison? 🍏🐧 Meanwhile, is busy selling snake oil to help you "write better code," because your code was definitely the problem, not the entire tech industry’s obsession with reinventing the wheel. 🛞🔄
github.com/apple/containerizat

Hacker Newsh4ckernews
2025-06-09

Containerization is a Swift package for running Linux containers on macOS

github.com/apple/containerizat

LINUXexpert.orglinuxexpert
2024-08-04

🚀Understanding and Setting Up Linux Containers (LXCs) 🚀

Learn about LXCs, their use cases, and why they might be the right choice over Docker. Follow our step-by-step guide to set up an LXC container with MariaDB. Perfect for developers, testers, and sysadmins looking for efficient and secure containerization solutions!

🔗 Read more: linuxexpert.org/understanding-

[nate@social0 ~]$ :idle:gangrif@undrground.org
2024-06-24

Podman can run container images that were build for Docker. Did you know that? It doesnt end there though, the podman command-line is designed to be near identical to dockers, to make it easy for folks who want to switch, and the podman-docker compatibility package makes it even easier. Check it out now on episode 110 of Into the Terminal!

youtube.com/watch?v=kNxQeJ4uOH

#redhat #linux #rhel #containers #podman #docker #linuxcontainers

[nate@social0 ~]$ :idle:gangrif@undrground.org
2024-06-20

Moving from docker to podman might sound daunting, if you're looking for some examples of the podman docker compatibility layer, check out this episode of Into the Terminal!

youtube.com/watch?v=kNxQeJ4uOH

#redhat #linux #rhel #containers #podman #docker #linuxcontainers

[nate@social0 ~]$ :idle:gangrif@undrground.org
2024-06-18

Can podman actually replace docker? Check out episode 110 of Into the Terminal, where I'm demonstrating just how easy it is to switch!

youtube.com/watch?v=kNxQeJ4uOH

#redhat #linux #rhel #containers #podman #docker #linuxcontainers

Multi Purr Puss :verified:platymew@layer8.space
2024-04-23

@ubuntu #LinuxContainers; of course, i'm a mere benign #HomeLab 'er, who runs a PiHole container, and a #Nextcloud VM (a full vm, because i need encrypted [meta-]data at rest, for my highly personal files and documents - that pesky privacy thing) 😉

Multi Purr Puss :verified:platymew@layer8.space
2024-04-23

@ubuntu #LinuxContainers; it's the old thing about "credentials you have" versus "credentials you KNOW"! AFAIK, passwords "i know" (human brain storage) is more secure than "credentials i have".

I DO NOT want ANYONE, with access to my browser (and its imported cert), to have full root access to all my containers/VMs!🧵

Multi Purr Puss :verified:platymew@layer8.space
2024-04-23

@ubuntu #LinuxContainers; currently (in the noble server RC), i have to import an auth cert into my browser, in order to be granted access to the fancy new web GUI of #lxd

Here's the #threatModel; everyone, who can access my browser, WILL have full root access (via terminal or console) to all my containers (or VMs).

That's why i'd prefer some kind of session-based auth - you know, a "logout" button.🧵

Multi Purr Puss :verified:platymew@layer8.space
2024-04-23

Bumbling around with pre-release preview ISOs of #Ubuntu #Server #Noble #LTS (24.04); i think i'll wait those few days, till the actual public release, and test again.

#Incus, the "more FLOSSy"(?) fork of Canonical #LXD (afaik), will be available via apt/deb repos, also.

That Browser-Cert-based auth bothers me - i want a proper session-based "login/logout"! (i want to log out of "full root access to everything" - it's a peace of mind thing) ← @ubuntu, Cc: #LinuxContainers

edit: It's a thread🧵

2024-01-13

I'm slowly catching up with the implications of Canonical's move to pull #LXD out of the #linuxcontainers project. That's a problem since it will only increase entanglement with Canonical's tools and services. I followed some of the tutorials by @stgraber, who now works on Incus the non-entangled alternative to LXD. I also understand that Ubuntu FAN doesn't have a place in this ecosystem. I've now decided to look for a new design of my cluster using #Debian and #incus.
linuxcontainers.org/lxd/

2023-12-12

Ok, so having a virtual machine or even an LXC to spin docker containers inside is a little bit weird. LXC containers are like docker, but better... I'm thinking about having a separate Linux container for each service.

For now, I have a database as a service inside LXC and a VM for all other things in Docker, restored from a backup from the times before the #Proxmox =)

Will migrate all my services from docker to Linux containers one by one.

#selfhosted #homelab #homeserver #docker #database #startrek #linuxcontainers #lxc

Rev. Kellyn Delgado revkellyn@firefish.social
2023-12-03

#Poll time! Favorite nested #virtualization style?

Not an exhaustive list but common ones I have seen/heard of. How turtley are you?
🐢

#VirtualMachine #LinuxContainers #Docker #LXC #KVM #TurtlesAllTheWayDown #Linux #Windows #computing #technology #InformationTechnology

2023-11-06

Am trying to do some silly networking with #LXC (or #linuxcontainers, I don't know which of these people look at), and am struggling a bit lol.

2023-01-12

Working on a set of tasks grouped under the title "Upgrade Python 3.7 apps to DotNet 6". Good luck wiping the smile from my face.

#python #dotnet #csharp #linuxcontainers

2022-10-30

@xyhhx @cyberfarmer This page on the Arch wiki is certainly a good resource that I've used:
wiki.archlinux.org/title/Linux

And this seems to be a very detailed write-up but I have to damit that I've just glossed over it:
raydenchia.com/linux-container

#LXC #LXD #LinuxContainers

heise online (inoffiziell)heiseonline@squeet.me
2022-09-22
heise+ | Supply-Chain-Security: Container bauen, Schwachstellen entdecken

Containerisierte Anwendungen bringen oft lange und intransparente Abhängigkeitsketten mit sich. Einige Regeln helfen, versteckte Schwachstellen zu entdecken.
Supply-Chain-Security: Container bauen, Schwachstellen entdecken

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst