Home Blog Page 846

CoreOS CTO: Containers Are the Next Linux Package Manager

brandon-philips-coreOSWhen they founded CoreOS, Brandon Philips and Alex Polvi set out to essentially redesign the Linux operating system for distributed systems.

They  began by looking at the areas where they thought the whole server infrastructure space could be improved. Then zeroed in on one of the hurdles of distributed systems: deployments — including application lifecycle management. They also realized that managing the lifecycle of all the files on disk — the traditional job of a package manager — is really hard.

“Package management has kind of failed in a lot of ways to be generic enough for people that aren’t distro maintainers to keep and manage them,” said Philips. “You don’t see a lot of organizations building their internal applications into debs and rpms; if they do, then those are very sophisticated ones and even they are a kind of challenge.”

They considered how to build an operating system for distributed systems that would also improve package management, including properties such as reproducibility, atomic rollback, and updates.

The result of their efforts is CoreOS, an open source, Linux-based operating system designed specifically for clusters, which also provides tools for managing applications inside containers. But the goal to redesign Linux package management for distributed systems has not yet been realized, in part due to a lack of standards around container technology.

Built on Docker

When they started prototyping CoreOS Linux, there was only one fundamental requirement to build CoreOS Linux: containers. Containers, of course, are not new in the Linux world, but at the time, they were misunderstood by the market. Their importance had yet to be recognized.

Then, when Philips and Polvi were close to finalizing the CoreOS product, they learned about Docker. Because Docker is an open source project, it fit in very well with what the CoreOS team was envisioning in a distributed system. The first release of CoreOS shipped with two components: etcd, the distributed system, and Docker runtime, runC. And, according to the CoreOS website, the main building block of CoreOS is the Docker container engine, where applications and code run.

A Split from Docker

Docker and CoreOS were kind of made for each other. CoreOS was the sort of minimalistic, always updated Linux distribution necessary to deploy containers and applications. But, as Docker started to grow bigger, it also started to expand its scope, and some differences cropped up.

“We have been building our product very heavily around Docker. But there were a number of things that we really wanted to influence at the Docker open source project,” said Philips. For example, Philips expressed concern that Docker runs as a daemon process that can potentially affect the availability of other processes. He also said they wanted to address signature verification and standard and open image formats, without implicit DNS names.

For a variety of reasons, however, the desired changes were not happening in Docker, so the CoreOS team decided to build a project called rkt (pronounced rocket) that was more in line with their vision of what a container runtime should do. They also introduced a specification called AppC that defines how to run applications in containers.

The CoreOS website states, “We still believe in the original premise of containers that Docker introduced, so we are doing something about it. While we are at it, we are cleaning up and fixing a few things that we’d like to see in a production ready container.” The features that CoreOS believes are important in the design of a container are: composability, security, image distribution, and open formats.

An Open Source Solution

The CoreOS team is not alone; other Docker users, such as Red Hat and Google, share these goals. So, in December of 2015, more than 40 stakeholders, including CoreOS, came together to form the Open Container Initiative (OCI) at The Linux Foundation, with the stated intention of creating open industry standards around container formats and runtime, and harmonizing with existing specifications including AppC. Philips said that so far OCI has focused on what it means for a process to run inside a Linux container.

“Linux containers are made up of all these discrete technologies and trying to standardize what a container means is a great goal,” Philips said. “But we are very far away from accomplishing everything that we wanted to accomplish with AppC and having an actual image format.”

OCI has just begun to tackle image formats and has not yet discussed other fundamental things like naming of containers and signing of images with cryptographic keys. And OCI may never address them because, according to him, some OCI members believe that these concerns are outside the scope of OCI.

So far, the project has focused on developing the open container specifications and the Docker-donated container runtime, runC. But as the technology layers of the stack mature around containers, the project’s scope may expand to other areas  where innovation and acceleration are required.

In the meantime, the Cloud Native Computing Foundation (CNCF), which arose last July with the aim of creating and driving the adoption of a new set of common container technologies, may take on any work that doesn’t fall within the technical path of the OCI.

“If the OCI board says these things are out of scope or we can’t come to technical resolution, then we will put them to CNCF,” Philips said.

Containers Are the Next Package Manager

Philips and his team are concerned about issues like naming, image format, and signing in containers, because Philips believes that they have a responsibility here. “If we do it right, containers are the next evolution of Linux package management,” he said.

Philips went on to say that package management is the reason Linux has been such a success for the past 15 years. He said the convenience of being able to say, “install that thing that I know has a name,” and to have that thing magically appear on your machine, is amazing.

Linux TOP command explained

Top command options:

https://youtu.be/rloSW2TGGjU

Line 1: Gives System present time, up time of the machine, number of users logged in, Load average on system at 1, 5, 15 min interval. Please ignore the values which I mention in the video, which mention load average as 5,10 and 15mins.

Line 2: Gives total number of process on the machine, number of running process, number of sleeping process, number of stopped process, number of Zombie process.

Line 3: Gives you CPU details

Line 4 & 5: Gives RAM and SWAPdetails.

Line 6: To execute top command shortcuts(See below for the list of top command shortcuts ).

From Line 7: dynamically displayed top process results.

Top commands 

shortcuts:

Note: Press below shortcuts at the time of running top command.

l â€“To display or to hide load average line
t â€“To display or to hide task/cpu line
1 â€“To display or hide all other CPU’s
m â€“to display or to hide RAM and SWAP details
s â€“To change the time interval for updating top results(value is in sec’s)
R â€“To sort by PID number
u â€” Press u then username to get only that user process details
P â€“To sort by CPU utilization
M â€“To sort by RAM utilization
c â€“To display or hide command full path
r â€“To renice a process, press r then the PID no then the renice value to renice a process.
k â€“To kill a process, press k then PID number then enter to kill a process
w â€“To save the modified configuration permanently.
q â€“To quit the top command.
h â€“for getting help on top command

Please share your thoughts about this video at the comments section.

 

The Thriving Hunt for 4K/UHD/2160p

elstel.org: The Thriving Hunt for 4K/UHD/2160p

Recent improvements of the Linux kernel make it possible: Enjoying a full 4K/UHD/2160p resolution of 3840×2160 pixels or more even with elder hardware. Many graphics cards which have never been advertised to feature 4K/UHD can be made to display such modes by overclocking your TMDS. While respective changes for the nouveau driver have already been assimilated into the kernel a separate hdmimhz patch is available for the radeon device driver.

How to Configure a Proxmox VE 4 Multiple Node Cluster

In this tutorial, we will build a Proxmox 4 cluster with 3 Proxmox servers and 1 NFS Storage server. Proxmox VE 4 supports the installation of clusters and the central management of multiple Proxmox servers. You can manage multiple Proxmox servers from one web management console. This feature is really handy when you have a larger server farm.

Read more at HowtoForge

How to gzip and keep original file on Linux command line

I would like to compress a log file using gzip Unix command line utility, and I would also like to keep the original file. However, when I use the gzip my-app.log command, results in modifying my log file and renaming it my-app.log.gz. How do I force the gzip command to keep original file while maintaining the original file on Linux or Unix-like system?

Read more…

Linux: Remove duplicate lines from a text file using awk or perl

I have a text file with exact duplicates of lines. I need to remove all those duplicates lines and preserves the order too on Linux or Unix-like system. How do I delete duplicate lines from a text file?

Read more…

Google Rushes Out Emergency Fix for Android Rooting Exploit But Most Phones Remain at Risk

googlenexus6770x578Google says ‘no’ to rooting apps in Google Play and issues an emergency patch for Nexus devices to fix a critical kernel bug. Google is trying to stamp out rooting apps that exploit an unpatched Linux kernel bug affecting all Android devices. 

Google can’t patch the vast majority of Android devices but it has judged that a number of rooting apps are dangerous enough to warrant an unscheduled patch for its own Nexus products. According to an advisory on Friday, the unnamed rooting apps, which are available in Google Play and outside its app store, could lead to a “local permanent device compromise”. Repairing the device would require reflashing the operating system.

Read more at ZDNet News

As Docker Turns 3, CEO Predicts Unabated Growth

Not even VMware invaded the data center as quickly as open source container supplier Docker has in its first three years. In an interview with InformationWeek, CEO Ben Golub offers his vision for the future.

That open source project was launched on March 13, 2013, and neither Solomon Hykes, the project’s lead, nor Ben Golub, CEO of the San Francisco firm, have spent much time looking back. Golub had previously been CEO at Gluster and Plaxo — acquired by Red Hat and Comcast, respectively.

Read more at Information Week

A Bunch of New ARM Hardware Will Be Supported With Linux 4.6

The ARM SoC updates were mailed out on Sunday afternoon for the Linux 4.6 kernel and it provides mainline support for thirteen new SoCs! 

Over a dozen new ARM System-on-a-Chips are new to the mainline Linux 4.6 kernel code. The newly-supported platforms include Axis Artpec-6 SoC (artpec6), TI keystone-k2g, Mediatek MT7623 (mt7623), Allwinner A83T SoC (a83t), NXP i.MX6QP SoC (imx6qp), ST Microelectronics stm32f469, Annapurna Labs Alpine (alpine-v2), Marvell Armada 3700 SoCs (armada-37xx), Marvell Armada 7000/8000 SoCs (armada-7xxx/8xxx), Amlogic S905 (meson-gxbb), Qualcomm Snapdragon 820 (msm8996), …

Read more at Phoronix