Book Image

Containerization with LXC

Book Image

Containerization with LXC

Overview of this book

In recent years, containers have gained wide adoption by businesses running a variety of application loads. This became possible largely due to the advent of kernel namespaces and better resource management with control groups (cgroups). Linux containers (LXC) are a direct implementation of those kernel features that provide operating system level virtualization without the overhead of a hypervisor layer. This book starts by introducing the foundational concepts behind the implementation of LXC, then moves into the practical aspects of installing and configuring LXC containers. Moving on, you will explore container networking, security, and backups. You will also learn how to deploy LXC with technologies like Open Stack and Vagrant. By the end of the book, you will have a solid grasp of how LXC is implemented and how to run production applications in a highly available and scalable way.
Table of Contents (17 chapters)
Containerization with LXC
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Dedication
Preface

Summary


In this chapter, we saw examples on how to deploy containers with alternative technologies to LXC such as OpenVZ and Docker.

OpenVZ is one of the oldest container solutions, and as of this writing it's being rebranded to Virtuozzo. The main difference between LXC and OpenVZ is the custom Linux kernel that OpenVZ runs on. It's based on the Red Hat kernels and soon will be shipped as a single installation ISO as compared to the packaged kernel and userspace tools we used in the earlier examples.

Docker is the de-facto standard and an adoption leader in the containerized world. Being one of the newer containerization technologies, its ease of use, and available API makes it an ideal solution for running microservices in a mass scale. Docker does not need a patched kernel to work, and the availability of centralized registries to store container images makes it a great choice in many scenarios.

We ended the chapter by showing an example of how to run unprivileged LXC containers. This feature is relatively new, and it's a step in the right direction when it comes to container security.