Skip to main content

Create your own VMs - I

LXC(Linux Containers:http://en.wikipedia.org/wiki/LXC) is a virtualization technique which provides os and network stack level isolation. It allows to run multiple OS distros on a host machine with isolated process listings, user groups, ip addressing. The only constraint is all  these containers and host machines should use same kernel(http://en.wikipedia.org/wiki/Linux_kernel). It make use of cgroups, a new feature addition to latest linux kernels.

What is cgroup
Cgroup associates each task to a subsystem and the subsystem allocates resources shared fro host machine. One can even control amount of resources by passing them as parameter. There can be heirarchy of cgroups i.e cgroups within cgroups(in precise vm within vm)
Have a look at http://www.kernel.org/doc/Documentation/cgroups/cgroups.txt to get a taste of cgroup

Create our VM
This works without any issue in Ubuntu host.
1)install lxc
2)create a mount point for vms

    mkdir -p /cgroup

    mount none -t cgroup /cgroup

3)create network bridges
   Refer http://blogs.eskratch.com/2012/10/bridging-interfaces.html
4)Create your vm

   lxc-create -n <name for vm> -t ubuntu -f /usr/share/doc/lxc/examples/lxc-veth.conf

where -t specifies os templates
os templates are available at /usr/lib/lxc/templates/. Have a look at them and try to understand how devices are shared between host system and containers.
-f specifies the config file (here for network ip assignment ). To understand different network options available, have a look at http://blog.flameeyes.eu/2010/09/linux-containers-and-networking
5)The previous command should have created a vm. Check using

  lxc-ls

6)Start the VM using

    lxc-start -n <name of the vm>

This will take some time to boot. Then once the console appears, it prompts for username, password. For each OS, the template will have username password as variables(For eg ubuntu template assigns username and password to be ubuntu).

LXC and Ubuntu Connection:
Ubuntu's 12.04 release has fixed most of the common bugs of lxc and have created security policies to avoid collision between containers and host while sharing resources.

For CentOs geeks:
CentOS 6.x supports lxc and cgroup. Lesser than 6.x, its impossible to have isolations.
1) Download lxc-0.7.5 source from http://lxc.sourceforge.net/download/lxc/
2)Do a manual install
   Ref http://wiki.centos.org/PackageManagement/SourceInstalls
3)Centos has lot of issues with lxc. I tried fixing some of them with patches available
Download centos container template from https://github.com/kalyanceg/lxc-centos
4)Keep the tar file in /var/cache/lxc and the lxc-centos file in /usr/local/lib/lxc/templates/
5)Create the vm using
/usr/local/bin/lxc-create -n <name of vm> -t centos -f {lxc_source_path}/doc/examples/veth.conf
6)Start vm
/usr/local/bin/lxc-start -n <name of vm>

Comments

Popular posts from this blog

How we have systematically improved the roads our packets travel to help data imports and exports flourish

This blog post is an account of how we have toiled over the years to improve the throughput of our interDC tunnels. I joined this company around 2012. We were scaling aggressively then. We quickly expanded to 4 DCs with a mixture of AWS and colocation. Our primary DC is connected to all these new DCs via IPSEC tunnels established from SRX. The SRX model we had, had an IPSEC throughput of 350Mbps. Around December 2015 we saturated the SRX. Buying SRX was an option on the table. Buying one with 2Gbps throughput would have cut the story short. The tech team didn't see it happening. I don't have an answer to the question, "Is it worth spending time in solving a problem if a solution is already available out of box?" This project helped us in improving our critical thinking and in experiencing the theoretical network fundamentals on live traffic, but also caused us quite a bit of fatigue due to management overhead. Cutting short the philosophy, lets jump to the story. ...

LXC and Host Crashes

 We had set up a bunch of lxc containers on two servers each with 16 core CPUs and 64 GB RAM(for reliability and loadbalancing). Both the servers are on same vlan. The servers need to have atleast one of their network interface in promiscuous mode so that it forwards all packets on vlan to the bridge( http://blogs.eskratch.com/2012/10/create-your-own-vms-i.html ) which takes care of the routing to containers. If the packets are not addressed to the containers, the bridge drops the packet. Having this setup, we moved all our platform maintenance services to these containers. They are fault tolerant as we used two host machines where each host machine has a replica of the containers on the other. The probability to crash for both the servers at the same time due to some hardware/software failure is less. But to my surprise both the servers are crashing exactly the same time with a mean life time 20 days. We had to wake up late nights(early mornings) to fix stuffs that go...

The FB outage

 This outage has caused considerable noise everywhere. It was quite discomforting for me because during the whole conversation nobody bothered to understand the gravity of the issue. I don't expect end users to understand the issue. But this is going to be a blogpost for all of those in the tech field, Such an event can happen how much ever chaos engineering, best of the tech jargon we implement in the stack To all my Site Reliability Engineer friends, Site Up is our first priority. I myself said many a times outage is news and SREs should prevent outage. But I'm afraid this is leading to a cult in the industry who despises outages and takes no learnings from it. I don't know what has happened in Facebook. I can explain a scenario which may or may not be right but that can definitely show the gravity of the issue. Let's draw a probable Facebook architecture Disclaimer I don't work at Facebook. So this might not be how facebook routes traffic. This is based on my exp...