TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Announcing Intel Clear Containers V2.1.1

93 pointsby ah-about 8 years ago

7 comments

alpbabout 8 years ago
Here&#x27;s a cool technical and short article about the Clear Containers by someone worked on the project to bring you up to speed with what is going on: <a href="https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;644675&#x2F;" rel="nofollow">https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;644675&#x2F;</a>
philipsabout 8 years ago
If you want to try out Clear Containers with rkt you can easily do it on a linux physical machine. First, install rkt via deb&#x2F;rpm[1] or tarball[2]<p>Then do:<p><pre><code> sudo rkt run --debug --insecure-options=image --stage1-name=coreos.com&#x2F;rkt&#x2F;stage1-kvm:1.25.0 docker:&#x2F;&#x2F;redis </code></pre> If you run into problem you can email rkt-dev[3].<p>[1] <a href="https:&#x2F;&#x2F;coreos.com&#x2F;rkt&#x2F;docs&#x2F;latest&#x2F;distributions.html#rpm-based" rel="nofollow">https:&#x2F;&#x2F;coreos.com&#x2F;rkt&#x2F;docs&#x2F;latest&#x2F;distributions.html#rpm-ba...</a> [2] <a href="https:&#x2F;&#x2F;github.com&#x2F;coreos&#x2F;rkt&#x2F;releases&#x2F;tag&#x2F;v1.25.0" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;coreos&#x2F;rkt&#x2F;releases&#x2F;tag&#x2F;v1.25.0</a> [3] <a href="https:&#x2F;&#x2F;groups.google.com&#x2F;forum&#x2F;#!forum&#x2F;rkt-dev" rel="nofollow">https:&#x2F;&#x2F;groups.google.com&#x2F;forum&#x2F;#!forum&#x2F;rkt-dev</a>
chatmastaabout 8 years ago
I hadn&#x27;t seen this project before. It looks really cool. I especially like the support for pushing network configuration at startup (via the &quot;hyperstart&quot; concept in v1 and systemd in v2). This is sorely lacking in Docker. You can accomplish it with pipework (which is just a wrapper around `ip exec` in the container netns), but then you need to write code in the container like &quot;wait for interface XX to be up before running entry_point.sh&quot;<p>My use case is creating containers with multiple interfaces and custom routing rules for each interface. Currently I am using pipework.sh to setup the interfaces and routes, but it&#x27;s a dirty hack and increases container boot time due to the need to poll for interfaces to be up before starting the application. It looks like this &quot;hyperstart&quot;&#x2F;systemd approach to namespace isolation avoids that latency, which is nice.<p>Unfortunately, according to these docs, each container interface requires a tap bridge in addition to the usual veth pair, due to qemu networking limitations. That&#x27;s unfortunate, especially for containers with multiple interfaces, which is specifically my use-case.<p>Does anyone have an idea of the overhead of creating many tap interfaces within a container?
评论 #13863578 未加载
评论 #13865514 未加载
gtirloniabout 8 years ago
Anyone using this in production and betting on the long term viability of this project?
tyingqabout 8 years ago
Sounds similar to what <a href="http:&#x2F;&#x2F;hypercontainer.io" rel="nofollow">http:&#x2F;&#x2F;hypercontainer.io</a> is doing.
phildoughertyabout 8 years ago
Pretty neat how nicely this integrates into an existing docker host setup. Definitely going to give it a try and see about integrating into containership.<p>edit: typo
nimishabout 8 years ago
Containers done right<p>I wish the documentation was better for integrating with docker seamlessly