Containers unplugged: Linux namespaces - Michael Kerrisk

Поделиться
HTML-код
  • Опубликовано: 18 сен 2019
  • Linux namespaces are a resource isolation technique. Each namespace type wraps some global system resource in an abstraction that makes it appear to the processes within the namespace that they have their own isolated instance of that resource, when in fact there are multiple instances of the resource, with each instance private to a particular group of process. Namespaces are key building blocks for a number of interesting technologies--most notably containers, but also a range of other interesting applications such as Flatpak and Firejail.
    In this presentation we'll look at various Linux namespace types--including UTS, mount, network, and PID namespaces--in order to understand what resources they govern and what use cases they serve. Along the way, we should have time for a live demo or two, so as to make the "theory" more concrete.
    Save the date for NDC TechTown 2020 (31st of August - 3rd of September)
    Check out more of our talks at:
    ndctechtown.com/
    www.ndcconferences.com/
  • НаукаНаука

Комментарии • 22

  • @EvanCarrollTheGreat
    @EvanCarrollTheGreat 3 года назад +11

    One of the very best talks on namespaces and Linux. Thanks a ton!

  • @king0s
    @king0s Год назад +1

    .
    I need to consume this in multiple pieces. I love the depth.
    ❤ and 🙏 gratitude from Chennai.

  • @hassanhashemi6478
    @hassanhashemi6478 4 года назад +4

    Great talk, Really enjoyed watching.
    Thanks Michael..

  • @lexdarocy
    @lexdarocy 4 года назад +2

    Thank you so much for this, I use what you taught me in this lecture everyday

  • @janp.monsch3383
    @janp.monsch3383 3 года назад +1

    Great introduction to namespace.

  • @sahilgupta3564
    @sahilgupta3564 3 года назад

    Really enjoyed this tutorial. :)

  • @aravindhankrishnan1300
    @aravindhankrishnan1300 4 года назад +2

    Excellent, concise and precise. Thanks!

  • @puneetmathur
    @puneetmathur 4 года назад +1

    Wow! Very enlightening. Thank you!

  • @nacholupotti3644
    @nacholupotti3644 2 года назад

    Masterclass! Excelent explanation, i am right now going to part 2. Thanks!

  • @hiccupmaster3572
    @hiccupmaster3572 3 года назад +5

    For those who want to see the next session
    ruclips.net/video/73nB9-HYbAI/видео.html

  • @mujeexminiminer7653
    @mujeexminiminer7653 2 года назад

    This talk just made me realize the gap in my linux knowledge, because I didn’t understand sh*t😅 Nevertheless, it was a great talk!!! Will surely revisit some time later

  • @attilakun7850
    @attilakun7850 4 года назад +2

    Excellent talk.
    Regarding the question at the very end: I think network namespaces provide isolation for Unix domain sockets too. If so, how can there be a Unix domain socket connection between two different network namespaces?

    • @MichaelKerrisk
      @MichaelKerrisk 3 года назад +2

      Network namespaces provide isolation of so-called abstract UNIX domain sockets. But normal UNIX domain sockets are not isolated by network namespaces, and thus it's possible to establish a UNIX domain socket connection between network namespaces.

  • @Trippykiyay
    @Trippykiyay Год назад

    Any idea where to get the slide deck for this presentation?

  • @manishnaik2052
    @manishnaik2052 Год назад

    Why did they write docker in go? All the C namespace apis are clear and concise already.

  • @nasirmahmood7799
    @nasirmahmood7799 3 года назад

    where is the 2nd part . thanks.

    • @DennisBuduev
      @DennisBuduev 3 года назад

      I guess it is here ruclips.net/video/73nB9-HYbAI/видео.html

  • @stackunderflow5951
    @stackunderflow5951 2 года назад

    It might be better to demo not only the PID and UTS namespaces like mount namespace

  • @cryp0g00n4
    @cryp0g00n4 3 года назад

    What does the $$ do? @19:00

    • @orustammanapov
      @orustammanapov 3 года назад +1

      if I'm not mistaken it holds PID of the current process (in this case it should be shell PID it's being executed in)

    • @nasirmahmood7799
      @nasirmahmood7799 3 года назад

      @@orustammanapov -- your shell's PROCESS ID -- echo $$ will show you what is actually is