Console Login

#"lxc"

All articles tagged with "lxc"

#"lxc"

Container Security in 2014: Why Your Docker Strategy Might Be Dangerous

Docker is exploding in popularity, but standard configurations leave gaping security holes. We explore kernel isolation, Shellshock mitigation, and why running containers on KVM-based VPS is critical for Norwegian data compliance.

Container Security in 2014: Stop Handing Root Access to Your Host

Docker is exploding in popularity across Norway's dev teams, but default configurations are a security nightmare. We dissect kernel namespaces, capability dropping, and why true hardware virtualization (KVM) remains the only safe harbor for production data.

Container Security in 2014: Why Your Docker Strategy is a Ticking Time Bomb

It is late 2014 and Docker is eating the world. But running containers in production without hardening is negligence. We dissect LXC isolation, kernel exploits, and why KVM is your safety net.

Container Security Post-Shellshock: Hardening Docker and LXC in Production

With the recent explosion of Docker 1.3 and LXC 1.0, containerization is shifting from experiment to production. But shared kernels pose a massive security risk. Here is how to lock down your namespaces, drop capabilities, and why wrapping containers in KVM is the only sane choice for Norwegian data.

Container Security in 2014: Why "Root" Inside Docker Is Scarier Than You Think

Docker 1.0 is here, but is it safe for production? We dive deep into the kernel-level risks of early containerization, how to lock down capabilities, and why wrapping containers in KVM is the only sane choice for Norwegian sysadmins.

Container Security in 2014: Why Shared Kernels Keep Me Up at Night (And How to Fix It)

With the release of Docker 1.0, everyone wants to containerize. But as a sysadmin managing Norwegian infrastructure, I see gaping security holes. Here is how to lock down LXC and Docker using AppArmor, capabilities, and the right virtualization layer.

Docker 1.0, LXC, or OpenVZ? A Reality Check for Norwegian DevOps

Docker 1.0 has just landed, changing the conversation around virtualization. We compare the emerging container tools against battle-tested LXC and OpenVZ, and explain why KVM is the only sane foundation for your stack in 2014.

Container Security in 2014: Why Docker 1.0 Isn't a Sandbox (And How to Fix It)

Docker 1.0 is here, but running it in production requires more than a simple `docker run`. We dive into cgroups, namespaces, and why wrapping containers in KVM is the only way to satisfy Datatilsynet.

Container Security in 2014: Locking Down LXC and Docker After the Heartbleed Wake-Up Call

With the recent Heartbleed vulnerability shaking the internet, and Docker gaining traction in version 0.10, isolation is the priority. Here is how to secure your Linux Containers (LXC) effectively while maintaining performance.

Containers Don't Contain: Hardening LXC and Docker 0.8 for Production

It is 2014, and the container revolution is here. But before you deploy Docker to production, you need to understand the security risks of shared kernels. Here is a battle-hardened guide to locking down LXC and why KVM is mandatory for true isolation.

Container Security in 2014: Why Shared Kernels Keep Me Awake at Night (And How to Fix It)

Docker is the new hotness, but running LXC in production requires serious hardening. We dissect cgroups, capabilities, and why KVM is still the safest boundary for Norwegian data.

Escaping the Jail: Hardening LXC and OpenVZ Environments in Production

While the buzz around Docker and lightweight virtualization grows, the security implications of shared kernels remain a massive blind spot. We dive deep into hardening LXC, managing cgroups, and why KVM isolation is the superior choice for Norwegian data sovereignty.

Securing the Cage: Hardening Linux Containers (LXC/OpenVZ) for Production Environments

Container virtualization offers speed, but default configurations leave you wide open. We dive into capability dropping, cgroups resource control, and why KVM isolation is the ultimate security layer for Norwegian mission-critical data.

Container Orchestration vs. KVM Isolation: A Survival Guide for 2013

With Docker entering the scene and OpenVZ overselling rampant, how do you architect a stable hosting environment in Norway? We compare LXC, OpenVZ, and KVM strategies for the pragmatist.

Container Wars 2013: OpenVZ vs. LXC vs. Docker – Why Your VPS Architecture Matters

With the Snowden leaks shaking trust in US hosting, choosing the right virtualization technology in Norway is critical. We dissect OpenVZ, LXC, and the emerging Docker toolset to determine the best stack for performance and isolation.

Container Wars 2013: LXC vs. OpenVZ for High-Load Norwegian Infrastructure

We benchmark the leading container technologies of 2013. Discover why raw LXC performance beats OpenVZ overhead and how to manage isolation without melting your kernel.

LXC vs. KVM: Locking Down Container Security in a Hostile Environment

It is 2013, and Linux Containers (LXC) are exploding in popularity. But shared kernels mean shared risks. We explore capability dropping, cgroups, and why KVM remains the isolation king for Norwegian enterprise data.

Beyond Bridges: Architecting High-Performance LXC Networking with Open vSwitch

While the industry buzzes about the new 'Docker' project, serious infrastructure relies on LXC. Here is a deep dive into isolating container traffic using Open vSwitch and HAProxy, ensuring your Norwegian workloads stay compliant and fast.

Locking Down Linux Containers: A Survival Guide for the Paranoiac SysAdmin (May 2013 Edition)

Container virtualization (LXC/OpenVZ) offers speed, but shared kernels invite disaster. Learn how to harden your isolation, drop kernel capabilities, and why KVM might be the safer bet for critical Norwegian workloads.

LXC vs. OpenVZ vs. KVM: The Truth About "Cloud" Isolation & Performance in 2013

We benchmark the stability and isolation differences between container technologies like OpenVZ/LXC and full hardware virtualization (KVM) to determine what actually belongs in production.

Securing Linux Containers: Hardening LXC and OpenVZ in Production Environments

Container virtualization offers incredible density, but the shared kernel model exposes risks. From cgroups resource limiting to dropping capabilities, here is how we lock down instances at CoolVDS.

Container vs. Hypervisor: Locking Down LXC and OpenVZ in 2013

It is March 2013. LXC is entering the enterprise and Docker is making waves. But does sharing a kernel compromise your data? We explore cgroups, namespace isolation, and why hardware virtualization (KVM) remains the gold standard for security in Norway.

Building the Invisible Wire: Advanced KVM & LXC Networking for High-Traffic Clusters

Forget the cloud buzzwords. In 2013, real performance comes from understanding packet flow, bridges, and interrupts. We dive deep into architecting low-latency networks for Linux Containers and KVM without melting your CPU.

Scaling Container Networking: A Deep Dive into LXC & Open vSwitch

Container virtualization is the future, but networking across hosts is a nightmare. We explore how to build a robust multi-host network using LXC, GRE tunnels, and Open vSwitch on high-performance Linux clusters.

Securing the Cage: Hardening LXC and OpenVZ for High-Performance Hosting

Container virtualization offers raw speed, but shared kernels pose significant security risks. Learn how to lock down LXC and OpenVZ environments using cgroups, capabilities, and network isolation.

LXC vs OpenVZ: The Reality of High-Density Virtualization in 2013

We benchmark the heavyweights of lightweight virtualization. Is OpenVZ's kernel sharing a ticking time bomb for your production stack? We dive deep into user_beancounters, LXC cgroups, and why KVM might still be the king for isolation.

Surviving the Shared Kernel: Hardening LXC & OpenVZ for Production

Container virtualization is lightweight but risky. Learn how to lock down LXC and OpenVZ environments against root escalation and resource exhaustion using cgroups, iptables, and the new Kernel 3.8 user namespaces.

Surviving the Sprawl: LXC vs. OpenVZ vs. KVM High-Availability Architectures

A battle-hardened look at scaling infrastructure in 2013. We tear down the differences between Linux Containers and full virtualization, optimize for SSD I/O, and explain why KVM is the only sane choice for critical workloads in Norway.

LXC vs. OpenVZ: The Reality of Container Management in 2013

Container virtualization promises efficiency, but shared kernels come with hidden costs. We compare OpenVZ, LXC, and KVM strategies for Norwegian DevOps teams facing the 'noisy neighbor' dilemma.

LXC & OpenVZ Security: Locking Down The Shared Kernel Nightmare

It is 2013, and everyone wants lightweight virtualization. But running root inside a container often means root on the host. Here is how to secure LXC against kernel exploits and noisy neighbors before you deploy to production.