LXD weekly status #44

Stéphane Graber

Stéphane Graber

on 24 April 2018

Introduction

Another week of bugfixes for us as more and more people update to the 3.0 releases!

Quite a bit of work went into improving the handling of the two database in LXD 3.0, making it easier for us to debug issues and provide fixes to our users when something goes wrong. Work is also continuing on the new backup/restore API for LXD with it hopefully landing later this week.

We’re also excited to see LXD debuts on the Chromebooks through the new Crostini feature. This also led to a minor change to LXD to allow restricting users to unprivileged containers as was needed for those users.

Now that LXD 3.0 is mostly behind us, we’re focusing on the roadmap for the next 6 months and early preparation for LXD 3.1 to be released in a couple of weeks.

Upcoming conferences and events

Ongoing projects

The list below is feature or refactoring work which will span several weeks/months and can’t be tied directly to a single Github issue or pull request.

Upstream changes

The items listed below are highlights of the work which happened upstream over the past week and which will be included in the next release.

LXD

LXC

LXCFS

  • Nothing to report this week

Distrobuilder

  • Nothing to report this week

Distribution work

This section is used to track the work done in downstream Linux distributions to ship the latest LXC, LXD and LXCFS as well as work to get various software to work properly inside containers.

Ubuntu

  • Uploaded LXD 3.0.0-0ubuntu4 to Ubuntu 18.04 with a large selection of cherry-picked fixes

Snap

  • Updated list of cherry-picks for 3.0
  • Tweaked unprivileged_userns_clone logic to hide error on some systems
  • Updated lxd-migrate to better handle potential ZFS failures

Ubuntu cloud

Ubuntu offers all the training, software infrastructure, tools, services and support you need for your public and private clouds.

Newsletter signup

Select topics you’re interested in

In submitting this form, I confirm that I have read and agree to Canonical’s Privacy Notice and Privacy Policy.

Related posts

Understanding containerised workloads for Telco

For telecommunications companies evaluating ways to transition and modernise their network infrastructure, cloud-native, container-based microservices architectures are a powerful solution in meeting requirements of compute needs through…

Minimum viable Kubernetes

The appeal of Kubernetes is universal. Application development, operations and infrastructure teams recognise diverse reasons for its immediate utility and growing potential — a testament of Kubernetes’ empathetic design. Web apps,…

Running Android in the Cloud with Amazon EC2 A1 instances

Amazon Web Services (AWS) announced the availability of their new Amazon EC2 A1 instances powered by custom AWS Graviton processors based on the Arm architecture, which brings Arm to the public cloud as a first class citizen. Arm based…