Containers unplugged: Linux namespaces - Michael Kerrisk

แชร์
ฝัง
  • เผยแพร่เมื่อ 28 พ.ย. 2024

ความคิดเห็น • 23

  • @danishmehmood6110
    @danishmehmood6110 2 หลายเดือนก่อน

    if this is the first ever video you are watching on linux namespaces , you will curse the presenter but if you already have read on namespaces and seen some other videos and given your brain some time to create the connections and watching this video after that than this is a gem . so give it time

  • @EvanCarrollTheGreat
    @EvanCarrollTheGreat 4 ปีที่แล้ว +11

    One of the very best talks on namespaces and Linux. Thanks a ton!

  • @king0s
    @king0s 2 ปีที่แล้ว +1

    .
    I need to consume this in multiple pieces. I love the depth.
    ❤ and 🙏 gratitude from Chennai.

  • @hassanhashemi6478
    @hassanhashemi6478 5 ปีที่แล้ว +4

    Great talk, Really enjoyed watching.
    Thanks Michael..

  • @lexdarocy
    @lexdarocy 4 ปีที่แล้ว +2

    Thank you so much for this, I use what you taught me in this lecture everyday

  • @janp.monsch3383
    @janp.monsch3383 4 ปีที่แล้ว +1

    Great introduction to namespace.

  • @hiccupmaster3572
    @hiccupmaster3572 3 ปีที่แล้ว +4

    For those who want to see the next session
    th-cam.com/video/73nB9-HYbAI/w-d-xo.html

    • @90hijacked
      @90hijacked 7 หลายเดือนก่อน

      Thank you !!!

  • @attilakun7850
    @attilakun7850 5 ปีที่แล้ว +2

    Excellent talk.
    Regarding the question at the very end: I think network namespaces provide isolation for Unix domain sockets too. If so, how can there be a Unix domain socket connection between two different network namespaces?

    • @MichaelKerrisk
      @MichaelKerrisk 4 ปีที่แล้ว +2

      Network namespaces provide isolation of so-called abstract UNIX domain sockets. But normal UNIX domain sockets are not isolated by network namespaces, and thus it's possible to establish a UNIX domain socket connection between network namespaces.

  • @aravindhankrishnan1300
    @aravindhankrishnan1300 5 ปีที่แล้ว +2

    Excellent, concise and precise. Thanks!

  • @manishnaik2052
    @manishnaik2052 2 ปีที่แล้ว

    Why did they write docker in go? All the C namespace apis are clear and concise already.

  • @nacholupotti3644
    @nacholupotti3644 2 ปีที่แล้ว

    Masterclass! Excelent explanation, i am right now going to part 2. Thanks!

  • @Trippykiyay
    @Trippykiyay 2 ปีที่แล้ว

    Any idea where to get the slide deck for this presentation?

  • @sahilgupta3564
    @sahilgupta3564 3 ปีที่แล้ว

    Really enjoyed this tutorial. :)

  • @mujeexminiminer7653
    @mujeexminiminer7653 2 ปีที่แล้ว

    This talk just made me realize the gap in my linux knowledge, because I didn’t understand sh*t😅 Nevertheless, it was a great talk!!! Will surely revisit some time later

  • @puneetmathur
    @puneetmathur 4 ปีที่แล้ว +1

    Wow! Very enlightening. Thank you!

  • @stackunderflow5951
    @stackunderflow5951 3 ปีที่แล้ว

    It might be better to demo not only the PID and UTS namespaces like mount namespace

  • @nasirmahmood7799
    @nasirmahmood7799 4 ปีที่แล้ว

    where is the 2nd part . thanks.

    • @DennisBuduev
      @DennisBuduev 3 ปีที่แล้ว

      I guess it is here th-cam.com/video/73nB9-HYbAI/w-d-xo.html

  • @cryp0g00n4
    @cryp0g00n4 4 ปีที่แล้ว

    What does the $$ do? @19:00

    • @orustammanapov
      @orustammanapov 4 ปีที่แล้ว +1

      if I'm not mistaken it holds PID of the current process (in this case it should be shell PID it's being executed in)

    • @nasirmahmood7799
      @nasirmahmood7799 4 ปีที่แล้ว

      @@orustammanapov -- your shell's PROCESS ID -- echo $$ will show you what is actually is