From 8bb26ec8e1daec710850c1d31b07c54aedb2d129 Mon Sep 17 00:00:00 2001 From: Patrick Reijnen Date: Sun, 23 Jul 2023 16:07:34 +0200 Subject: [PATCH] Markdown verbetering --- .../peter-lexis-running-containers-with-systemd-nspawn.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/peter-lexis-running-containers-with-systemd-nspawn.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/peter-lexis-running-containers-with-systemd-nspawn.md index f4f827a..1da9243 100644 --- a/content/evenementen/nluug/najaarsconferentie-2019/talks/peter-lexis-running-containers-with-systemd-nspawn.md +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/peter-lexis-running-containers-with-systemd-nspawn.md @@ -19,9 +19,8 @@ recording: According to its manpage, systemd-nspawn: -``` -... may be used to run a command or OS in a light-weight namespace container. In many ways it is similar to chroot(1), but more powerful since it fully virtualizes the file system hierarchy, as well as the process tree, the various IPC subsystems and the host and domain name... -``` + +> ... may be used to run a command or OS in a light-weight namespace container. In many ways it is similar to chroot(1), but more powerful since it fully virtualizes the file system hierarchy, as well as the process tree, the various IPC subsystems and the host and domain name... In this talk, I'll go over what all of this means, how to use systemd-nspawn and how nspawn differs from docker, lxc/lxd and qemu-kvm. I'll discuss how to use the systemd-nspawn and machinectl commands, how to run services inside containers and how to introspect the containers.