mastodon.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
The original server operated by the Mastodon gGmbH non-profit

Administered by:

Server stats:

353K
active users

#lxd

0 posts0 participants0 posts today
AskUbuntu<p>LXD with Win11 no network adapter driver <a href="https://ubuntu.social/tags/drivers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>drivers</span></a> <a href="https://ubuntu.social/tags/lxc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxc</span></a> <a href="https://ubuntu.social/tags/lxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxd</span></a></p><p><a href="https://askubuntu.com/q/1544000/612" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1544000/612</span><span class="invisible"></span></a></p>
bbₜᵤₓᵢ<p>Jetzt probiere ich mal die <a href="https://burningboard.net/tags/Canonical" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Canonical</span></a> <a href="https://burningboard.net/tags/lxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxd</span></a> UI aus 🙈 </p><p>Soll wohl eine Alternative zu einem Proxmox sein.</p><p><span class="h-card" translate="no"><a href="https://burningboard.net/@Larvitz" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Larvitz</span></a></span></p>
Soumyadeep Ghosh(সৌম্যদীপ ঘোষ)<p>Gave my first ever <a href="https://mastodon.social/tags/lightning" class="mention hashtag" rel="tag">#<span>lightning</span></a> <a href="https://mastodon.social/tags/talk" class="mention hashtag" rel="tag">#<span>talk</span></a> in <a href="https://mastodon.social/tags/FOSSASIA" class="mention hashtag" rel="tag">#<span>FOSSASIA</span></a> Summit 2025. Pretty nervous and excited. But went well. Some snaps of that in Day 3.</p><p><a href="https://mastodon.social/tags/snapcrafters" class="mention hashtag" rel="tag">#<span>snapcrafters</span></a> <a href="https://mastodon.social/tags/ubuntu" class="mention hashtag" rel="tag">#<span>ubuntu</span></a> <a href="https://mastodon.social/tags/lxd" class="mention hashtag" rel="tag">#<span>lxd</span></a> <a href="https://mastodon.social/tags/fossasia" class="mention hashtag" rel="tag">#<span>fossasia</span></a> <a href="https://mastodon.social/tags/foss" class="mention hashtag" rel="tag">#<span>foss</span></a> <a href="https://mastodon.social/tags/github" class="mention hashtag" rel="tag">#<span>github</span></a> <a href="https://mastodon.social/tags/ci" class="mention hashtag" rel="tag">#<span>ci</span></a> <a href="https://mastodon.social/tags/bash" class="mention hashtag" rel="tag">#<span>bash</span></a></p>
Linuxiac<p>LXD 6.3 system container manager brings Pure Storage support, Ubuntu Pro auto-attachment, NVIDIA GPU pass-through, and more.<br /><a href="https://linuxiac.com/lxd-6-3-brings-pure-storage-driver-improved-gpu-pass-through/" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">linuxiac.com/lxd-6-3-brings-pu</span><span class="invisible">re-storage-driver-improved-gpu-pass-through/</span></a></p><p><a href="https://mastodon.social/tags/lxd" class="mention hashtag" rel="tag">#<span>lxd</span></a> <a href="https://mastodon.social/tags/ubuntu" class="mention hashtag" rel="tag">#<span>ubuntu</span></a> <a href="https://mastodon.social/tags/containers" class="mention hashtag" rel="tag">#<span>containers</span></a></p>
EmpathicQubit<p>Setting up Windows on <a href="https://mastodon.de/tags/LXD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LXD</span></a> is complicateder enough than libvirt to be annoying. I apparently have to rebuild the ISO to include some drivers.</p>
AskUbuntu<p>Multipass with LXD cannot launch new instances <a href="https://ubuntu.social/tags/lxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxd</span></a> <a href="https://ubuntu.social/tags/multipass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multipass</span></a></p><p><a href="https://askubuntu.com/q/1543176/612" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1543176/612</span><span class="invisible"></span></a></p>
stfn :raspberrypi: :python:<p>So I have this idea to move at least some of my self-hosted stuff from Docker to LXC.</p><p>Correct my if I'm wrong dear Fedisians, but I feel that LXC is better than Docker for services that are long-lasting and keeping an internal state, like Jellyfin or Forgejo or Immich? Docker containers are ephemeral in nature, whereas LXC containers are, from what I understand, somewhere between Docker containers and VMs.</p><p><a href="https://fosstodon.org/tags/lxc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxc</span></a> <a href="https://fosstodon.org/tags/lxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxd</span></a></p>
st1nger :unverified: 🏴‍☠️ :linux: :freebsd:<p><a href="https://infosec.exchange/tags/Incus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Incus</span></a> is a next-generation <a href="https://infosec.exchange/tags/system" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>system</span></a> <a href="https://infosec.exchange/tags/container" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>container</span></a> application container, and virtual machine manager. It provides a user experience similar to that of a public <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloud</span></a> With it, you can easily mix and match both containers and virtual machines, sharing the same underlying <a href="https://infosec.exchange/tags/storage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>storage</span></a> and <a href="https://infosec.exchange/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> - The Incus project was created by Aleksa Sarai as a community driven alternative to Canonical's <a href="https://infosec.exchange/tags/LXD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LXD</span></a> <a href="https://linuxcontainers.org/incus/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">linuxcontainers.org/incus/</span><span class="invisible"></span></a></p>
kgoetz<p>Its amazing how useful having a break can be.</p><p>Last night my brain had completely ground to a halt working on my <a href="https://aus.social/tags/incus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incus</span></a> / <a href="https://aus.social/tags/lxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxd</span></a> <a href="https://aus.social/tags/API" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>API</span></a> client.</p><p>I could not, for the life of me, find the search terms to convey my question "how do I verify the remote LXD servers certificate in my <a href="https://aus.social/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> code".</p><p>Today I have the answer and pushed updated code (<a href="https://github.com/medeopolis/container_client/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/medeopolis/containe</span><span class="invisible">r_client/</span></a>).</p><p>Long story short:<br>- use supplied tools to create server and client certificates (eg using <a href="https://linuxcontainers.org/incus/docs/main/howto/server_expose/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxcontainers.org/incus/docs</span><span class="invisible">/main/howto/server_expose/</span></a>). You could do it with openssl commands if you really have to<br>- The resulting .config/{incus,lxc}/client.{crt,key} are for client authentication<br>- the resulting .config/{incus,lxc}/servercerts/servername.crt can be used for https verification/validation. *to actually use this meaningfully the server cert has to be regenerated, the only addresses covered out of the box are loopback IPs*</p><p>I don't know if there is one place I can point to thank for helping me figure my way through but <a href="https://discuss.linuxcontainers.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">discuss.linuxcontainers.org/</span><span class="invisible"></span></a> had several useful posts 🙏 , and perhaps a good night sleep.</p>
EmpathicQubit<p>So I managed to get <a href="https://mastodon.de/tags/Forgejo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Forgejo</span></a> jobs running in a way that I'm happy enough with. The main concern is that they're isolated as possible. The current runner has a scary warning on it that it's in alpha and shouldn't be considered secure.</p><p>The runner instance is Debian running in an <a href="https://mastodon.de/tags/lxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxd</span></a> --vm on my laptop (I didn't want to consume resources on the server since it's small). In this instance I have <a href="https://mastodon.de/tags/k0s" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>k0s</span></a> running, which is a slimmed down <a href="https://mastodon.de/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kubernetes</span></a>, which is running <a href="https://mastodon.de/tags/Codeberg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Codeberg</span></a> 's runner pod. This has three containers. One to register the runner, then two others that are always running, the runner itself and <a href="https://mastodon.de/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a> -in-Docker . You can replicate this entire setup so that each runner gets its own DinD which is completely separated from the others.</p><p>Each runner checks for a single job in a loop, and once a job is completed then the docker server is pruned, and the runner shuts down. Then k0s will automatically restart it. This isn't perfect but it's better than runner processes which never shut down, because the docker cache will linger and others can look at it to spy on your jobs.</p>
kgoetz<p>What could be better on a Sunday than throwing more incomplete <a href="https://aus.social/tags/sourcecode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sourcecode</span></a> over the wall and hoping no one throws it back?<br>This time its a thin as paper wrapper around the <a href="https://aus.social/tags/LXD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LXD</span></a> / <a href="https://aus.social/tags/Incus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Incus</span></a> REST <a href="https://aus.social/tags/API" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>API</span></a> written in <a href="https://aus.social/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> .<br>(I'll be trying to use that instead of <a href="https://aus.social/tags/pylxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pylxd</span></a> until their websockets bug fixes are in place. Hopefully then I can swap back to pylxd)</p><p><a href="https://github.com/medeopolis/container_client/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/medeopolis/containe</span><span class="invisible">r_client/</span></a></p>
Pope Bob the Unsane<p>After taking the nickle tour of <a href="https://kolektiva.social/tags/Qubes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qubes</span></a>, my hasty conclusion is that it is anti-<a href="https://kolektiva.social/tags/KISS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KISS</span></a>; there are seemingly many moving parts under the surface, and many scripts to grok to comprehend what is going on.</p><p>I plan to give it some more time, if only to unwrap how it launches programs in a VM and shares them with dom0's X server and audio and all that; perhaps it's easier than I think.</p><p>I also think <a href="https://kolektiva.social/tags/Xen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xen</span></a> is a bit overkill, as the claim is that it has a smaller kernel and therefore smaller attack surface than the seemingly superior alternative, <a href="https://kolektiva.social/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a>. Doing some rudimentary searching out of identified / known VM escapes, there seem to be many more that impact Xen than KVM, in the first place.</p><p>Sure, the <a href="https://kolektiva.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> kernel may be considerably larger than the Xen kernel, but it does not need to be (a lot can be trimmed from the Linux kernel if you want a more secure hypervisor), and the Linux kernel is arguably more heavily audited than the Xen kernel.</p><p>My primary concern is compartmentalization of 'the web', which is the single greatest threat to my system's security, and while <a href="https://kolektiva.social/tags/firejail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firejail</span></a> is a great soltion, I have run into issues maintaining my qutebrowser.local and firefox.local files tuned to work well, and it's not the simplest of solutions.</p><p>Qubes offers great solutions to the compartmentalization of data and so on, and for that, I really like it, but I think it's over-kill, even for people that desire and benefit from its potential security model, given what the threats are against modern workstations, regardless of threat actor -- most people (I HOPE) don't have numerous vulnerable services listening on random ports waiting to be compromised by a remote threat.</p><p>So I am working to refine my own security model, with the lessons I'm learning from Qubes.</p><p>Up to this point, my way of using a system is a bit different than most. I have 2 non-root users, neither has sudo access, so I do the criminal thing and use root directly in a virtual terminal.</p><p>One user is my admin user that has ssh keys to various other systems, and on those systems, that user has sudo access. My normal user has access to some hosts, but not all, and has no elevated privileges at all.</p><p>Both users occasionally need to use the web. When I first learned about javascript, years and years ago, it was a very benevolent tool. It could alter the web page a bit, and make popups and other "useful" things.</p><p>At some point, <a href="https://kolektiva.social/tags/javascript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascript</span></a> became a beast, a monster, something that was capable of scooping up your password database, your ssh keys, and probe your local networks with port scans.</p><p>In the name of convenience.</p><p>As a result, we have to take browser security more seriously, if we want to avoid compromise.</p><p>The path I'm exploring at the moment is to run a VM or two as a normal user, using KVM, and then using SSH X forwarding to run firefox from the VM which I can more easily firewall, and ensures if someone escapes my browser or abuses JS in a new and unique way, that no credentials are accessible, unless they are also capable of breaking out of the VM.</p><p>What else might I want to consider? I 'like' the concept of dom0 having zero network access, but I don't really see the threat actor that is stopping. Sure, if someone breaks from my VM, they can then call out to the internet, get a reverse shell, download some payloads or build tools, etc.</p><p>But if someone breaks out of a Qubes VM, they can basically do the same thing, right? Because they theoretically 'own' the hypervisor, and can restore network access to dom0 trivially, or otherwise get data onto it. Or am I mistaken?</p><p>Also, what would the <a href="https://kolektiva.social/tags/LXC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LXC</span></a> / <a href="https://kolektiva.social/tags/LXD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LXD</span></a> approach look like for something like this? What's its security record like, and would it provide an equivalent challenge to someone breaking out of a web browser (or other program I might use but am not thinking of at the moment)?</p>
Root Moose<p>Hey Everyone, You've been meaning to do it but now is the time 'circle the wagons' and get your systems moved from docker to something else. </p><p>Time for me to 'restart' the migration. </p><p>Remember: never Oracle</p><p><a href="https://techcrunch.com/2025/02/13/former-oracle-cloud-exec-don-johnson-takes-over-as-dockers-new-ceo/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/02/13/form</span><span class="invisible">er-oracle-cloud-exec-don-johnson-takes-over-as-dockers-new-ceo/</span></a></p><p><a href="https://root.moose.ca/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> <a href="https://root.moose.ca/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a> <a href="https://root.moose.ca/tags/containerd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>containerd</span></a> <a href="https://root.moose.ca/tags/lxc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxc</span></a> <a href="https://root.moose.ca/tags/lxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxd</span></a></p>
Till Kamppeter<p><a href="https://ubuntu.social/tags/FOSDEM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSDEM</span></a> <a href="https://ubuntu.social/tags/FOSDEM2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSDEM2025</span></a> in Brussels is coming closer, Feb 1 and 2, and it will get orange!</p><p>We will have an <a href="https://ubuntu.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubuntu</span></a> booth this year! There will be 19 people from <a href="https://ubuntu.social/tags/Canonical" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Canonical</span></a>, and several from the wider Ubuntu community!</p><p>People from Desktop, Server, Foundations, Kernel, <a href="https://ubuntu.social/tags/LXD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LXD</span></a>, <a href="https://ubuntu.social/tags/Snap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Snap</span></a> (for all distros), <a href="https://ubuntu.social/tags/snapcrafters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>snapcrafters</span></a>, <a href="https://ubuntu.social/tags/MIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MIR</span></a>, Ubuntu on <a href="https://ubuntu.social/tags/Matrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Matrix</span></a> </p><p>Live demos, answers to your questions, everything what you want to know about Ubuntu!</p><p>See you in building K, on the ground floor.</p><p><a href="https://fosdem.org/2025/stands/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">fosdem.org/2025/stands/</span><span class="invisible"></span></a></p>
Marcel<p>Xpipe erschien gestern übrigens in Version 14 und hat nun <a href="https://fedifriends.social/tags/Incus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Incus</span></a> support. Zusätzlich gibt es nun verwaltbare Identitäten und noch ein Haufen anderer Features. Der Start wurde auch spürbar beschleunigt :neocat_approve: </p><p><a href="https://github.com/xpipe-io/xpipe" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/xpipe-io/xpipe</span><span class="invisible"></span></a></p><p><a href="https://fedifriends.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://fedifriends.social/tags/LXD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LXD</span></a> <a href="https://fedifriends.social/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a></p>
Zygmunt Krynicki<p>If you are running <a href="https://fosstodon.org/tags/Fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fedora</span></a> and want to use <a href="https://fosstodon.org/tags/LXD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LXD</span></a> then try:</p><p>firewall-cmd --add-interface=lxdbr0 --zone=trusted --permanent<br>firewall-cmd --reload</p>
Marcel<p>Please boost!<br>Weil ich das Projekt echt super finde:</p><p>Wer mehrere Hosts, Proxmox Environments, LXD, Kubernetes oder einfach nur ssh-Verbindungen verwaltet:</p><p>Schaut euch Xpipe an!</p><p><a href="https://github.com/xpipe-io/xpipe" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/xpipe-io/xpipe</span><span class="invisible"></span></a></p><p>Das bündelt alles unter einer bequemen Oberfläche und ist sogar Multiplattform verfügbar!</p><p>Die Konfiguration kann bequem über mehrere Instanzen hinweg Betriebssystemunabhängig mittels Git synchronisiert werden. </p><p>Ich hab heute in einer Mail auch angefragt wie es mit Incus-<br>Support aussieht. Das stehe wohl für die nächste Majorversion auf der Roadmap. Die Antwort kam fix und das an einem Sonntag :neocat_laptop_notice: </p><p>Open Source made in Germany </p><p><a href="https://fedifriends.social/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> <a href="https://fedifriends.social/tags/lxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxd</span></a> <a href="https://fedifriends.social/tags/lxc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxc</span></a> <a href="https://fedifriends.social/tags/incus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incus</span></a> <a href="https://fedifriends.social/tags/foss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>foss</span></a> <a href="https://fedifriends.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://fedifriends.social/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://fedifriends.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
Primo<p>FUCK NAT MODE, FUCK BRIDGE MODE, FUCK VIRTUALIZATION, FUCK DOCKER, FUCK CONTAINIZATION, FUCK VMWARE, FUCK VIRTUALBOX, FUCK LXC, FUCK PROXMOX, FUCK FIREWALLS, FUCK NETWORKING, AND FINNALY FUCK COMPUTERS.</p><p><a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="tag">#<span>networking</span></a> <a href="https://mastodon.social/tags/virtualization" class="mention hashtag" rel="tag">#<span>virtualization</span></a> <a href="https://mastodon.social/tags/vmware" class="mention hashtag" rel="tag">#<span>vmware</span></a> <a href="https://mastodon.social/tags/virtualbox" class="mention hashtag" rel="tag">#<span>virtualbox</span></a> <a href="https://mastodon.social/tags/proxmox" class="mention hashtag" rel="tag">#<span>proxmox</span></a> <a href="https://mastodon.social/tags/nat" class="mention hashtag" rel="tag">#<span>nat</span></a> <a href="https://mastodon.social/tags/server" class="mention hashtag" rel="tag">#<span>server</span></a> <a href="https://mastodon.social/tags/vm" class="mention hashtag" rel="tag">#<span>vm</span></a> <a href="https://mastodon.social/tags/docker" class="mention hashtag" rel="tag">#<span>docker</span></a> <a href="https://mastodon.social/tags/container" class="mention hashtag" rel="tag">#<span>container</span></a> <a href="https://mastodon.social/tags/vbox" class="mention hashtag" rel="tag">#<span>vbox</span></a> <a href="https://mastodon.social/tags/computer" class="mention hashtag" rel="tag">#<span>computer</span></a> <a href="https://mastodon.social/tags/pc" class="mention hashtag" rel="tag">#<span>pc</span></a> <a href="https://mastodon.social/tags/lxc" class="mention hashtag" rel="tag">#<span>lxc</span></a> <a href="https://mastodon.social/tags/lxd" class="mention hashtag" rel="tag">#<span>lxd</span></a> <a href="https://mastodon.social/tags/network" class="mention hashtag" rel="tag">#<span>network</span></a> <a href="https://mastodon.social/tags/bridge" class="mention hashtag" rel="tag">#<span>bridge</span></a> <a href="https://mastodon.social/tags/mode" class="mention hashtag" rel="tag">#<span>mode</span></a> <a href="https://mastodon.social/tags/virtual" class="mention hashtag" rel="tag">#<span>virtual</span></a></p>
OSTechNix<p>LXD 6.2 Released with NVIDIA CDI Support and Enhanced VM Management <a href="https://floss.social/tags/LXD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LXD</span></a> <a href="https://floss.social/tags/Containers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Containers</span></a> <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://floss.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubuntu</span></a> <a href="https://floss.social/tags/Releases" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Releases</span></a> <br><a href="https://ostechnix.com/lxd-6-2-released/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ostechnix.com/lxd-6-2-released</span><span class="invisible">/</span></a></p>
LinuxNews.de<p>LXD 6.2 reicht Nvidia-Grafikkarten durch<br><a href="https://linuxnews.de/lxd-6-2-reicht-nvidia-grafikkarten-durch/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxnews.de/lxd-6-2-reicht-nv</span><span class="invisible">idia-grafikkarten-durch/</span></a> <a href="https://social.anoxinon.de/tags/lxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxd</span></a></p>