by Anish
Posted on Monday December 09/2019
Namespace is Linux Kernel feature
A namespace wraps a global system resource in an abstraction that makes it appear to the processes within the namespace that they have their own isolated instance of the global resource. Changes to the global resource are visible to other processes that are members of the namespace but are invisible to other processes.
For more information, see the namespaces(7) man page.
Namespaces are specified as an array of entries inside the namespaces
root field. The following parameters can be specified to set up namespaces:
Example
"namespaces": [
{
"type": "pid",
"path": "/proc/1234/ns/pid"
},
{
"type": "network",
"path": "/var/run/netns/neta"
},
{
"type": "mount"
},
{
"type": "ipc"
},
{
"type": "uts"
},
{
"type": "user"
},
{
"type": "cgroup"
}
]
The /proc
filesystem shows (in the /proc/PID
directories) only processes visible in the PID namespace of the process that performed the mount, even if the /proc
filesystem is viewed from processes in other namespaces.
The Linux kernel v4.4.0
provides 7 types of namespaces: cgroup, pid, net, mnt, uts, ipc and user.
$ ls -l /proc/$$/ns
total 0
lrwxrwxrwx 1 root root 0 Dec 9 13:08 cgroup -> cgroup:[4026531835]
lrwxrwxrwx 1 root root 0 Dec 9 13:08 ipc -> ipc:[4026531839]
lrwxrwxrwx 1 root root 0 Dec 9 13:08 mnt -> mnt:[4026531840]
lrwxrwxrwx 1 root root 0 Dec 9 13:08 net -> net:[4026531957]
lrwxrwxrwx 1 root root 0 Dec 9 13:08 pid -> pid:[4026531836]
lrwxrwxrwx 1 root root 0 Dec 9 13:08 user -> user:[4026531837]
lrwxrwxrwx 1 root root 0 Dec 9 13:08 uts -> uts:[4026531838]
pid
: The Process ID. This file is a handle for the PID namespace of the process.PID namespaces isolate the process ID number space, meaning that processes in different PID namespaces can have the same PID. PID namespaces allow containers to provide functionality such as suspending/resuming the set of processes in the container and migrating the container to a new host while the processes inside the container maintain the same PIDsIf two processes are in the same namespace, then the device IDs and inode numbers of their /proc/[pid]/ns/xxx symbolic links will be the same as shown below cgroup:[4026531835] and other process sharing the same inode.
net
This file is a handle for the network namespace of the process. This provides the isolation of the system resources associated with networking and isolates Network devices. The ip netns
- is used to process network namespace managementmount
This file is a handle for the mount namespace of the process and isolates Mount pointsipc
This file is a handle for the IPC namespace of the process and isolates System Vs IPC and POSIX message queuesuts
This file is a handle for the UTS namespace of the process and isolates Hostname and NIS domain nameuser
This file is a handle for the user namespace of the processcgroup
the container will have an isolated view of the cgroup hierarchy.$ cat /proc/cgroups
#subsys_name hierarchy num_cgroups enabled
cpuset 5 3 1
cpu 9 83 1
cpuacct 9 83 1
blkio 10 83 1
memory 8 92 1
devices 2 83 1
freezer 3 3 1
net_cls 4 3 1
perf_event 11 3 1
net_prio 4 3 1
hugetlb 6 3 1
pids
Many container software use Linux namespaces in combination with cgroups to isolate their processes like Docker, LXC, runC.
"cgroupsPath": "/myRuntime/myContainer",
"resources": {
"memory": {
"limit": 100000,
"reservation": 200000
},
"devices": [
{
"allow": false,
"access": "rwm"
}
]
}
Next Reading : How to Monitoring All Executed Commands in Linux
Thanku for reading !!! Give a Share for Support
Instead of directly asking for donations, I'm thrilled to offer you all nine of my books for just $9 on leanpub By grabbing this bundle you not only help cover my coffee, beer, and Amazon bills but also play a crucial role in advancing and refining this project. Your contribution is indispensable, and I'm genuinely grateful for your involvement in this journey!
Any private key value that you enter or we generate is not stored on this site, this tool is provided via an HTTPS URL to ensure that private keys cannot be stolen, for extra security run this software on your network, no cloud dependency