In preparation for that race, I ran Austin's Race for the Water 10 miler. I thought some of you might enjoy the custom tailored technical t-shirt, which proudly states:
i'm running ubuntu
The back of the shirt asks:
ARE YOU RUNNING UBUNTU?
If you're interested in the results, I completed the 10 miles in 01:28:40 (that's an 8:52/mi average). I was shooting for a 9:00/mi average, so clearly I was pleased with the result!
I will provide a few of my own observations, but we are very interested in your own conclusions!
There were a total of 354 responses -- excellent feedback!
Nearly 2/3 of all responders use virtualization on Ubuntu every day -- wow!
Over 3/4 of responders have VT acceleration -- that's overwhelming, I think, and it supports our focus on KVM.
Still, there's 21% of responders who cannot use KVM. kqemu has been deprecated by upstream QEMU, so I think VirtualBox represents the best option at this point for non-accelerated virtualization.
36.7% of responders most use VirtualBox, 22.6% most use KVM. VirtualBox is in Universe and essentially unmaintained by Canonical (though some community individuals are doing an excellent job maintaining it!). I don't know what the business opportunity is around VirtualBox. But it is clear that it's popular among Ubuntu users. People really like the interface and the usability. And we could probably really improve the experience for a large number of Ubuntu virtualization users with some dedicated Canonical effort to clean up the VirtualBox bug backlog.
My survey design was evidently flawed on Question #3, as a large number of people "wrote in" an "EC2" answer there. This is an interesting approach, as it diminishes the importances of having VT on the local system.
In terms of interfaces, virt-manager and virsh are both lagging behind kvm-from-the-command-line and VirtualBox. I don't know if this means that we should, or should not invest more in the libvirt-based tools. Is the lack of a good GUI for KVM hindering its adoption? I think this data says so...
Finally, the overwhelming majority suggests that better documentation is simply required for Ubuntu virtualization. I wonder how we should approach solving this? Is this something that we as engineers should be able to just crank out ourselves? Or should we tap into the Ubuntu-Documentation-Team, and attempt to rally a virt-documentation blitz from some more skilled tech writers?
In summary, I think the most important observations are that:
The overwhelming number of respondents have access to VT hardware.
VirtualBox is quite popular in the wild, despite a lack of Canonical investment.
The lack of a better user-interface is hindering KVM's adoption.
Better documentation is undoubtedly requested.
Are there other observations you'd like to share or conclusions you can draw?
We will be in Dallas next week for the Lucid Ubuntu Developer Summit, discussing the future of Virtualization on Ubuntu. Thank you so much for your feedback!
I'm pleased to introduce a new package I have created for Ubuntu called testdrive!
Testdrive makes it simple to run any Ubuntu release in a virtual machine, safely, and without affecting your current Ubuntu installation.
This is a great way to "try out" the Ubuntu release beyond your current version, before upgrading. For example, if you're still running Ubuntu 9.04, you could testdrive Ubuntu 9.10 before committing to the upgrade.
You could also testdrive a different flavor of Ubuntu, such as Xubuntu, Kubuntu, Netbook Remix, or the Ubuntu Server. This is great way of learning more about the Ubuntu galaxy, as well as introducing yourself, to the wide world of virtualization in Ubuntu.
I expect that testdrive will be very useful to Ubuntu developers, testers, and bug triagers during the Lucid development cycle, as these people will be able to test Lucid's daily ISOs throughout the cycle, and in particular at the release milestones for ISO-acceptance-testing.
Prerequisites
Testdrive can use either KVM or VirtualBox to host the virtual machine. You should have either one of these installed on your system. If you're using KVM, you need to have at least kvm-84, which is available in hardy-backports, intrepid-backports, jaunty, and karmic.
You should also have enough disk space available in your home directory to store one or more ISOs, roughly a 1 GB or so.
Installing Testdrive
To install testdrive:
On Ubuntu 9.04 and Ubuntu 9.10, just enable the testdrive PPA and install:
To run testdrive from the command line, you just need to provide the URL to an ISO that you want to test. This can be an http, ftp, rsync, or file style URL. The ISO itself will be cached in your ~/.cache/testdrive directory, such that subsequent runs will only need to perform incremental downloads.
From the command line you could do something like the following:
You can also add some other configuration details in your own ~/.testdriverc file. Simply copy /etc/testdriverc to ~/.testdriverc and edit as you like. Once you have done so, you can simply launch testdrive from the menu, with:
Applications -> System Tools -> Test Drive and Ubuntu ISO
Testdrive-GTK
Rick Spencer, Manager of the Ubuntu Desktop Team, has used quickly to draft a GTK front-end for testdrive. Hopefully, testdrive-gtk will make it into the archive for Lucid soon, and provide a nice, pointy/clicky way of choosing the Ubuntu release you'd like to testdrive.
UDS
I'm giving a plenary talk at the Ubuntu Developer Summit in Dallas, Texas next week, where I plan to demo testdrive, as one example of what we can do with KVM and Virtualization in Ubuntu. If you have been reluctant to try Ubuntu Virtualization, testdrive is a really easy way to get started!
Specifically, these paragraphs regarding eCryptfs:
Encryption proved a hurdle for Ubuntu forum member XXXX, who decried the lack of automation on encrypting his home partition.
"I had chosen to encrypt the home partition when installing 9.04 and then wasn't able to get the passphrase command to complete the encryption process to work properly," XXXX wrote.
Finally, after a late night and getting some advice online, XXXX wrote: "I certainly wish the encryption mounting process was more automated like everything else is!!"
Lack of automation? In Ubuntu 9.10, encrypting your home directory is a matter of selecting a check box in the installer:
That's it. 9.04 Encrypted Home upgrading users simply run update-manager and upgrade all packages to 9.10. Their home directory encryption is not affected by this.
The author of this article found one post in the Ubuntu Forums poorly articulating an issue with home directory encryption and suddenly Ubuntu 9.10 users are getting "bloodied" by encryption in Ubuntu? Seriously?
I thought I would provide a brief set of highlights about Byobu accomplishments during the Karmic development cycle, now that we have released Ubuntu 9.10.
Also, I'd like to promote my Ubuntu Open Week Presentation on Byobu, which is scheduled for 18:00 UTC, tomorrow, Tuesday November 3, 2009. It will included a live demonstration, in Amazon EC2. Be prepared to join us in #ubuntu-classroom on irc.freenode.net, and SSH into a guest session and participate in the presentation and discussion!
Statistics
Renamed the project, from screen-profiles to byobu
Uploaded about 43 times
Fixed approximately 74 bugs
Contributions from 9 different people
Features
Performance
Tremendous performance improvements across the board -- all status scripts
Better timings for status script run frequency reducing overall load on system
Cache files in /var/run/screen ramdisk for better performance
Check updates immediately, and only when package lists are updated
Usability
Dynamically reload profiles on byobu-config changes
Interpret ESC as "cancel" in the byobu-config menu
Dynamic keybinding updating on changed escape sequence
Support dynamic enabling and disabling of keybinding sets
Better default window handling
Show the MOTD on first launch
Update ssh authentication socket on re-connection to an existing session
Appearance
Design improvements, per review with the Ubuntu Design Team
Enable 256 color support
Color coding, vim folding, and formatting the detailed status output
Improve colors of status notifications, use bold for numbers, non-bold for units
New distro logos
Set the window title appropriately
Compatibility
Improved support for non-bourne shells, busybox environments, non-x86 architectures, and non-Ubuntu operating systems
RPM packaging spec file
Accessibility
Comprehensive documentation
Internationalization
Use UTF8 where possible
Manageability
Make status monitoring more configurable (ie, watch a different ethernet interface or disk partition)
New status scripts (ip address, disk availability, cpu temperature, cpu fan speed, mail, reload required)
Dropped nasty /usr/bin/screen diversion
Created a byobu-janitor utility that collects all migration hacks to a single place, and runs on a profile refresh
Hope to hear from you tomorrow during the Open Week session!
30+ Ubuntu enthusiasts, free software developers, hackers, beer drinkers, and spouses attended Austin's Karmic Release Party on Thursday, October 29, 2009, celebrating the spectacular Ubuntu 9.10 release.
We filled half of the dining space at Aussie's, an Australian-themed volleyball beach bar--in honor of our Koala mascot and the Ubuntu Enterprise Cloud (UEC) powered by Eucalyptus.
I got there about 3 hours early, and setup a UEC instance in the corner, using:
Linksys 310N wireless router and gigabit switch, flashed with DD-WRT, wirelessly bridged to Aussie's free WiFi and the Internet
1 Thinkpad X61 (dual 2.0GHz, 4GB, 250GB), Ubuntu 9.10 amd64, running the Eucalyptus Cloud/CC/SC/Walrus services; i.e., the cloud front end
2 Dell Vostro (dual 2.4GHz, 4GB, 320GB), Ubuntu 9.10 amd64, running the Eucalyptus NC services; i.e., the cloud nodes
Over the course of the party (6pm - Midnight), I did roughly 4 demonstrations of UEC on the local installation, showing the web interface, command line EC2-compatible tools, running instances, deploying appliances, terminating instances, and answering a number of excellent questions from our party goers. I also brought a Watt-meter and demonstrated PowerNap -- the unique feature of UEC that enables it to be the most energy efficient private cloud deployment around. Oooh...aaaaah :-)
Unfortunately, I was too busy talking and doing demonstrations, so I didn't take any good pictures this time. Sorry!
Dustin Kirkland (Twitter, LinkedIn) is an engineer at heart, with a penchant for reducing complexity and solving problems at the cross-sections of technology, business, and people.
With a degree in computer engineering from Texas A&M University (2001), his full-time career began as a software engineer at IBM in the Linux Technology Center working on the Linux kernel and security certifications, including a one-year stint as an dedicated engineer-in-residence at Red Hat in Boston (2005). Dustin was awarded the title Master Inventor at IBM, in recognition of his prolific patent work as an inventor and reviewer with IBM's intellectual property attorneys.
Dustin then first joined Canonical (2008) as an engineer (eventually, engineering manager), helping create the Ubuntu Server distribution and establishing Ubuntu as the overwhelming favorite Linux distribution in Amazon, Google, and Microsoft's cloud platforms, as well as authoring and maintaining dozens of new open source packages.
Dustin joined Gazzang (2011), a venture-backed start-up built around an open source project that he co-authored (eCryptFS), as Chief Technology Officer, and helped dozens of enterprise customers encrypt their data at rest and securely manage their keys. Gazzang was acquired by Cloudera (2014).
Having effectively monetized eCryptFS as an open source project at Gazzang, Dustin returned to Canonical (2013) as the VP of Product for Ubuntu and spent the next several years launching a portfolio of products and services (Ubuntu Advantage, Extended Security Maintenance, Canonical Livepatch, MAAS, OpenStack, Kubernetes) that continues to deliver considerable annual recurring revenue. With Canonical based in London, an 800+ work-from-home employee roster and customers spread across 40+ countries, Dustin traveled the world over, connecting with clients and colleagues steeped in rich cultural experiences.
Google Cloud (2018) recruited Dustin from Canonical to product manage Google's entrance into on-premises data centers with its GKE On-Prem (now, Anthos) offering, with a specific focus on the underlying operating system, hypervisor, and container security. This work afforded Dustin a view deep into the back end data center of many financial services companies, where he still sees tremendous opportunities for improvements in security, efficiencies, cost-reduction, and disruptive new technology adoption.
Seeking a growth-mode opportunity in the fintech sector, Dustin joined Apex Clearing (now, Apex Fintech Solutions) as the Chief Product Officer (2019), where he led several organizations including product management, field engineering, data science, and business partnerships. He drastically revamped Apex's product portfolio and product management processes, retooling away from a legacy "clearing house and custodian", and into a "software-as-a-service fintech" offering instant brokerage account opening, real-time fractional stock trading, a secure closed-network crypto solution, and led the acquisition and integration of Silver's tax and cost basis solution.
Drawn back into a large cap, Dustin joined Goldman Sachs (2021) as a Managing Director and Head of Platform Product Management, within the Consumer banking division, which included Marcus, and the Apple and GM credit cards. He built a cross-functional product management community and established numerous documented product management best practices, processes, and anti-patterns.
Dustin lives in Austin, Texas, with his wife Kim and their wonderful two daughters.