Showing posts with label video. Show all posts
Showing posts with label video. Show all posts
Thursday, June 6, 2019
Thursday, April 11, 2019
Thursday, October 11, 2018
Thursday, September 20, 2018
Thursday, July 26, 2018
Monday, September 18, 2017
Results of the Ubuntu Desktop Applications Survey
In my keynote, I presented the results of the Ubuntu 18.04 LTS Default Desktops Applications Survey, which was discussed at length on HackerNews, Reddit, and Slashdot. With the help of the Ubuntu Desktop team (led by Will Cooke), we processed over 15,000 survey responses and in this presentation, I discussed some of the insights of the data.
The team is now hard at work evaluating many of the suggested applications, for those of you that aren't into the all-Emacs spin of Ubuntu ;-)
Moreover, we're also investigating a potential approach to make the Ubuntu Desktop experience perhaps a bit like those Choose-Your-Own-Adventure books we loved when we were kids, where users have the opportunity to select each of their prefer applications (or stick with the distro default) for a handful of categories, during installation.
Marius Quabeck recorded the session and published the audio and video of the presentation here on YouTube:
Labels:
Roadmap,
slides,
Snaps,
Ubuntu,
Ubuntu-Core,
Ubuntu-Desktop,
Ubuntu-Server,
video
Location:
Paris, France
Thursday, July 13, 2017
Back on The Changelog, talking Ubuntu 12.04 ESM, Ubuntu on Windows, and Snaps!
I met up with the excellent hosts of the The Changelog podcast at OSCON in Austin a few weeks back, and joined them for a short segment: https://changelog.com/podcast/256
That podcast recording is now live! Enjoy!
Listen on Changelog.com
Cheers,
Dustin
Tuesday, February 14, 2017
Kubernetes InstallFest at ContainerWorld -- Feb 21, 2017!
We at Canonical have been super busy fine tuning your experience with Kubernetes, Docker, and LXD on Ubuntu!
Amazingly, you're merely two commands away from standing up a fully functional, minimal Kubernetes cluster on any Ubuntu 16.04 LTS system...
$ sudo snap install --classic conjure-up $ conjure-up kubernetes-core
Or, if you're feeling more enterprisey and want the full experience, try:
$ conjure-up canonical-kubernetes
I hope to meet some of you at ContainerWorld in Santa Clara next week. Marco Ceppi and I are running a Kubernetes installfest workshop on Tuesday, February 21, 2017, from 3pm - 4:30pm. I can guarantee that every single person who attends will succeed in deploying their own Kubernetes cluster to a public cloud (AWS, Azure, or Google), or to their Ubuntu laptop or VM.
Also, I'm giving a talk entitled, "Using the Right Container Technology for the Job", on Wednesday, February 22, 2017 from 1:30pm - 2:10pm.
Finally, I invite you to check out this 30-minute podcast with David Daly, from DevOpsChat, where we talked quite a bit about Containers and Kubernetes and the experience we're working on in Ubuntu...
Cheers,
:-Dustin
Labels:
Containers,
Docker,
Kubernetes,
LXD,
Ubuntu,
ubuntu-cloud,
Ubuntu-Server,
video
Thursday, September 29, 2016
OpenZFS Developer Summit Keynote: Everything Old is New Again...But Better!
On Monday this week, I was afforded the distinct privilege to deliver the opening keynote at the OpenZFS Developer Summit in San Francisco. It was a beautiful little event, with a full day of informative presentations and lots of networking during lunch and breaks.
Below, you can view my slides, download the PDF, or watch the talk (starts at 31:10) and demo in its entirety.
Hopefully you'll enjoy the demo -- especially the most interesting raw tracing system new in the Ubuntu 16.04 LTS Linux 4.4 kernel, something called The Berkeley Packet Filter, or "BPF" for short. I used a series of open source utilities from Brendan Gregg (from Netflix), called iovisor/bcc. Quoting the README.md on Github:
BCC is a toolkit for creating efficient kernel tracing and manipulation programs, and includes several useful tools and examples. It makes use of extended BPF (Berkeley Packet Filters), formally known as eBPF, a new feature that was first added to Linux 3.15. Much of what BCC uses requires Linux 4.1 and above.I'll follow up this post with another one, formally introducing BPF and how to install and use bcc in Ubuntu 16.04 LTS, if anyone is interested...
:-Dustin
Labels:
bcc,
bpf,
Canonical,
slides,
ubuntu-cloud,
Ubuntu-Server,
video,
zfs
Monday, September 26, 2016
Container Camp London: Streamlining HPC Workloads with Containers
You're welcome to view the slides or download them as a PDF, or watch my talk below.
And for the techies who want to skip the slide fluff and get their hands dirty, setup your OpenStack and LXD and start streamlining your HPC workloads using this guide.
Enjoy,
:-Dustin
Labels:
Canonical,
Containers,
Docker,
hpc,
LXC,
LXD,
slides,
Ubuntu,
ubuntu-cloud,
Ubuntu-Server,
video
Saturday, June 18, 2016
The Changelog Podcast -- Ubuntu Everywhere
I had the honor and privilege a couple of weeks ago, to participate in a recording of The Changelog, a podcast dedicated to Open Source technology: https://changelog.com/podcast/207
You can listen to it here.
These guys -- Jerod and Adam -- produce a fantastic show, and we covered a lot of ground!
Give it a listen, and follow the links at the bottom of their page (their site is hosted on Ubuntu, of course!) to learn more.
Cheers!
Dustin
Monday, May 16, 2016
Byobu Hollywood Melodrama and Ubuntu Featured on NBCNews!
A few years ago, I wrote and released a fun little script that would carve up an Ubuntu Byobu terminal into a bunch of splits, running various random command line status utilities.
100% complete technical mumbo jumbo. The goal was to turn your terminal into something that belongs in a Hollywood hacker film.
I am proud to see it included in this NBCNews piece about "Ransomware". All of the screenshots, demonstrating what a "hacker" is doing with a system are straight from Ubuntu, Byobu, and Hollywood!
Here are a few screenshots, and the video is embedded below...
Enjoy!
:-Dustin
100% complete technical mumbo jumbo. The goal was to turn your terminal into something that belongs in a Hollywood hacker film.
I am proud to see it included in this NBCNews piece about "Ransomware". All of the screenshots, demonstrating what a "hacker" is doing with a system are straight from Ubuntu, Byobu, and Hollywood!
Here are a few screenshots, and the video is embedded below...
Enjoy!
:-Dustin
Labels:
Byobu,
Canonical,
hollywood,
Ubuntu,
ubuntu-cloud,
Ubuntu-Server,
video
Monday, May 9, 2016
Using Containers to Create the World's Fastest OpenStack
Labels:
Canonical,
openstack,
slides,
Ubuntu,
ubuntu-cloud,
Ubuntu-Server,
video
Thursday, March 31, 2016
Still have questions about Bash and Ubuntu on Windows?
For fun, watch the crowd develop in the background over the 30 minute session!
And here's another recorded session with a demo by Rich Turner and Russ Alexander. The real light bulb goes off at about 8:01.
Cheers,
:-Dustin
Labels:
Canonical,
Ubuntu,
Ubuntu-Server,
video,
Windows
Monday, September 28, 2015
Container Summit Presentation and Live LXD Demo
It was professionally recorded by the A/V crew at the conference. The live demo begins at the 25:21 mark.
You can also find the slide deck embedded below and download the PDFs from here.
Cheers,
:-Dustin
Labels:
Canonical,
Containers,
Docker,
Joyent,
LXD,
Ubuntu,
ubuntu-cloud,
Ubuntu-Server,
video
Monday, August 3, 2015
Thursday, April 23, 2015
1stBuild Hackathon -- GE Smart Appliances and Snappy Ubuntu
![]() |
A prototype is worth a thousand meetings -- Words to live by! |
Over 250 makers -- hardware and software geeks much like myself -- competed for cash prizes in teams all night long in a 36 hour event at the amazing hackerspace hosted by 1stBuild and the University of Louisville in Kentucky.
Mark Shuttleworth recorded this message, played in the kickoff keynote, to start the hackathon:
Several entries did in fact use Snappy Ubuntu as the base operating system, including the 3rd Place entry, a Smart Crockpot!
I'll quote Jason Chodynieki, on the team that built that device, since I couldn't write it any better:
"I wanted to highlight that this project makes use of Snappy Ubuntu Core! Using Snappy, we were able to create a very modular application that could easily be updated across multiple devices if this project ever made it to production. Snappy provided us with the ability to use popular frameworks very easily and to package our application up as a Snap to make it accessible to the world. With Snappy and the associated CrockWatch snap, we are capable of dropping CrockWatch onto any device that is receiving sensor data from a Crockpot. Because of this, the CrockWatch application can not only run on the webserver (on a Raspberry Pi 2) we used for this project, but it can also be used on other devices. Imagine if your set top box on your TV could help show you what's cooking in the Crock Pot or if the screen on your fridge was capable of displaying this information! With Ubuntu Snappy, these thoughts could soon become reality!"
My wife absolutely loves this idea! She often starts cooking dinner in the morning, in our slow cooker, and then spends the rest of the day running around town, dropping our kids off and picking them up from two different schools. She would love the ability to remotely "check in" on the food, look at it from a camera, and adjust the temperature and pressure while out and about around town!
GE had a whole array of appliance available at the event, any of which could be controlled through a special interface, and a Raspberry Pi 2 running Snappy, including this fridge.
All in all, it was a fantastic event. A big thanks to our hosts at 1stBuild and our colleagues at GE that introduced us to the event. And an even bigger thanks to all the participants that worked with Ubuntu on their devices and to my colleague Massimo who helped them out!
Happy Hacking,
Dustin
Monday, March 16, 2015
SXSW 2015 Slides and Audio from Fingerprints are Usernames, Not Passwords
This morning, I led a "core conversation" session in the Security and Privacy track at SXSW Interactive festival. With 60 seats in the room, it was standing room only, and unfortunately, some people were turned away from the session due to a lack of space. Amazingly, that was a packed house at 9:30am on a Sunday morning, merely stumbling distance from the late night party that is 6th Street in Austin, Texas!
I'm pleased to share with you both the slides, as well as a rudimentary audio recording from the mic on my laptop. The format of a "core conversation" at SXSW is not your typical conference lecture. Rather, it's an interactive, dynamic, social exchange of ideas and thoughts. I hope you enjoy!
Slides:
Audio:
Have a great South-by!
Dustin
Tuesday, January 20, 2015
Snappy Ubuntu for Devices -- The Year of the Linux Countertop!
Forget about The Year of the Linux Desktop...This is The Year of the Linux Countertop!
I'm talking about Linux on every form of Internet-connected embedded devices. The Internet-of-Things is already upon us. Sensors, smart watches, TVs, thermostats, security cameras, drones, printers, routers, switches, robots -- you name it.
And with that backdrop, we are thrilled to introduce Snappy Ubuntu for Devices. Ubuntu is now a possibility, on almost any device, anywhere. Now that's exciting!
This is the same Snappy Ubuntu, with its atomic, transactional updates that we launched on each major public cloud last month -- extended and updated for 64-bit Intel, AMD and ARM devices.
You can check out the official landing page for a comprehensive list of already-enabled devices and services, including: Ninjablocks, openHAB, Open Source Robotics Foundation, Robot Operating System, Erle Robotics, Odroid, Beagleboard, Udoo, Parallella, PCDuino, Banana Pro, Allwinner, DeviceHive, IoTSys, RIOT, Resin.io, Kaa, Nwave, Siralab, OpenSensors.io, Weave, 2lemetry.
Now, if you want a detailed, developer's look at building a Snappy Ubuntu image and running it on a BeagleBone, you're in luck! I shot this little instructional video (using Cheese, GTK-RecordMyDesktop, and OpenShot). Enjoy!
A transcript of the video follows...
- What is Snappy Ubuntu?
- A few weeks ago, we introduced a new flavor of Ubuntu that we call “Snappy” -- an atomically, transactionally updated Operating System -- and showed how to launch, update, rollback, and install apps in cloud instances of Snappy Ubuntu in Amazon EC2, Microsoft Azure, and Google Compute Engine public clouds.
- And now we’re showing how that same Snappy Ubuntu experience is the perfect operating system for today’s Cambrian Explosion of smart devices that some people are calling “the Internet of Things”!
- Snappy Ubuntu Core bundles only the essentials of a modern, appstore powered Linux OS stack and hence leaves room both in size as well as flexibility to build, maintain and monetize very own device solution without having to care about the overhead of inventing and maintaining your own OS and tools from scratch. Snappy Ubuntu Core comes right in time for you to put your very own stake into stake into still unconquered worlds of things
- We think you’ll love Snappy on your smart devices for many of the same reasons that there are already millions of Ubuntu machine instances in hundreds of public and private clouds, as well as the millions of your own Ubuntu desktops, tablets, and phones!
- Unboxing the BeagleBone
- Our target hardware for this Snappy Ubuntu demo is the BeagleBone Black -- an inexpensive, open platform for hardware and software developers.
- I paid $55 for the board, and $8 for a USB to TTL Serial Cable
- The board is about the size of a credit card, has a 1GHz ARM Cortex A8 processor, 512MB RAM, and on board ethernet.
- While Snappy Ubuntu will run on most any armhf or amd64 hardware (including the Intel NUC), the BeagleBone is perhaps the most developer friendly solution.
- The easiest way to get your Snappy Ubuntu running on your Beaglebone
- The world of Devices has so many opportunities that it won’t be possible to give everyone the perfect vertical stack centrally. Hence Canonical is trying to enable all of you and provide you with the elements that get you started doing your innovation as quickly as possible. Since there will be many devices that won’t need a screen and input devices, we have developed “webdm”. webdm gives you the ability to manage your snappy device and consume apps without any development effort.
- To installl you simply download our prebuilt WEB .img and dd it to your sd card.
- After that all you ahve to do is to connect your beaglebone to a DHCP enabled local network and power it on.
- After 1-2 minutes you go to http://webdm.local:8080 and can get onto installing apps from the snappy appstore without any further effort
- Of course, we are still in beta and will continue give you more features and a greater experience over time; we will not only make the UI better, but also work on various customization options that allow you to deliver your own app store powered product without investing your development resources in something that already got solved.
- Downloading Snappy and writing to an sdcard
- Now we’re going to build a Snappy Ubuntu image to run on our device.
- Soon, we’ll publish a library of Snappy Ubuntu images for many popular devices, but for this demo, we’re going to roll our own using the tool, ubuntu-device-flash.
- ls -halF mysnappy.img
- sudo dd if=mysnappy.img of=/dev/mmblk0 bs=1M oflag=dsync
- Hooking up the BeagleBone
- Insert the microsd card
- Network cable
- USB debug
- Power/USB
- Booting Snappy and command line experience
- Okay, so we’re ready for our first boot of Snappy!
- Let’s attach to the USB/serial console using screen
- Now, I’ll attach the power, and if you watch very carefully, you might get to see some a few boot messages.
- snappy help
- ifconfig
- ssh ubuntu@10.0.0.105
- WebDM experience
- snappy info
- Shows we have the webdm framework installed
- point browser to http://10.0.0.105:8080
- Configuration
- Store
- Conclusion
- Hey how cool is that! Snappy Ubuntu running on devices :-)
- I’ve spent plenty of time and money geeking out over my Nest and Dropcam and Netatmo and WeMo lightswitches, playing with their APIs and hooking them up to If-This-Then-That.
- But I’m really excited about a world where those types of devices are as accessible to me as my Ubuntu servers and desktops!
- And from what I’ve shown you here, with THIS, I think we can safely say that that we’ve blown right past the year of the Linux desktop.
- This is the year of the Linux countertop!
Cheers,
Dustin
Friday, December 19, 2014
AWSnap! Snappy Ubuntu Now Available on AWS!
Awww snap!
That's right! Snappy Ubuntu images are now on AWS, for your EC2 computing pleasure.
Enjoy this screencast as we start a Snappy Ubuntu instance in AWS, and install the xkcd-webserver package.
And a transcript of the commands follows below.
kirkland@x230:/tmp⟫ cat cloud.cfg #cloud-config snappy: ssh_enabled: True kirkland@x230:/tmp⟫ aws ec2 describe-images \ > --region us-east-1 \ > --image-ids ami-5c442634 { "Images": [ { "ImageType": "machine", "Description": "ubuntu-core-devel-1418912739-141-amd64", "Hypervisor": "xen", "ImageLocation": "ucore-images/ubuntu-core-devel-1418912739-141-amd64.manifest.xml", "SriovNetSupport": "simple", "ImageId": "ami-5c442634", "RootDeviceType": "instance-store", "Architecture": "x86_64", "BlockDeviceMappings": [], "State": "available", "VirtualizationType": "hvm", "Name": "ubuntu-core-devel-1418912739-141-amd64", "OwnerId": "649108100275", "Public": false } ] } kirkland@x230:/tmp⟫ kirkland@x230:/tmp⟫ # NOTE: This AMI will almost certainly have changed by the time you're watching this ;-) kirkland@x230:/tmp⟫ clear kirkland@x230:/tmp⟫ aws ec2 run-instances \ > --region us-east-1 \ > --image-id ami-5c442634 \ > --key-name id_rsa \ > --instance-type m3.medium \ > --user-data "$(cat cloud.cfg)" { "ReservationId": "r-c6811e28", "Groups": [ { "GroupName": "default", "GroupId": "sg-d5d135bc" } ], "OwnerId": "357813986684", "Instances": [ { "KeyName": "id_rsa", "PublicDnsName": null, "ProductCodes": [], "StateTransitionReason": null, "LaunchTime": "2014-12-18T17:29:07.000Z", "Monitoring": { "State": "disabled" }, "ClientToken": null, "StateReason": { "Message": "pending", "Code": "pending" }, "RootDeviceType": "instance-store", "Architecture": "x86_64", "PrivateDnsName": null, "ImageId": "ami-5c442634", "BlockDeviceMappings": [], "Placement": { "GroupName": null, "AvailabilityZone": "us-east-1e", "Tenancy": "default" }, "AmiLaunchIndex": 0, "VirtualizationType": "hvm", "NetworkInterfaces": [], "SecurityGroups": [ { "GroupName": "default", "GroupId": "sg-d5d135bc" } ], "State": { "Name": "pending", "Code": 0 }, "Hypervisor": "xen", "InstanceId": "i-af43de51", "InstanceType": "m3.medium", "EbsOptimized": false } ] } kirkland@x230:/tmp⟫ kirkland@x230:/tmp⟫ aws ec2 describe-instances --region us-east-1 | grep PublicIpAddress "PublicIpAddress": "54.145.196.209", kirkland@x230:/tmp⟫ ssh -i ~/.ssh/id_rsa ubuntu@54.145.196.209 ssh: connect to host 54.145.196.209 port 22: Connection refused 255 kirkland@x230:/tmp⟫ ssh -i ~/.ssh/id_rsa ubuntu@54.145.196.209 The authenticity of host '54.145.196.209 (54.145.196.209)' can't be established. RSA key fingerprint is 91:91:6e:0a:54:a5:07:b9:79:30:5b:61:d4:a8:ce:6f. No matching host key fingerprint found in DNS. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '54.145.196.209' (RSA) to the list of known hosts. Welcome to Ubuntu Vivid Vervet (development branch) (GNU/Linux 3.16.0-25-generic x86_64) * Documentation: https://help.ubuntu.com/ The programs included with the Ubuntu system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Welcome to the Ubuntu Core rolling development release. * See https://ubuntu.com/snappy It's a brave new world here in snappy Ubuntu Core! This machine does not use apt-get or deb packages. Please see 'snappy --help' for app installation and transactional updates. To run a command as administrator (user "root"), use "sudo". See "man sudo_root" for details. ubuntu@ip-10-153-149-47:~$ mount sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime) proc on /proc type proc (rw,nosuid,nodev,noexec,relatime) udev on /dev type devtmpfs (rw,relatime,size=1923976k,nr_inodes=480994,mode=755) devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000) tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=385432k,mode=755) /dev/xvda1 on / type ext4 (ro,relatime,data=ordered) /dev/xvda3 on /writable type ext4 (rw,relatime,discard,data=ordered) tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,mode=755) tmpfs on /etc/fstab type tmpfs (rw,nosuid,noexec,relatime,mode=755) /dev/xvda3 on /etc/systemd/system type ext4 (rw,relatime,discard,data=ordered) securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime) tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev) tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k) tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755) cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd) pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime) cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset,clone_children) cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct) cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory) cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices) cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer) cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio) cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio) cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event) cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb) tmpfs on /etc/machine-id type tmpfs (ro,relatime,size=385432k,mode=755) systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=22,pgrp=1,timeout=300,minproto=5,maxproto=5,direct) hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime) debugfs on /sys/kernel/debug type debugfs (rw,relatime) mqueue on /dev/mqueue type mqueue (rw,relatime) fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime) /dev/xvda3 on /etc/hosts type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /etc/sudoers.d type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /root type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/lib/click/frameworks type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /usr/share/click/frameworks type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/lib/systemd/snappy type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/lib/systemd/click type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/lib/initramfs-tools type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /etc/writable type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /etc/ssh type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/tmp type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/lib/apparmor type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/cache/apparmor type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /etc/apparmor.d/cache type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /etc/ufw type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/log type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/lib/system-image type ext4 (rw,relatime,discard,data=ordered) tmpfs on /var/lib/sudo type tmpfs (rw,relatime,mode=700) /dev/xvda3 on /var/lib/logrotate type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/lib/dhcp type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/lib/dbus type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/lib/cloud type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /var/lib/apps type ext4 (rw,relatime,discard,data=ordered) tmpfs on /mnt type tmpfs (rw,relatime) tmpfs on /tmp type tmpfs (rw,relatime) /dev/xvda3 on /apps type ext4 (rw,relatime,discard,data=ordered) /dev/xvda3 on /home type ext4 (rw,relatime,discard,data=ordered) /dev/xvdb on /mnt type ext3 (rw,relatime,data=ordered) tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=385432k,mode=700,uid=1000,gid=1000) ubuntu@ip-10-153-149-47:~$ mount | grep " / " /dev/xvda1 on / type ext4 (ro,relatime,data=ordered) ubuntu@ip-10-153-149-47:~$ sudo touch /foo touch: cannot touch ‘/foo’: Read-only file system ubuntu@ip-10-153-149-47:~$ sudo apt-get update Ubuntu Core does not use apt-get, see 'snappy --help'! ubuntu@ip-10-153-149-47:~$ sudo snappy --help Usage:snappy [-h] [-v] {info,versions,search,update-versions,update,rollback,install,uninstall,tags,build,chroot,framework,fake-version,nap} ... snappy command line interface optional arguments: -h, --help show this help message and exit -v, --version Print this version string and exit Commands: {info,versions,search,update-versions,update,rollback,install,uninstall,tags,build,chroot,framework,fake-version,nap} info versions search update-versions update rollback undo last system-image update. install uninstall tags build chroot framework fake-version ==SUPPRESS== nap ==SUPPRESS== ubuntu@ip-10-153-149-47:~$ sudo snappy info release: ubuntu-core/devel frameworks: apps: ubuntu@ip-10-153-149-47:~$ sudo snappy versions -a Part Tag Installed Available Fingerprint Active ubuntu-core edge 141 - 7f068cb4fa876c * ubuntu@ip-10-153-149-47:~$ sudo snappy search docker Part Version Description docker 1.3.2.007 The docker app deployment mechanism ubuntu@ip-10-153-149-47:~$ sudo snappy install docker docker 4 MB [=============================================================================================================] OK Part Tag Installed Available Fingerprint Active docker edge 1.3.2.007 - b1f2f85e77adab * ubuntu@ip-10-153-149-47:~$ sudo snappy versions -a Part Tag Installed Available Fingerprint Active ubuntu-core edge 141 - 7f068cb4fa876c * docker edge 1.3.2.007 - b1f2f85e77adab * ubuntu@ip-10-153-149-47:~$ sudo snappy search webserver Part Version Description go-example-webserver 1.0.1 Minimal Golang webserver for snappy xkcd-webserver 0.3.1 Show random XKCD compic via a build-in webserver ubuntu@ip-10-153-149-47:~$ sudo snappy install xkcd-webserver xkcd-webserver 21 kB [=====================================================================================================] OK Part Tag Installed Available Fingerprint Active xkcd-webserver edge 0.3.1 - 3a9152b8bff494 * ubuntu@ip-10-153-149-47:~$ exit logout Connection to 54.145.196.209 closed. kirkland@x230:/tmp⟫ ec2-instances i-af43de51 ec2-54-145-196-209.compute-1.amazonaws.com kirkland@x230:/tmp⟫ ec2-terminate-instances i-af43de51 INSTANCE i-af43de51 running shutting-down kirkland@x230:/tmp⟫
Cheers!
Dustin
Labels:
aws,
Canonical,
Cloud,
EC2,
snappy,
Ubuntu,
ubuntu-cloud,
Ubuntu-Server,
video
Subscribe to:
Posts (Atom)