Open Container Initiative Announces Distribution Specification Project



  • OCI creates distribution specification to standardize container image distribution

    SAN FRANCISCO, Calif. – April 9, 2018 ​– The Open Container Initiative (OCI), an open source community for creating open standards around containers, today announced the launch of the Distribution Specification project to standardize container image distribution based on the specification for the Docker Registry v2 protocol, which supports the pushing and pulling of container images.

    Having a solid, common distribution specification paired with conformance testing will ensure interoperability throughout the cloud native and container ecosystem. The Docker Registry v2 protocol has become a defacto standard across implementations of container registries and will serve as the specification for the new distribution-spec OCI project.

    “With the booming development in container and cloud native technologies, the community needs a reliable industry standard for distribution to allow for increased interoperability along with a neutral home to evolve the specification,” said Chris Aniszczyk, Executive Director of OCI. “OCI contributors and maintainers have been hard at work to collaborativelydrive the adoption of specifications for the container standards community and will start the journey for container distribution.”

    The release of this project is the result of extensive work from key maintainers Derek McGowan, Stephen Day and Vincent Batts, with backing from more than hundreds of OCI contributors and organizations committed to container standardization.

    Comments from Lead Maintainers

    “Docker’s contribution of the Docker Registry V2 specification aligns with our history of making key open source projects available to the community,” said Michael Crosby, Docker engineer and maintainer and chairman of the OCI Technical Oversight Board (TOB). “As with the runtime and image specification, Docker’s registry protocol has become a defacto standard with over 40 billion images pulled using this protocol. We are excited by the support that the distribution spec project is getting from the members of the community and we know their backing of resources will fuel the growth of this collaborative project and evolve the specification to provide the underpinning of all container registries on the market.”

    “Now that the OCI image and runtime specifications have reached v1.0, it is time to collaborate on developing the OCI specification for distributing those images” said Vincent Batts, principal software engineer, Office of the CTO, Red Hat. “Building on existing industry experience and contributions from the community, we look forward to a distribution standard to complement our ability to create and launch standard OCI images.”

    Comments from OCI Members

    “We are happy to see the community working together to define a container image distribution standard, and AWS is excited to participate actively in these discussions to represent our customers. While ECR supports the Docker Registry v2 API today, we believe that working toward open standards will help maintain interoperability between specifications while supporting customers adopting containers and overall ecosystem growth,” said Deepak Singh, Director, Compute Services, AWS.

    “As production use of containers increases, our customers need to rely on consistent distribution and provenance. Google Cloud is pleased to see the industry coalescing around the OCI specifications including the newest Distribution Specification. As these specifications continue to evolve, we look forward to evaluating them to determine how they can be applied to Google technology and better serve our customers,” said Sarah Novotny, Open Source Strategy Lead, Google Cloud.

    “We believe that customers should not worry about choosing a container technology for its portability, which is the primary goal of establishing OCI – to create industry-wide container standards. Thanks to the OCI, customers can consume different container engines based upon different scenarios on Huawei Cloud. The standardization of container distribution will build a better ecosystem around containers, and make both Huawei and customers more confident about offering and having more choices on container technologies,” said Xiaoli Jiang, General Manager of Cloud Open Source Ecosystem, Huawei.

    “IBM is proud to have been a founder, contributor and early adopter of OCI’s standardization work for our enterprise-grade Cloud Container Service,” said Todd Moore, VP of Open Technology, Digital Business Group at IBM. “The creation of the Distribution Specification project is the next logical step in standardizing open container technologies that offer the cloud native ecosystem a unified industry approach. Our clients trust IBM to help them ensure freedom of choice throughout their entire container management life-cycle.”

    “With the distribution specification joining the Open Container Initiative all three core components of containers – runtime, image format and distribution – are on the path to standardization, ensuring continued interoperability across the ecosystem. The Azure Container Registry was implemented using the open source Docker distribution project, which now serves as a foundation for the OCI distribution spec,” said Taylor Brown, Principal Lead Program Manager, Cloud and AI, Microsoft.

    “The delivery of container images is an important aspect of the container ecosystem and flow. SUSE is glad that OCI is now driving the distribution standard, and we’re excited to help further extend the proposed specification alongside the rest of the OCI community” said Alan Clark, Director of Industry Initiatives, Emerging Standards and Open Source at SUSE.

    “Defining common standards for containers is incredibly important for our enterprise customers, many of whom use them to move HPC workloads to the cloud so they can repeatedly deliver a consistent application or service implementation. The OCI distribution specification demonstrates a new level of maturity in the container ecosystem, and will help ensure interoperability and protect our customers’ technology investments,” said Rob Lalonde, Univa Vice President and General Manager, Navops.

    More information about the OCI Distribution Specification project can be found at https://github.com/opencontainers/distribution-spec.

    About the Open Container Initiative (OCI)

    The Open Container Initiative is an open governance structure for the express purpose of creating open industry standards around container formats and runtime. Projects associated to the Open Container Initiative can be found at https://github.com/opencontainers. Learn more about joining the OCI community here: https://www.opencontainers.org/community

    The Open Container Initiative is a Collaborative Project at The Linux Foundation. Linux Foundation Collaborative Projects are independently funded software projects that harness the power of collaborative development to fuel innovation across industries and ecosystems. www.linuxfoundation.org

    Additional Resources

    The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our trademark usage page: https://www.linuxfoundation.org/trademark-usage. Linux is a registered trademark of Linus Torvalds.

    The post Open Container Initiative Announces Distribution Specification Project appeared first on The Linux Foundation.

    https://www.linuxfoundation.org/press-release/open-container-initiative-announces-distribution-specification-project/


 



Tmux Commands

screen and tmux

A comparison of the features (or more-so just a table of notes for accessing some of those features) for GNU screen and BSD-licensed tmux.

The formatting here is simple enough to understand (I would hope). ^ means ctrl+, so ^x is ctrl+x. M- means meta (generally left-alt or escape)+, so M-x is left-alt+x

It should be noted that this is no where near a full feature-set of either group. This - being a cheat-sheet - is just to point out the most very basic features to get you on the road.

Trust the developers and manpage writers more than me. This document is originally from 2009 when tmux was still new - since then both of these programs have had many updates and features added (not all of which have been dutifully noted here).

Action tmux screen
start a new session tmux OR
tmux new OR
tmux new-session
screen
re-attach a detached session tmux attach OR
tmux attach-session
screen-r
re-attach an attached session (detaching it from elsewhere) tmux attach -d OR
tmux attach-session -d
screen -dr
re-attach an attached session (keeping it attached elsewhere) tmux attach OR
tmux attach-session
screen -x
detach from currently attached session ^b d OR
^b :detach
^a ^d OR
^a :detach
rename-window to newname ^b , <newname> OR
^b :rename-window <newn>
^a A <newname>
list windows ^b w ^a w
list windows in chooseable menu ^a "
go to window # ^b # ^a #
go to last-active window ^b l ^a ^a
go to next window ^b n ^a n
go to previous window ^b p ^a p
see keybindings ^b ? ^a ?
list sessions ^b s OR
tmux ls OR
tmux list-sessions
screen -ls
toggle visual bell ^a ^g
create another window ^b c ^a c
exit current shell/window ^d ^d
split window/pane horizontally ^b " ^a S
split window/pane vertically ^b % ^a |
switch to other pane ^b o ^a <tab>
kill the current pane ^b x OR (logout/^D)
collapse the current pane/split (but leave processes running) ^a X
cycle location of panes ^b ^o
swap current pane with previous ^b {
swap current pane with next ^b }
show time ^b t
show numeric values of panes ^b q
toggle zoom-state of current pane (maximize/return current pane) ^b z
break the current pane out of its window (to form new window) ^b !
re-arrange current panels within same window (different layouts) ^b [space]
Kill the current window (and all panes within) ^b killw [target-window]
  • Make ISO from DVD

    In this case I had an OS install disk which was required to be on a virtual node with no optical drive, so I needed to transfer an image to the server to create a VM

    Find out which device the DVD is:

    lsblk

    Output:

    NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT sda 8:0 0 465.8G 0 disk ├─sda1 8:1 0 1G 0 part /boot └─sda2 8:2 0 464.8G 0 part ├─centos-root 253:0 0 50G 0 lvm / ├─centos-swap 253:1 0 11.8G 0 lvm [SWAP] └─centos-home 253:2 0 403G 0 lvm /home sdb 8:16 1 14.5G 0 disk /mnt sr0 11:0 1 4.1G 0 rom /run/media/rick/CCSA_X64FRE_EN-US_DV5

    Therefore /dev/sr0 is the location , or disk to be made into an ISO

    I prefer simplicity, and sometimes deal with the fallout after the fact, however Ive repeated this countless times with success.

    dd if=/dev/sr0 of=win10.iso

    Where if=Input file and of=output file

    I chill out and do something else while the image is being copied/created, and the final output:

    8555456+0 records in 8555456+0 records out 4380393472 bytes (4.4 GB) copied, 331.937 s, 13.2 MB/s

    Fin!

    read more
  • Recreate postrgresql database template encode to ASCII

    UPDATE pg_database SET datistemplate = FALSE WHERE datname = 'template1';

    Now we can drop it:

    DROP DATABASE template1;

    Create database from template0, with a new default encoding:

    CREATE DATABASE template1 WITH TEMPLATE = template0 ENCODING = 'UNICODE'; UPDATE pg_database SET datistemplate = TRUE WHERE datname = 'template1'; \c template1 VACUUM FREEZE;

    read more
});