Changes

Jump to navigation Jump to search
126 bytes removed ,  14:10, 18 September 2012
Line 57: Line 57:  
Restoring is symmetrical. The way LXC container works imposes some more requirements on crtools usage.
 
Restoring is symmetrical. The way LXC container works imposes some more requirements on crtools usage.
   −
* You need to use the <code>--evasive-devices</code> option to handle <code>/dev/log</code> users (there's a bug in LXC code)
   
* In order to properly isolate container from unwanted networking communication during checkpoint/restore you should provide a script for locking/unlocking the container network (see below)
 
* In order to properly isolate container from unwanted networking communication during checkpoint/restore you should provide a script for locking/unlocking the container network (see below)
 
* When restoring a container with veth device you may specify a name for the host-side veth device
 
* When restoring a container with veth device you may specify a name for the host-side veth device

Navigation menu