Hi, Ive been using LXD for a while now and am really enjoying it.
I want to run Nginx Proxy Manager (in a production environment), but Nginx Proxy Manager only runs in Docker.
I have setup a container like so:
lxc launch ubuntu:20.04 npm
lxc config set npm security.nesting true
lxc config set npm security.syscalls.intercept.mknod=true
lxc config set npm security.syscalls.intercept.setxattr=true
I have installed docker and docker-compose within the container and Nginx Proxy Manager is up and running.
Nesting containers is new to me and I always run my other containers in unprivileged mode.
I guess I’d like to know is this a safe practice to use in production as I was to have Nginx Proxy Manager public facing?
or should I be locking down the container in other ways?
The config above should be fine, security.nesting=true on an unprivileged LXD container is safe and both the mknod and setxattr syscall interception features are also considered safe to use. They could be abused to cause a denial of service attack on the host (using up all the CPU) but as your container doesn’t have limits in place in the first place, that’s unlikely to be an issue here.
They should be set when using the overlay2 VFS backend in Docker which is usually the default storage backend. It may work for a while without them, but eventually you’ll hit a layer which will require those options.
Basically those options are needed to handle layers that remove a file or directory from a parent layer. You don’t need them so long as all your layers add stuff, but the moment one of them needs to delete something, if you’re using overlay2, you’ll need them.
Apparently running docker within a LXD container (nested mode) makes the docker daemon run with a driver which is not overlay2 automatically. This ends up with taxing performance inevitably. So my new rule is that if I’m going to use docker, I will use a VM.
I do have it forced to overlay2 in daemon.json though and I can’t recall if that was needed or not, but overlay2 certainly does work fine inside of an Incus container.
Right, I’m not because ZFS is specifically incompatible with overlay2, that’s not a container issue, that’s really a ZFS issue. If your VM had ZFS as a filesystem, you’d have the same issue in there.
But that’s also why we added ZFS block mode to our storage volumes a while back.
So you can do: