Home Server Add first Virtual Machine

Index.

17-Jun-2011: initial release.
25-Aug-2011: update special hardware advice.
29-Aug-2011: replaced VDE network with host-only network.
06-Sep-2011: withdrawn special hardware advice.
06-Nov-2011: changed host-only network setup.
29-Dec-2011: removed host-only script parts.
14-Nov-2012: switched virtual server to Slackware.
05-Jan-2013: finished Slackware migration.
12-Jan-2013: removed not needed Slackware packages.
13-Aug-2013: updated extension pack installation procedure.
26-Apr-2014: added need for kernel-source package.
14-Apr-2014: rewritten for Linux Containers.

 

Introduction.

In the article Home Server Planning you could see how a virtual server fits into our home server design. This article will show how to add a virtual server and it shows how to make it start and stop automatic when your Home Server starts and stops. The virtualization solution is Linux Containers. I started using LXC on Slackware 14.1 which ships LXC version 0.9.0. To be able to create a Slackware container you also need the lxc-slack package from this site.

Before I used Linux Containers, I have used Virtualbox and before that VMware. They both do full virtualisation. The advantage is you can run a different distribution or OS other then what runs on the host. The disadvantage is that it costs more memory and it is a bit slower then the host. A container on the other hand is fast, because it uses the kernel from the host. That is the reason why you need a recent Linux, you need special features from the kernel. The disadvantage is that for the best results you need to run the same distribution as the host, or at least it must be kernel compatible. The easiest thing is to use the same as the host, so in our case that is Slackware 14.1. Because a container uses the host kernel, it boots a lot faster because the kernel is already running.

Another advantage of containers over full virtualisation is the energy and heat production by the host server. The disk temperature dropped almost 10 degrees Celsius, and the CPU core temperature 5 degrees. This results in lower energy usage while the performance of the virtual machines improved dramatically.

We need to reserve two new networks, we take the ranges from the whole reserved network space, see the updated table below. The network between the server and gateway will be a lxc host-only network, the network between the gateway and the web server will be an internal network. These networks will be build using a Virtual Distributed Ethernet, the vde2 package, also from this site.

 

IPv4 Remark
10.126.160.0/24 Workstations LAN
10.126.161.0/24 Server/Gateway gw0 LAN
10.126.162.0/24 DMZ LAN
10.126.163.0/24 Spare
10.126.164.0/24 Spare
10.126.165.0/24 Spare
10.126.166.0/24 Spare
10.126.167.0/24 Spare

 

First, a reminder of what the configuration will look like in the future. In this article the network between the host (gw0) and the Gateway server (eth0) will be added.

virtual networks

Install VDE2.

Build and install the Virtual Distributed Ethernet package (vde2) from this site. We will configure two networks, the host to gateway network and the network that we will use later for the webserver. We create them both right now, even that we only need one for now. With the vde2 package we will create two virtual ethernet switches.

Edit /etc/rc.d/rc.vde2.conf and set the following values, but use your own networks of course:

# VDENAME[n] should have no spaces

# Network for DMZ machines.
VDENAME[0]="net-dmz"
TAPNAME[0]=""
TAPCIDR[0]=""
VDESLIRP[0]=""
VDEDHCP[0]=""
IP6ADDR[0]=""

# Network between homsrv and gateway
VDENAME[1]="net-gw"
TAPNAME[1]="gw0"
TAPCIDR[1]="10.126.161.2/24"
VDESLIRP[1]=""
VDEDHCP[1]=""
IP6ADDR[1]=""

The first network is the dmz (De Militarized Zone) which we will use later when we add a web server. The one that we will use right now is the net-gw, this is the virtual network cable between our home server and the virtual gateway server. This virtual ethernet switch has a tap device on one end, gw0. This virtual ethernet card is created by the rc.vde2 and configured with an IPv4 address. (IPv6 will be another story).

There is a tricky problem now. You need to configure this network very early in the boot process of our Slackware machine, so we cannot use the rc.local script. For this purpose I wrote a special network-scripts package, but to make a difference my package is called network-scripts-ipv6. Install this package from this server, and make sure to use the new rc.inet1 and rc.inet1.conf files. This package will later help you with IPv6 but it does more. It also runs some extra scripts that help to configure the network with virtual machines. One of these scripts, rc.inet1-main will take care of running the rc.vde2 script, and also the rc.lxc script to start the Linux Containers.

So the whole boot order is now:

  1. Kernel boot, system init upto rc.inet1 networking.
  2. Run rc.inet1-pre, this script may be used to bring up tap interfaces etc.
  3. Configure the standard network using rc.inet1.conf but do not the the default gateway.
  4. Run rc.inet1-main, this script starts the VDE2 network, virtual machines etc.
  5. Configure the default gateways using rc.inet1.conf.
  6. Run rc.inet1-post, use this to add extra routes etc.
  7. Continue with the normal boot process.

As long as you don’t change the default gateway at this point, the home server is still functional and has Internet access.

 

Install LXC.

Slackware and Linux Containers, you need Slackware 14.1 and not older. But the shipped version in slackware 14.1 doesn’t have a script to install a Slackware container. Things will change in the upcoming version, but for now, your home server must be running Slackware 14.1. Then install the lxc-slack packkage from this server. This package adds the template to create a minimal Slackware container and has a /etc/rc.d/rc.lxc script. So if you have the lxc-0.9.0 and the lxc-slack-0.4_14.1 packages installed you can install the gateway container.

During the installation of a container, you need an internet connection because all packages are downloaded and then installed.

root@homsrv:~# lxc-create -n 01-gateway -t slackware

lxc-create: No config file specified, using the default config /etc/lxc/default.conf
installpkg is /sbin/installpkg

Checking cache download in /var/cache/lxc/slackware/cache-14.1-i486 ... 
Installing packages in /var/cache/lxc/slackware/rootfs-14.1-i486 ... 
cleaning up existing /var/cache/lxc/slackware/rootfs-14.1-i486 ... 
aaa_base-14.1-i486-1: Basic Linux filesystem package [90K] 
aaa_elflibs-14.1-i486-3: shared libraries needed by many programs [14M] 
aaa_terminfo-5.8-i486-1: a basic collection of terminfo entries [720K]
....
wget-1.14-i486-2: a non-interactive network retriever [2.0M]
which-2.20-i486-1: shows the full path to shell commands [90K] 
xz-5.0.5-i486-1: compression utility based on the LZMA algorithm [1010K]

Configuring...

Adding an etc/fstab that must be edited later
with the full path of the container if you move it.
Root password is 'root', please change it!

Copying rootfs to /var/lib/lxc/name/rootfs...
'slackware' template installed
'01-gateway' created
root@homsrv:~#

Now you can start this new machine:

root@homsrv:~# lxc-start -n 01-gateway
INIT: version 2.88 booting
INIT: Entering runlevel: 3
Going multiuser...
Updating shared library links: /sbin/ldconfig &
Starting sysklogd daemons: /usr/sbin/syslogd /usr/sbin/klogd -c 3 -x
Starting OpenSSH SSH daemon: /usr/sbin/sshd
Generating public/private rsa1 key pair.
Your identification has been saved in /etc/ssh/ssh_host_key.
Your public key has been saved in /etc/ssh/ssh_host_key.pub.
The key fingerprint is:
26:35:30:60:3b:c2:8e:1c:7a:6b:37:25:5e:29:7e:a6 root@name
Generating public/private dsa key pair.
Your identification has been saved in /etc/ssh/ssh_host_dsa_key.
Your public key has been saved in /etc/ssh/ssh_host_dsa_key.pub.
The key fingerprint is:
81:5a:9e:6a:34:91:fa:0c:db:af:e9:5f:36:63:fd:c7 root@name
Generating public/private rsa key pair.
Your identification has been saved in /etc/ssh/ssh_host_rsa_key.
Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub.
The key fingerprint is:
70:67:3b:9d:8a:00:49:0b:97:5b:a9:ff:a8:6d:6e:87 root@name
Generating public/private ecdsa key pair.
Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key.
Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub.
The key fingerprint is:
60:ed:2b:9b:d0:7f:cd:4a:08:df:d6:0d:e8:d6:dd:2e root@name
none on /dev/shm type tmpfs (rw)

* container 01-gateway started. *

On another console you can connect to a console of that machine:

root@homsrv:~# lxc-console -n 01-gateway

Type <Ctrl+a q> to exit the console, <Ctrl+a Ctrl+a> to enter Ctrl+a itself


Welcome to Linux 3.10.17-smp (tty1)

gateway login:

Now login, change root’s password from root to something you personally like to use and halt the machine. Next we will configure networking for that machine. Edit /var/lib/lxc/01-gateway/:

# Template used to create this container: slackware
# Template script checksum (SHA-1): 636a78b479e57f5053f0b07bb407133a9f068d11

# Start and stop the physical tap interface on the vde2 switch.
lxc.hook.pre-start = /var/lib/lxc/01-gateway/network-start.sh
lxc.hook.post-stop = /var/lib/lxc/01-gateway/network-stop.sh

# Physical device plugged into a vde switch.
lxc.network.type = phys
lxc.network.flags = up
lxc.network.link = gw1
lxc.network.hwaddr = AC:DE:48:7E:A1:01
lxc.network.name = eth0
lxc.network.veth.pair = veth161001

lxc.network.type = phys
lxc.network.flags = up
lxc.network.link = wan0
lxc.network.name = wan0
lxc.network.veth.pair = veth168102

lxc.network.type = phys
lxc.network.flags = up
lxc.network.link = dmz1
lxc.network.hwaddr = AC:DE:48:7E:A2:01
lxc.network.name = dmz0
lxc.network.veth.pair = veth162001

lxc.utsname = gateway

lxc.mount = /var/lib/lxc/01-gateway/rootfs/etc/fstab

lxc.tty = 4
lxc.pts = 1024
lxc.rootfs = /var/lib/lxc/01-gateway/rootfs

lxc.cgroup.devices.deny = a
# /dev/null and zero
lxc.cgroup.devices.allow = c 1:3 rwm
lxc.cgroup.devices.allow = c 1:5 rwm
# consoles
lxc.cgroup.devices.allow = c 5:1 rwm
lxc.cgroup.devices.allow = c 5:0 rwm
lxc.cgroup.devices.allow = c 4:0 rwm
lxc.cgroup.devices.allow = c 4:1 rwm
# /dev/{,u}random
lxc.cgroup.devices.allow = c 1:9 rwm
lxc.cgroup.devices.allow = c 1:8 rwm
lxc.cgroup.devices.allow = c 136:* rwm
lxc.cgroup.devices.allow = c 5:2 rwm
# rtc
lxc.cgroup.devices.allow = c 254:0 rwm
# tap/tun devices
lxc.cgroup.devices.allow = c 10:200 rwm

# we don't trust root user in the container, better safe than sorry.
# comment out only if you know what you're doing.
lxc.cap.drop = sys_module mknod
lxc.cap.drop = mac_override kill sys_time
lxc.cap.drop = setfcap setpcap sys_boot

# if you want to be even more restrictive with your container's root
# user comment the three lines above and uncomment the following one
# lxc.cap.drop=sys_admin

Next create /var/lib/lxc/01-gateway/network-start.sh

#!/bin/sh

logger "network-start container 01-gateway-plug gw1"
PID="/var/run/lxc-01-gateway-gw1.pid"
/usr/bin/vde_plug2tap -g vboxusers -m 0660 -s /var/run/vde.ctl.net-gw -P ${PID} -d gw1

logger "network-start container 01-gateway-plug dmz1"
PID="/var/run/lxc-01-gateway-dmz1.pid"
/usr/bin/vde_plug2tap -g vboxusers -m 0660 -s /var/run/vde.ctl.net-dmz -P ${PID} -d dmz1

And create /var/lib/lxc/01-gateway/network-stop.sh

#!/bin/sh

logger "network-stop container 01-gateway network-plug gw1"
PID="/var/run/lxc-01-gateway-gw1.pid"
#
# Stop vde_plug2tap
#
if [ -f ${PID} ]; then
 /bin/kill $(/usr/bin/cat ${PID})
 /usr/bin/rm -f ${PID}
fi

logger "network-stop container 01-gateway network-plug dmz1"
PID="/var/run/lxc-01-gateway-dmz1.pid"
#
# Stop vde_plug2tap
#
if [ -f ${PID} ]; then
 /bin/kill $(/usr/bin/cat ${PID}) 
 /usr/bin/rm -f ${PID}
fi

Chmod 755 these two new scripts. These two scripts are used to create network interfaces and “plug” them into the virtual ethernet switches we created earlier. If we now start the container again we can configure the network interfaces like we are used to do. Read the next article to see how.

 

Download.

The needed scripts and configuration files upto this article can be downloaded from the following location. The Firewall Builder configuration files are included, see the examples/homsrv/etc/iptables directory. Just unpack this archive in your home directory to see what you can use.

See the download pages for the script and configuration files.