Project

General

Profile

Setting up systemd-nspawn VMs » History » Version 2

Brett Smith, 03/27/2025 09:27 PM
add a section about VM name resolution

1 1 Brett Smith
h1. Setting up systemd-nspawn VMs
2
3
This page describes how to use systemd-nspawn to create VMs for development and testing. This page is a guide, *not* step-by-step instructions. *If you just copy+paste commands without actually reading the instructions, you will BREAK YOUR OWN NETWORKING and I will not be held responsible.*
4
5
h2. One-time supervisor host setup
6
7
h3. Install systemd-nspawn and image build tools
8
9
<pre>sudo apt install systemd-container debootstrap
10
</pre>
11
12
@systemd-container@ packages systemd-nspawn and friends. @debootstrap@ is used to build VMs.
13
14
"Install Ansible":https://dev.arvados.org/projects/arvados/wiki/Hacking_prerequisites#Install-Ansible the same way we do for development. I'm fobbing you off to that page so you know what version of Ansible we're standardized on.
15
16
h3. Enable systemd network services
17
18
Unsurprisingly systemd-nspawn integrates well with other systemd components. The easiest way to get your VMs networked is to install systemd's network services:
19
20
<pre>sudo systemctl enable --now systemd-networkd systemd-resolved
21
</pre>
22
23
Note systemd-networkd only manages configured interfaces. On Debian the default configuration should play nice with NetworkManager. systemd-resolved and NetworkManager also cooperate.
24
25
If you refuse to do this, refer to the "Networking Options of systemd-nspawn":https://www.freedesktop.org/software/systemd/man/latest/systemd-nspawn.html#Networking%20Options to evaluate alternatives.
26
27
h3. NAT and firewall
28
29
systemd-networkd runs a DHCP server that provides private addresses to the virtual machines. You will need to configure your firewall to allow these DHCP requests, and to NAT traffic from those interfaces. These steps are specific to the host firewall; if yours isn't documented below, feel free to add it.
30
31
h4. ufw
32
33
For NAT, make sure these lines in @/etc/ufw/sysctl.conf@ are all set to @1@:
34
35
<pre>net/ipv4/ip_forward=1
36
net/ipv6/conf/default/forwarding=1
37
net/ipv6/conf/all/forwarding=1
38
</pre>
39
40
If you changed any, restart ufw. Then these are the rules you need:
41
42
<pre><code class="sh">for iface in vb-+ ve-+ vz-+; do
43
  sudo ufw rule  allow in on "$iface" proto udp to 0.0.0.0/0 port 67,68 comment "systemd-nspawn DHCP"
44
  sudo ufw route allow in on "$iface"
45
done
46
</code></pre>
47
48
h3. Filesystem
49
50
systemd-nspawn stores both images and containers under @/var/lib/machines@. It works with any filesystem, but if the filesystem is btrfs, it can optimize various operations with snapshots, etc. "Here's a blog post outlining some of the gains":https://idle.nprescott.com/2022/systemd-nspawn-and-btrfs.html.
51
52
I would recommend any deployment, and especially production deployments, have a btrfs filesystem at @/var/lib/machines@. Since this is likely to grow large, a dedicated partition is a good idea too.
53
54
h2. Build a systemd-nspawn container image
55
56
The Arvados source includes an Ansible playbook to create an image from scratch with @debootstrap@. Write this inventory file as @nspawn-image.yml@ and edit the vars as you like:
57
58
<pre><code class="yaml">ungrouped:
59
  vars:
60
    # The name of the VM image to create.
61
    image_name: "{{ debootstrap_suite }}"
62
    # The codename of the release to install.
63
    debootstrap_suite: stable
64
    # The mirror to install the release from.
65
    # The commented-out setting below is appropriate for Ubuntu.
66
    debootstrap_mirror: "http://deb.debian.org/debian"
67
    #debootstrap_mirror: "http://archive.ubuntu.com/ubuntu"
68
69
    # The name of the user account to create in the VM.
70
    # This sets it to the name of the user running Ansible.
71
    image_username: "{{ ansible_user_id }}"
72
    # SSH public key string or URL.
73
    image_authorized_keys: "FIXME"
74
    # A hash of the user's password. The default is no password.
75
    # See <https://docs.ansible.com/ansible/latest/reference_appendices/faq.html#how-do-i-generate-encrypted-passwords-for-the-user-module>
76
    image_passhash: "!"
77
    # Other settings for the created user.
78
    image_gecos: ""
79
    image_shell: /usr/bin/bash
80
81
  hosts:
82
    localhost: {}
83
</code></pre>
84
85
With your Ansible virtualenv activated, run:
86
87
<pre><code class="sh">ansible-playbook -i nspawn-image.yml arvados/tools/ansible/build-debian-nspawn-vm.yml
88
</code></pre>
89
90
If this succeeds, you have @/var/lib/machines/MACHINE@ with a base install and configuration.
91
92
h3. Consider Cloning
93
94
This is probably a good time to mention, you should think about these machine subdirectories more like VM disks rather than Docker images. If you simply boot your new VM and start making changes to it, those changes will be permanent. If you want an ephemeral VM you need to explicitly ask for that. Personally I prefer to never boot this bootstrapped VM directly, instead I run @machinectl clone BASE_NAME MACHINE@—then I treat @BASE_NAME@ like an "image" that I never touch, and @MACHINE@ more like a traditional stateful VM.
95
96
h2. Configure the VM
97
98
VMs are configured using the file at @/etc/systemd/nspawn/MACHINE.nspawn@. The defaults are pretty good and you don't have to write much. The main thing you'll want to do is tell it how to resolve DNS, and consider other networking:
99
100
<pre><code class="ini">[Exec]
101
ResolvConf=bind-uplink
102
103
[Network]
104
# If you want multiple VMs to be able to talk to each other,
105
# put them all in the same zone:
106
#Zone=YOURZONE
107
108
[Files]
109
# If you want to make things on the host available in the VM,
110
# do that here:
111
Bind=/dev/fuse
112
#BindReadOnly=/home/YOU/SUBDIR
113
</code></pre>
114
115
Refer to "systemd.nspawn":https://www.freedesktop.org/software/systemd/man/latest/systemd.nspawn.html for all the options.
116
117
h2. Privilege a Container
118
119
If you want to run FUSE, Docker, or Singularity inside your VM, that requires additional privileges. We have an Ansible playbook to automate that too. To grant privileges for all these services, with your Ansible virtualenv activated, run:
120
121
<pre><code class="sh">ansible-playbook -e container_name=MACHINE arvados/tools/ansible/privilege-nspawn-vm.yml
122
</code></pre>
123
124
You can exclude some privileges by setting @SERVICE_privileges=absent@. For example, if you don't intend to run Singularity in this VM:
125
126
<pre><code class="sh">ansible-playbook -e "container_name=MACHINE singularity_privileges=absent" arvados/tools/ansible/privilege-nspawn-vm.yml
127
</code></pre>
128
129
See the comments at the top of source:tools/ansible/privilege-nspawn-vm.yml for details.
130
131
h2. Interacting with VMs
132
133
"machinectl":https://www.freedesktop.org/software/systemd/man/latest/machinectl.html is the primary command to interact with both containers and the underlying disk images:
134
135
<pre><code class="sh">machinectl start MACHINE
136
machinectl stop MACHINE
137
machinectl shell YOU@MACHINE
138
139
machinectl clone MACHINE1 MACHINE2
140
machinectl remove MACHINE [MACHINE2 ...]
141
</code></pre>
142
143
Refer to the man page for full details. Note that running containers run under the <code>systemd-nspawn@MACHINE</code> systemd service, and you can interact with that with all the usual tools. (Try <code>journalctl -u systemd-nspawn@MACHINE</code>.)
144 2 Brett Smith
145
h2. Resolving VM names
146
147
You can configure your host system so that the names of running VMs resolve normally, so you can SSH into them, open them in your browser, write them in Ansible inventories, etc. Edit @/etc/nsswitch.conf@ and on the @hosts@ line, make sure that @mymachines@ appears before any @dns@ or @resolve@ entries. See "nss-mymachines(2)":https://www.freedesktop.org/software/systemd/man/latest/nss-mymachines.html.