Use CoreOS Container Linux on Linode
Traducciones al EspañolEstamos traduciendo nuestros guías y tutoriales al Español. Es posible que usted esté viendo una traducción generada automáticamente. Estamos trabajando con traductores profesionales para verificar las traducciones de nuestro sitio web. Este proyecto es un trabajo en curso.
This guide has been deprecated and is no longer being maintained.
CoreOS Container Linux is a container-focused distribution, designed for clustered deployments, that provides automation, security, and scalability for applications. The operating system is heavily streamlined and considered minimal compared to traditional distributions, like Debian or Ubuntu. Rather than being part of the host operating system, CoreOS’s runtime or development environment takes place inside a Linux container.
When you deploy a Container Linux image, you’ll notice the default settings in the configuration profile are different from those of other distributions.
Container Linux boots with the Direct Disk setting as opposed to GRUB2 or any other. Container Linux is not compatible with the Linode kernels.
Container Linux does not use a swap space, so while Linode’s other distributions use
/dev/sdb as a swap area, this is not necessary with Container Linux.
These are not needed for Container Linux, and Network Helper is not compatible so they are all disabled. Linode’s Container Linux images use
systemd-networkd, so see our static networking guide if you want to configure static and/or multiple IP addresses for your deployment.
The default user is the
core user, so you must log in as
core rather than
root user does not have a password assigned to it by default. This is the intended use of Container Linux.
Container Linux has no package manager such as apt or yum, and in fact the operating system is not upgraded with individual package updates like most distributions. Instead, entire system updates are pushed to the distribution and the system reboots in accordance with one of three reboot strategies.
The default configuration is to follow the etcd-lock strategy if etcd is being used (such as if you are clustering Linodes running Container Linux). If not, the system will reboot immediately after applying the update. For the Linode to boot back up automatically, you will want Lassie enabled in the Linode Manager.
If you find an update has undesirable effects, roll back to the previous version you were using. Update checks will take place about 10 minutes after Container Linux boots and about every hour afterwards. Should you need to trigger a manual update, use:
Should you need to access your Container Linux disk using Rescue Mode, use the boot instructions shown in our Rescue and Rebuild guide. The root partition is located on
/dev/sda9. To access it, enter:
mount /dev/sda9 && cd /media/sda9
That will put you at the root of your Container Linux filesystem. For more information on the partition layout of Container Linux, see the Container Linux Disk Partitions Guide.
This page was originally published on