In this case it’s for running gns3. It spins up its own managed VM's for simulating network devices and topologies.
Running it in a container separates the GNS3 managed instances in a dedicated context.
I was previously running in a dedicated VM, so it uses nested virtualization for the vm's it...
After adding to /etc/pve/lxc/{vmid}.conf the correct cgroups rule, it qemu was able to start correctly;
# /dev/kvm
lxc.cgroup.devices.allow = c 10:232 rwm
The container did have the be a privileged one.
I would like to use plain kvm virtualization inside a container created in proxmox.
Using plain LXC/LXD this is possible by running (see github.com/lxc/lxd/issues/2718):
lxc config device add CONTAINER kvm unix-char path=/dev/kvm
I noticed that in my unprivileged container, the device /dev/kvm...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.