<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Thu, Jul 10, 2014 at 4:39 PM, Jimmy Thrasibule <span dir="ltr"><<a href="mailto:jimmy.thrasibule@gmail.com" target="_blank">jimmy.thrasibule@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Guido,<br>
<br>
> that's just a bad-styled init script because the assumption of "one PID" will fail in every context like Container virtualization Or, iff you even like to run two instances of such an program (using disjunctive resources by configuration). Using best practices, an init script will use an "PID-file" and will have the facility to "name" instances -- at least to distinguish this PID-file.<br>
><br>
> There are other "bad-styled" packages. As I remember, syslog-ng (still?) have to be started on the host before other instances in the containers -- because it has a build-in mechanism against double-starting based on the same assumption. From this, you get into trouble if you need to restart it on the host for some reason.<br>
<br>
I understand the issue however hiding the containers processes can<br>
still be useful in some cases. We can already hide PIDs [1] from<br>
users. Extending this to cgroups would be a nice to have.<br>
<br></blockquote><div><br></div><div>Many things can be nice-to-have or useful. Often it comes to who's willing to create a patch for it (in this case, PID namespace in kernel).</div><div><br></div><div>Personally I don't think there's much incentive for that since a workaround already exists.</div>
<div><br></div><div>-- </div><div>Fajar</div></div></div></div>