summaryrefslogtreecommitdiff
path: root/topics/guix-system-containers-and-how-we-use-them.gmi
diff options
context:
space:
mode:
authorArun Isaac2023-03-31 18:03:01 +0100
committerArun Isaac2023-03-31 18:03:01 +0100
commitc47bc44ea82884340356062791bbaf45cf2f2b90 (patch)
tree1d740902bea032b215fdf7c25d569173f213c183 /topics/guix-system-containers-and-how-we-use-them.gmi
parent92b08b814a6e69b9f3285aac79380a4f4779d037 (diff)
downloadgn-gemtext-c47bc44ea82884340356062791bbaf45cf2f2b90.tar.gz
Document our use of Guix system containers.
Diffstat (limited to 'topics/guix-system-containers-and-how-we-use-them.gmi')
-rw-r--r--topics/guix-system-containers-and-how-we-use-them.gmi55
1 files changed, 55 insertions, 0 deletions
diff --git a/topics/guix-system-containers-and-how-we-use-them.gmi b/topics/guix-system-containers-and-how-we-use-them.gmi
new file mode 100644
index 0000000..3aa3f7a
--- /dev/null
+++ b/topics/guix-system-containers-and-how-we-use-them.gmi
@@ -0,0 +1,55 @@
+# Guix system containers and how we use them
+
+Our preferred way to deploy long-running services is to use Guix system containers. Note that Guix system containers are different from guix shell containers (and the older guix environment containers). guix shell containers are meant for interactive use and are a poor fit for deployment. Other non-Guix ways such as running long-running processes in tmuxes, running long-running services from your development repository, etc. are unthinkably hacky and should not even be considered as a quick dirty way to get things done.
+
+Guix system containers are fully described by a scheme configuration file that, among other things, specifies the services run in it. These scheme configuration files are built using `guix system container' and produce a script. This script, when run, starts the described container.
+```
+$ guix system container foo.scm
+/gnu/store/9ld75cjg54xwqvsvvgdd38rv3d4x4wzz-run-container
+```
+
+## Share network with the host
+
+Usually, we want the container to share the network with the host. So, we add the --network flag.
+```
+$ guix system container --network foo.scm
+```
+
+## Adding state to Guix system containers
+
+Guix system containers are completely ephemeral, that is, they have no persistent state. But often, we have services that need to retain some state. Think a database server needing to persist its database directory, a web server needing to persist its logs, etc. To allow this persistence, we expose (read-only) or share (read-write) directories from the host into the container.
+```
+$ guix system container --network --share=/var/lib/foo foo.scm
+```
+
+## systemd services to manage the container processes
+
+Now, running these container scripts directly from the command-line, probably from within a tmux, makes for a very fragile deployment. So, we symlink the script into /usr/local/bin and set up a systemd service to manage the container process.
+```
+# ln --force --symbolic $(guix system container --network --share=/var/lib/foo foo.scm) /usr/local/bin/foo-container
+```
+A systemd service file foo-container.service for this container should be put at /etc/systemd/system/.
+```
+[Unit]
+Description = Run foo container
+
+[Service]
+ExecStart = /usr/local/bin/foo-container
+
+[Install]
+WantedBy = multi-user.target
+```
+This allows us to start, stop and enable (for starting at boot time) the container easily.
+```
+# guix system start foo-container
+# guix system stop foo-container
+# guix system enable foo-container
+```
+With our service enabled to start at boot time, we need not worry about reboots. All our containers, and the services contained therein, start up smoothly on boot.
+
+## Register as garbage collector root
+
+Finally, we must also tell Guix not to accidentally garbage collect our container or any of its dependencies. To this end, we symlink it into /var/guix/gcroots.
+```
+# ln --force --symbolic /usr/local/bin/foo-container /var/guix/gcroots
+```