Ubuntu Configuration

Disable Secure Boot, configure Grub for LXD and Enabling Root Access without Password.

This guide provides instructions for configuring Grub to support LXD and enabling root access without requiring a password. While enabling root access without a password is not strictly necessary, it can be helpful for convenience, especially on a development laptop.

Secure Boot

Make sure that Secure Boot is disabled.


Open the /etc/default/grub file using a text editor.

sudo nano /etc/default/grub

Find the line that starts with GRUB_CMDLINE_LINUX and modify it as follows:

GRUB_CMDLINE_LINUX="cgroup_enable=memory swapaccount=1 systemd.unified_cgroup_hierarchy=0"

Save the file and exit the text editor. Update Grub to apply the changes.

sudo update-grub

Reboot your system for the changes to take effect.

sudo reboot

Without making this edit, the network on CentOS 7 boxes may not function correctly, and the containers may fail to obtain an IP address. If you encounter the following error message during Vagrant provisioning, this edit is necessary:

The container failed to acquire an IPv4 address within 30 seconds.

Enabling Root Access without Password

Some tasks require executing commands as the root user without entering a password. Follow these steps to enable root access without a password using the command below.

echo "$USER ALL=(ALL) NOPASSWD:ALL" |  sudo tee -a /etc/sudoers.d/$USER > /dev/null

Enabling root access without a password is particularly useful for tasks that run on localhost and require root privileges. However, exercise caution when granting such access and ensure that you understand the implications.