diff --git a/nixos/doc/manual/administration/containers.chapter.md b/nixos/doc/manual/administration/containers.chapter.md
new file mode 100644
index 000000000000..ea51f91f698f
--- /dev/null
+++ b/nixos/doc/manual/administration/containers.chapter.md
@@ -0,0 +1,28 @@
+# Container Management {#ch-containers}
+
+NixOS allows you to easily run other NixOS instances as *containers*.
+Containers are a light-weight approach to virtualisation that runs
+software in the container at the same speed as in the host system. NixOS
+containers share the Nix store of the host, making container creation
+very efficient.
+
+::: {.warning}
+Currently, NixOS containers are not perfectly isolated from the host
+system. This means that a user with root access to the container can do
+things that affect the host. So you should not give container root
+access to untrusted users.
+:::
+
+NixOS containers can be created in two ways: imperatively, using the
+command `nixos-container`, and declaratively, by specifying them in your
+`configuration.nix`. The declarative approach implies that containers
+get upgraded along with your host system when you run `nixos-rebuild`,
+which is often not what you want. By contrast, in the imperative
+approach, containers are configured and updated independently from the
+host system.
+
+```{=docbook}
+
+
+
+```
diff --git a/nixos/doc/manual/administration/containers.xml b/nixos/doc/manual/administration/containers.xml
deleted file mode 100644
index 8e0e300f367b..000000000000
--- a/nixos/doc/manual/administration/containers.xml
+++ /dev/null
@@ -1,34 +0,0 @@
-
- Container Management
-
- NixOS allows you to easily run other NixOS instances as
- containers. Containers are a light-weight approach to
- virtualisation that runs software in the container at the same speed as in
- the host system. NixOS containers share the Nix store of the host, making
- container creation very efficient.
-
-
-
- Currently, NixOS containers are not perfectly isolated from the host system.
- This means that a user with root access to the container can do things that
- affect the host. So you should not give container root access to untrusted
- users.
-
-
-
- NixOS containers can be created in two ways: imperatively, using the command
- nixos-container, and declaratively, by specifying them in
- your configuration.nix. The declarative approach implies
- that containers get upgraded along with your host system when you run
- nixos-rebuild, which is often not what you want. By
- contrast, in the imperative approach, containers are configured and updated
- independently from the host system.
-
-
-
-
-
diff --git a/nixos/doc/manual/administration/running.xml b/nixos/doc/manual/administration/running.xml
index 24fd864956ff..7d0d56726226 100644
--- a/nixos/doc/manual/administration/running.xml
+++ b/nixos/doc/manual/administration/running.xml
@@ -16,6 +16,6 @@
-
+
diff --git a/nixos/doc/manual/from_md/administration/containers.chapter.xml b/nixos/doc/manual/from_md/administration/containers.chapter.xml
new file mode 100644
index 000000000000..afbd5b35aaa5
--- /dev/null
+++ b/nixos/doc/manual/from_md/administration/containers.chapter.xml
@@ -0,0 +1,31 @@
+
+ Container Management
+
+ NixOS allows you to easily run other NixOS instances as
+ containers. Containers are a light-weight
+ approach to virtualisation that runs software in the container at
+ the same speed as in the host system. NixOS containers share the Nix
+ store of the host, making container creation very efficient.
+
+
+
+ Currently, NixOS containers are not perfectly isolated from the
+ host system. This means that a user with root access to the
+ container can do things that affect the host. So you should not
+ give container root access to untrusted users.
+
+
+
+ NixOS containers can be created in two ways: imperatively, using the
+ command nixos-container, and declaratively, by
+ specifying them in your configuration.nix. The
+ declarative approach implies that containers get upgraded along with
+ your host system when you run nixos-rebuild,
+ which is often not what you want. By contrast, in the imperative
+ approach, containers are configured and updated independently from
+ the host system.
+
+
+
+
+