1 `arch`: `<amd64 | arm64 | armhf | i386 | riscv32 | riscv64>` ('default =' `amd64`)::
5 `cmode`: `<console | shell | tty>` ('default =' `tty`)::
7 Console mode. By default, the console command tries to open a connection to one of the available tty devices. By setting cmode to 'console' it tries to attach to /dev/console instead. If you set cmode to 'shell', it simply invokes a shell inside the container (no login).
9 `console`: `<boolean>` ('default =' `1`)::
11 Attach a console device (/dev/console) to the container.
13 `cores`: `<integer> (1 - 8192)` ::
15 The number of cores assigned to the container. A container can use all available cores by default.
17 `cpulimit`: `<number> (0 - 8192)` ('default =' `0`)::
21 NOTE: If the computer has 2 CPUs, it has a total of '2' CPU time. Value '0' indicates no CPU limit.
23 `cpuunits`: `<integer> (0 - 500000)` ('default =' `cgroup v1: 1024, cgroup v2: 100`)::
25 CPU weight for a container. Argument is used in the kernel fair scheduler. The larger the number is, the more CPU time this container gets. Number is relative to the weights of all the other running guests.
27 `debug`: `<boolean>` ('default =' `0`)::
29 Try to be more verbose. For now this only enables debug log-level on start.
31 `description`: `<string>` ::
33 Description for the Container. Shown in the web-interface CT's summary. This is saved as comment inside the configuration file.
35 `dev[n]`: `[[path=]<Path>] [,gid=<integer>] [,mode=<Octal access mode>] [,uid=<integer>]` ::
37 Device to pass through to the container
39 `gid`=`<integer> (0 - N)` ;;
41 Group ID to be assigned to the device node
43 `mode`=`<Octal access mode>` ;;
45 Access mode to be set on the device node
49 Path to the device to pass through to the container
51 `uid`=`<integer> (0 - N)` ;;
53 User ID to be assigned to the device node
55 `features`: `[force_rw_sys=<1|0>] [,fuse=<1|0>] [,keyctl=<1|0>] [,mknod=<1|0>] [,mount=<fstype;fstype;...>] [,nesting=<1|0>]` ::
57 Allow containers access to advanced features.
59 `force_rw_sys`=`<boolean>` ('default =' `0`);;
61 Mount /sys in unprivileged containers as `rw` instead of `mixed`. This can break networking under newer (>= v245) systemd-network use.
63 `fuse`=`<boolean>` ('default =' `0`);;
65 Allow using 'fuse' file systems in a container. Note that interactions between fuse and the freezer cgroup can potentially cause I/O deadlocks.
67 `keyctl`=`<boolean>` ('default =' `0`);;
69 For unprivileged containers only: Allow the use of the keyctl() system call. This is required to use docker inside a container. By default unprivileged containers will see this system call as non-existent. This is mostly a workaround for systemd-networkd, as it will treat it as a fatal error when some keyctl() operations are denied by the kernel due to lacking permissions. Essentially, you can choose between running systemd-networkd or docker.
71 `mknod`=`<boolean>` ('default =' `0`);;
73 Allow unprivileged containers to use mknod() to add certain device nodes. This requires a kernel with seccomp trap to user space support (5.3 or newer). This is experimental.
75 `mount`=`<fstype;fstype;...>` ;;
77 Allow mounting file systems of specific types. This should be a list of file system types as used with the mount command. Note that this can have negative effects on the container's security. With access to a loop device, mounting a file can circumvent the mknod permission of the devices cgroup, mounting an NFS file system can block the host's I/O completely and prevent it from rebooting, etc.
79 `nesting`=`<boolean>` ('default =' `0`);;
81 Allow nesting. Best used with unprivileged containers with additional id mapping. Note that this will expose procfs and sysfs contents of the host to the guest.
83 `hookscript`: `<string>` ::
85 Script that will be exectued during various steps in the containers lifetime.
87 `hostname`: `<string>` ::
89 Set a host name for the container.
91 `lock`: `<backup | create | destroyed | disk | fstrim | migrate | mounted | rollback | snapshot | snapshot-delete>` ::
93 Lock/unlock the container.
95 `memory`: `<integer> (16 - N)` ('default =' `512`)::
97 Amount of RAM for the container in MB.
99 `mp[n]`: `[volume=]<volume> ,mp=<Path> [,acl=<1|0>] [,backup=<1|0>] [,mountoptions=<opt[;opt...]>] [,quota=<1|0>] [,replicate=<1|0>] [,ro=<1|0>] [,shared=<1|0>] [,size=<DiskSize>]` ::
101 Use volume as container mount point. Use the special syntax STORAGE_ID:SIZE_IN_GiB to allocate a new volume.
105 Explicitly enable or disable ACL support.
107 `backup`=`<boolean>` ;;
109 Whether to include the mount point in backups (only used for volume mount points).
111 `mountoptions`=`<opt[;opt...]>` ;;
113 Extra mount options for rootfs/mps.
117 Path to the mount point as seen from inside the container.
119 NOTE: Must not contain any symlinks for security reasons.
121 `quota`=`<boolean>` ;;
123 Enable user quotas inside the container (not supported with zfs subvolumes)
125 `replicate`=`<boolean>` ('default =' `1`);;
127 Will include this volume to a storage replica job.
131 Read-only mount point
133 `shared`=`<boolean>` ('default =' `0`);;
135 Mark this non-volume mount point as available on all nodes.
137 WARNING: This option does not share the mount point automatically, it assumes it is shared already!
139 `size`=`<DiskSize>` ;;
141 Volume size (read only value).
143 `volume`=`<volume>` ;;
145 Volume, device or directory to mount into the container.
147 `nameserver`: `<string>` ::
149 Sets DNS server IP address for a container. Create will automatically use the setting from the host if you neither set searchdomain nor nameserver.
151 `net[n]`: `name=<string> [,bridge=<bridge>] [,firewall=<1|0>] [,gw=<GatewayIPv4>] [,gw6=<GatewayIPv6>] [,hwaddr=<XX:XX:XX:XX:XX:XX>] [,ip=<(IPv4/CIDR|dhcp|manual)>] [,ip6=<(IPv6/CIDR|auto|dhcp|manual)>] [,link_down=<1|0>] [,mtu=<integer>] [,rate=<mbps>] [,tag=<integer>] [,trunks=<vlanid[;vlanid...]>] [,type=<veth>]` ::
153 Specifies network interfaces for the container.
155 `bridge`=`<bridge>` ;;
157 Bridge to attach the network device to.
159 `firewall`=`<boolean>` ;;
161 Controls whether this interface's firewall rules should be used.
163 `gw`=`<GatewayIPv4>` ;;
165 Default gateway for IPv4 traffic.
167 `gw6`=`<GatewayIPv6>` ;;
169 Default gateway for IPv6 traffic.
171 `hwaddr`=`<XX:XX:XX:XX:XX:XX>` ;;
173 A common MAC address with the I/G (Individual/Group) bit not set.
175 `ip`=`<(IPv4/CIDR|dhcp|manual)>` ;;
177 IPv4 address in CIDR format.
179 `ip6`=`<(IPv6/CIDR|auto|dhcp|manual)>` ;;
181 IPv6 address in CIDR format.
183 `link_down`=`<boolean>` ;;
185 Whether this interface should be disconnected (like pulling the plug).
187 `mtu`=`<integer> (64 - 65535)` ;;
189 Maximum transfer unit of the interface. (lxc.network.mtu)
193 Name of the network device as seen from inside the container. (lxc.network.name)
197 Apply rate limiting to the interface
199 `tag`=`<integer> (1 - 4094)` ;;
201 VLAN tag for this interface.
203 `trunks`=`<vlanid[;vlanid...]>` ;;
205 VLAN ids to pass through the interface
209 Network interface type.
211 `onboot`: `<boolean>` ('default =' `0`)::
213 Specifies whether a container will be started during system bootup.
215 `ostype`: `<alpine | archlinux | centos | debian | devuan | fedora | gentoo | nixos | opensuse | ubuntu | unmanaged>` ::
217 OS type. This is used to setup configuration inside the container, and corresponds to lxc setup scripts in /usr/share/lxc/config/<ostype>.common.conf. Value 'unmanaged' can be used to skip and OS specific setup.
219 `protection`: `<boolean>` ('default =' `0`)::
221 Sets the protection flag of the container. This will prevent the CT or CT's disk remove/update operation.
223 `rootfs`: `[volume=]<volume> [,acl=<1|0>] [,mountoptions=<opt[;opt...]>] [,quota=<1|0>] [,replicate=<1|0>] [,ro=<1|0>] [,shared=<1|0>] [,size=<DiskSize>]` ::
225 Use volume as container root.
229 Explicitly enable or disable ACL support.
231 `mountoptions`=`<opt[;opt...]>` ;;
233 Extra mount options for rootfs/mps.
235 `quota`=`<boolean>` ;;
237 Enable user quotas inside the container (not supported with zfs subvolumes)
239 `replicate`=`<boolean>` ('default =' `1`);;
241 Will include this volume to a storage replica job.
245 Read-only mount point
247 `shared`=`<boolean>` ('default =' `0`);;
249 Mark this non-volume mount point as available on all nodes.
251 WARNING: This option does not share the mount point automatically, it assumes it is shared already!
253 `size`=`<DiskSize>` ;;
255 Volume size (read only value).
257 `volume`=`<volume>` ;;
259 Volume, device or directory to mount into the container.
261 `searchdomain`: `<string>` ::
263 Sets DNS search domains for a container. Create will automatically use the setting from the host if you neither set searchdomain nor nameserver.
265 `startup`: `[[order=]\d+] [,up=\d+] [,down=\d+] ` ::
267 Startup and shutdown behavior. Order is a non-negative number defining the general startup order. Shutdown in done with reverse ordering. Additionally you can set the 'up' or 'down' delay in seconds, which specifies a delay to wait before the next VM is started or stopped.
269 `swap`: `<integer> (0 - N)` ('default =' `512`)::
271 Amount of SWAP for the container in MB.
273 `tags`: `<string>` ::
275 Tags of the Container. This is only meta information.
277 `template`: `<boolean>` ('default =' `0`)::
279 Enable/disable Template.
281 `timezone`: `<string>` ::
283 Time zone to use in the container. If option isn't set, then nothing will be done. Can be set to 'host' to match the host time zone, or an arbitrary time zone option from /usr/share/zoneinfo/zone.tab
285 `tty`: `<integer> (0 - 6)` ('default =' `2`)::
287 Specify the number of tty available to the container
289 `unprivileged`: `<boolean>` ('default =' `0`)::
291 Makes the container run as unprivileged user. (Should not be modified manually.)
293 `unused[n]`: `[volume=]<volume>` ::
295 Reference to unused volumes. This is used internally, and should not be modified manually.
297 `volume`=`<volume>` ;;
299 The volume that is not used currently.