]> git.proxmox.com Git - pve-docs.git/blame - pct.conf.5-opts.adoc
fix #3967: add ZFS dRAID documentation
[pve-docs.git] / pct.conf.5-opts.adoc
CommitLineData
4d47f125 1`arch`: `<amd64 | arm64 | armhf | i386>` ('default =' `amd64`)::
71e16346
DM
2
3OS architecture type.
4
013dc89f 5`cmode`: `<console | shell | tty>` ('default =' `tty`)::
71e16346 6
c2993fe5 7Console mode. By default, the console command tries to open a connection to one of the available tty devices. By setting cmode to 'console' it tries to attach to /dev/console instead. If you set cmode to 'shell', it simply invokes a shell inside the container (no login).
71e16346 8
013dc89f 9`console`: `<boolean>` ('default =' `1`)::
71e16346
DM
10
11Attach a console device (/dev/console) to the container.
12
4772952b 13`cores`: `<integer> (1 - 8192)` ::
de0983cb
DM
14
15The number of cores assigned to the container. A container can use all available cores by default.
16
4772952b 17`cpulimit`: `<number> (0 - 8192)` ('default =' `0`)::
71e16346
DM
18
19Limit of CPU usage.
20+
c2993fe5 21NOTE: If the computer has 2 CPUs, it has a total of '2' CPU time. Value '0' indicates no CPU limit.
71e16346 22
4e7f60c2 23`cpuunits`: `<integer> (0 - 500000)` ('default =' `cgroup v1: 1024, cgroup v2: 100`)::
71e16346 24
4e7f60c2 25CPU weight for a container. Argument is used in the kernel fair scheduler. The larger the number is, the more CPU time this container gets. Number is relative to the weights of all the other running guests.
71e16346 26
739d4d64
TL
27`debug`: `<boolean>` ('default =' `0`)::
28
29Try to be more verbose. For now this only enables debug log-level on start.
30
013dc89f 31`description`: `<string>` ::
71e16346 32
8f4d9c87 33Description for the Container. Shown in the web-interface CT's summary. This is saved as comment inside the configuration file.
71e16346 34
c5aa7e14 35`features`: `[force_rw_sys=<1|0>] [,fuse=<1|0>] [,keyctl=<1|0>] [,mknod=<1|0>] [,mount=<fstype;fstype;...>] [,nesting=<1|0>]` ::
4d47f125
TL
36
37Allow containers access to advanced features.
38
c5aa7e14
TL
39`force_rw_sys`=`<boolean>` ('default =' `0`);;
40
41Mount /sys in unprivileged containers as `rw` instead of `mixed`. This can break networking under newer (>= v245) systemd-network use.
42
e2d681b3
TL
43`fuse`=`<boolean>` ('default =' `0`);;
44
45Allow using 'fuse' file systems in a container. Note that interactions between fuse and the freezer cgroup can potentially cause I/O deadlocks.
46
4d47f125
TL
47`keyctl`=`<boolean>` ('default =' `0`);;
48
49For unprivileged containers only: Allow the use of the keyctl() system call. This is required to use docker inside a container. By default unprivileged containers will see this system call as non-existent. This is mostly a workaround for systemd-networkd, as it will treat it as a fatal error when some keyctl() operations are denied by the kernel due to lacking permissions. Essentially, you can choose between running systemd-networkd or docker.
50
c5aa7e14
TL
51`mknod`=`<boolean>` ('default =' `0`);;
52
53Allow unprivileged containers to use mknod() to add certain device nodes. This requires a kernel with seccomp trap to user space support (5.3 or newer). This is experimental.
54
4d47f125
TL
55`mount`=`<fstype;fstype;...>` ;;
56
57Allow mounting file systems of specific types. This should be a list of file system types as used with the mount command. Note that this can have negative effects on the container's security. With access to a loop device, mounting a file can circumvent the mknod permission of the devices cgroup, mounting an NFS file system can block the host's I/O completely and prevent it from rebooting, etc.
58
59`nesting`=`<boolean>` ('default =' `0`);;
60
61Allow nesting. Best used with unprivileged containers with additional id mapping. Note that this will expose procfs and sysfs contents of the host to the guest.
62
5f26e15b
TL
63`hookscript`: `<string>` ::
64
65Script that will be exectued during various steps in the containers lifetime.
66
013dc89f 67`hostname`: `<string>` ::
71e16346
DM
68
69Set a host name for the container.
70
1c532546 71`lock`: `<backup | create | destroyed | disk | fstrim | migrate | mounted | rollback | snapshot | snapshot-delete>` ::
71e16346 72
4e7f60c2 73Lock/unlock the container.
71e16346 74
013dc89f 75`memory`: `<integer> (16 - N)` ('default =' `512`)::
71e16346 76
4e7f60c2 77Amount of RAM for the container in MB.
71e16346 78
7cbed89a 79`mp[n]`: `[volume=]<volume> ,mp=<Path> [,acl=<1|0>] [,backup=<1|0>] [,mountoptions=<opt[;opt...]>] [,quota=<1|0>] [,replicate=<1|0>] [,ro=<1|0>] [,shared=<1|0>] [,size=<DiskSize>]` ::
71e16346 80
d2656385 81Use volume as container mount point. Use the special syntax STORAGE_ID:SIZE_IN_GiB to allocate a new volume.
c2993fe5 82
013dc89f 83`acl`=`<boolean>` ;;
c2993fe5
DM
84
85Explicitly enable or disable ACL support.
86
013dc89f 87`backup`=`<boolean>` ;;
c2993fe5 88
de0983cb 89Whether to include the mount point in backups (only used for volume mount points).
c2993fe5 90
7cbed89a
TL
91`mountoptions`=`<opt[;opt...]>` ;;
92
93Extra mount options for rootfs/mps.
94
c2993fe5
DM
95`mp`=`<Path>` ;;
96
de0983cb 97Path to the mount point as seen from inside the container.
2c0dde61
DM
98+
99NOTE: Must not contain any symlinks for security reasons.
c2993fe5 100
013dc89f 101`quota`=`<boolean>` ;;
c2993fe5
DM
102
103Enable user quotas inside the container (not supported with zfs subvolumes)
104
5d9c884c
DM
105`replicate`=`<boolean>` ('default =' `1`);;
106
107Will include this volume to a storage replica job.
108
013dc89f 109`ro`=`<boolean>` ;;
c2993fe5 110
de0983cb
DM
111Read-only mount point
112
013dc89f 113`shared`=`<boolean>` ('default =' `0`);;
de0983cb
DM
114
115Mark this non-volume mount point as available on all nodes.
116+
117WARNING: This option does not share the mount point automatically, it assumes it is shared already!
c2993fe5
DM
118
119`size`=`<DiskSize>` ;;
120
121Volume size (read only value).
122
123`volume`=`<volume>` ;;
124
125Volume, device or directory to mount into the container.
71e16346 126
013dc89f 127`nameserver`: `<string>` ::
71e16346 128
c2993fe5 129Sets DNS server IP address for a container. Create will automatically use the setting from the host if you neither set searchdomain nor nameserver.
71e16346 130
2489d6df 131`net[n]`: `name=<string> [,bridge=<bridge>] [,firewall=<1|0>] [,gw=<GatewayIPv4>] [,gw6=<GatewayIPv6>] [,hwaddr=<XX:XX:XX:XX:XX:XX>] [,ip=<(IPv4/CIDR|dhcp|manual)>] [,ip6=<(IPv6/CIDR|auto|dhcp|manual)>] [,mtu=<integer>] [,rate=<mbps>] [,tag=<integer>] [,trunks=<vlanid[;vlanid...]>] [,type=<veth>]` ::
71e16346
DM
132
133Specifies network interfaces for the container.
134
c2993fe5
DM
135`bridge`=`<bridge>` ;;
136
137Bridge to attach the network device to.
138
013dc89f 139`firewall`=`<boolean>` ;;
c2993fe5
DM
140
141Controls whether this interface's firewall rules should be used.
142
143`gw`=`<GatewayIPv4>` ;;
144
145Default gateway for IPv4 traffic.
146
147`gw6`=`<GatewayIPv6>` ;;
148
149Default gateway for IPv6 traffic.
150
151`hwaddr`=`<XX:XX:XX:XX:XX:XX>` ;;
152
95895385 153A common MAC address with the I/G (Individual/Group) bit not set.
c2993fe5 154
2489d6df 155`ip`=`<(IPv4/CIDR|dhcp|manual)>` ;;
c2993fe5
DM
156
157IPv4 address in CIDR format.
158
2489d6df 159`ip6`=`<(IPv6/CIDR|auto|dhcp|manual)>` ;;
c2993fe5
DM
160
161IPv6 address in CIDR format.
162
013dc89f 163`mtu`=`<integer> (64 - N)` ;;
c2993fe5
DM
164
165Maximum transfer unit of the interface. (lxc.network.mtu)
166
167`name`=`<string>` ;;
168
169Name of the network device as seen from inside the container. (lxc.network.name)
170
171`rate`=`<mbps>` ;;
172
173Apply rate limiting to the interface
174
013dc89f 175`tag`=`<integer> (1 - 4094)` ;;
c2993fe5
DM
176
177VLAN tag for this interface.
178
179`trunks`=`<vlanid[;vlanid...]>` ;;
180
181VLAN ids to pass through the interface
182
013dc89f 183`type`=`<veth>` ;;
c2993fe5
DM
184
185Network interface type.
186
013dc89f 187`onboot`: `<boolean>` ('default =' `0`)::
71e16346 188
4e7f60c2 189Specifies whether a container will be started during system bootup.
71e16346 190
7af2edf9 191`ostype`: `<alpine | archlinux | centos | debian | devuan | fedora | gentoo | nixos | opensuse | ubuntu | unmanaged>` ::
71e16346 192
c2993fe5 193OS type. This is used to setup configuration inside the container, and corresponds to lxc setup scripts in /usr/share/lxc/config/<ostype>.common.conf. Value 'unmanaged' can be used to skip and OS specific setup.
71e16346 194
013dc89f 195`protection`: `<boolean>` ('default =' `0`)::
71e16346 196
c2993fe5 197Sets the protection flag of the container. This will prevent the CT or CT's disk remove/update operation.
71e16346 198
7cbed89a 199`rootfs`: `[volume=]<volume> [,acl=<1|0>] [,mountoptions=<opt[;opt...]>] [,quota=<1|0>] [,replicate=<1|0>] [,ro=<1|0>] [,shared=<1|0>] [,size=<DiskSize>]` ::
71e16346
DM
200
201Use volume as container root.
202
013dc89f 203`acl`=`<boolean>` ;;
c2993fe5
DM
204
205Explicitly enable or disable ACL support.
206
7cbed89a
TL
207`mountoptions`=`<opt[;opt...]>` ;;
208
209Extra mount options for rootfs/mps.
210
013dc89f 211`quota`=`<boolean>` ;;
c2993fe5
DM
212
213Enable user quotas inside the container (not supported with zfs subvolumes)
214
5d9c884c
DM
215`replicate`=`<boolean>` ('default =' `1`);;
216
217Will include this volume to a storage replica job.
218
013dc89f 219`ro`=`<boolean>` ;;
c2993fe5 220
de0983cb
DM
221Read-only mount point
222
013dc89f 223`shared`=`<boolean>` ('default =' `0`);;
de0983cb
DM
224
225Mark this non-volume mount point as available on all nodes.
226+
227WARNING: This option does not share the mount point automatically, it assumes it is shared already!
c2993fe5
DM
228
229`size`=`<DiskSize>` ;;
230
231Volume size (read only value).
232
233`volume`=`<volume>` ;;
234
235Volume, device or directory to mount into the container.
236
013dc89f 237`searchdomain`: `<string>` ::
71e16346 238
c2993fe5 239Sets DNS search domains for a container. Create will automatically use the setting from the host if you neither set searchdomain nor nameserver.
71e16346
DM
240
241`startup`: `[[order=]\d+] [,up=\d+] [,down=\d+] ` ::
242
c2993fe5 243Startup and shutdown behavior. Order is a non-negative number defining the general startup order. Shutdown in done with reverse ordering. Additionally you can set the 'up' or 'down' delay in seconds, which specifies a delay to wait before the next VM is started or stopped.
71e16346 244
013dc89f 245`swap`: `<integer> (0 - N)` ('default =' `512`)::
71e16346 246
4e7f60c2 247Amount of SWAP for the container in MB.
71e16346 248
5c1699e5
TL
249`tags`: `<string>` ::
250
251Tags of the Container. This is only meta information.
252
013dc89f 253`template`: `<boolean>` ('default =' `0`)::
71e16346
DM
254
255Enable/disable Template.
256
04d22a9f
TL
257`timezone`: `<string>` ::
258
259Time zone to use in the container. If option isn't set, then nothing will be done. Can be set to 'host' to match the host time zone, or an arbitrary time zone option from /usr/share/zoneinfo/zone.tab
260
013dc89f 261`tty`: `<integer> (0 - 6)` ('default =' `2`)::
71e16346
DM
262
263Specify the number of tty available to the container
264
013dc89f 265`unprivileged`: `<boolean>` ('default =' `0`)::
71e16346 266
c2993fe5 267Makes the container run as unprivileged user. (Should not be modified manually.)
71e16346 268
c5aa7e14 269`unused[n]`: `[volume=]<volume>` ::
71e16346 270
c2993fe5 271Reference to unused volumes. This is used internally, and should not be modified manually.
71e16346 272
c5aa7e14
TL
273`volume`=`<volume>` ;;
274
275The volume that is not used currently.
276