X-Git-Url: https://git.proxmox.com/?p=pve-docs.git;a=blobdiff_plain;f=pct.adoc;h=e2b36870d158cea6ee3668387428301c96908157;hp=2a3f9c0cb05d0670336bf059d24375719b1780cd;hb=e1d66945e22262758b921f8255f530937f2f56ab;hpb=404a158e1b79f205df7f5cf1827dde32ef9a8ea2 diff --git a/pct.adoc b/pct.adoc index 2a3f9c0..e2b3687 100644 --- a/pct.adoc +++ b/pct.adoc @@ -1,5 +1,6 @@ +[[chapter_pct]] ifdef::manvolnum[] -PVE(1) +pct(1) ====== include::attributes.txt[] :pve-toplevel: @@ -23,10 +24,9 @@ ifndef::manvolnum[] Proxmox Container Toolkit ========================= include::attributes.txt[] +:pve-toplevel: endif::manvolnum[] - ifdef::wiki[] -:pve-toplevel: :title: Linux Container endif::wiki[] @@ -104,7 +104,7 @@ will affect a random unprivileged user, and so would be a generic kernel security bug rather than an LXC issue. The LXC team thinks unprivileged containers are safe by design. - +[[pct_configuration]] Configuration ------------- @@ -165,6 +165,7 @@ or Those settings are directly passed to the LXC low-level tools. +[[pct_snapshots]] Snapshots ~~~~~~~~~ @@ -261,12 +262,14 @@ NOTE: Container start fails if the configured `ostype` differs from the auto detected type. +[[pct_options]] Options ~~~~~~~ include::pct.conf.5-opts.adoc[] +[[pct_container_images]] Container Images ---------------- @@ -333,6 +336,7 @@ example you can delete that image later with: pveam remove local:vztmpl/debian-8.0-standard_8.0-1_amd64.tar.gz +[[pct_container_storage]] Container Storage ----------------- @@ -490,6 +494,7 @@ ACLs allow you to set more detailed file ownership than the traditional user/ group/others model. +[[pct_container_network]] Container Network -----------------