X-Git-Url: https://git.proxmox.com/?p=pve-docs.git;a=blobdiff_plain;f=pct.conf.5-opts.adoc;h=a1be9e77d5b8da58568f77220c5b544835902d0c;hp=7256f5a16401fc2c614836c3defab0586df3688e;hb=ba021358f741ad6c8dcbf6364b1ef9824e1e0cdf;hpb=4d47f12597815e9a1fc3f3c1b4020e0d5c106254 diff --git a/pct.conf.5-opts.adoc b/pct.conf.5-opts.adoc index 7256f5a..a1be9e7 100644 --- a/pct.conf.5-opts.adoc +++ b/pct.conf.5-opts.adoc @@ -30,10 +30,14 @@ NOTE: You can disable fair-scheduler configuration by setting this to 0. Container description. Only used on the configuration web interface. -`features`: `[keyctl=<1|0>] [,mount=] [,nesting=<1|0>]` :: +`features`: `[fuse=<1|0>] [,keyctl=<1|0>] [,mount=] [,nesting=<1|0>]` :: Allow containers access to advanced features. +`fuse`=`` ('default =' `0`);; + +Allow using 'fuse' file systems in a container. Note that interactions between fuse and the freezer cgroup can potentially cause I/O deadlocks. + `keyctl`=`` ('default =' `0`);; For unprivileged containers only: Allow the use of the keyctl() system call. This is required to use docker inside a container. By default unprivileged containers will see this system call as non-existent. This is mostly a workaround for systemd-networkd, as it will treat it as a fatal error when some keyctl() operations are denied by the kernel due to lacking permissions. Essentially, you can choose between running systemd-networkd or docker. @@ -46,11 +50,15 @@ Allow mounting file systems of specific types. This should be a list of file sys Allow nesting. Best used with unprivileged containers with additional id mapping. Note that this will expose procfs and sysfs contents of the host to the guest. +`hookscript`: `` :: + +Script that will be exectued during various steps in the containers lifetime. + `hostname`: `` :: Set a host name for the container. -`lock`: `` :: +`lock`: `` :: Lock/unlock the VM. @@ -58,7 +66,7 @@ Lock/unlock the VM. Amount of RAM for the VM in MB. -`mp[n]`: `[volume=] ,mp= [,acl=<1|0>] [,backup=<1|0>] [,quota=<1|0>] [,replicate=<1|0>] [,ro=<1|0>] [,shared=<1|0>] [,size=]` :: +`mp[n]`: `[volume=] ,mp= [,acl=<1|0>] [,backup=<1|0>] [,mountoptions=] [,quota=<1|0>] [,replicate=<1|0>] [,ro=<1|0>] [,shared=<1|0>] [,size=]` :: Use volume as container mount point. @@ -70,6 +78,10 @@ Explicitly enable or disable ACL support. Whether to include the mount point in backups (only used for volume mount points). +`mountoptions`=`` ;; + +Extra mount options for rootfs/mps. + `mp`=`` ;; Path to the mount point as seen from inside the container. @@ -128,7 +140,7 @@ Default gateway for IPv6 traffic. `hwaddr`=`` ;; -The interface MAC address. This is dynamically allocated by default, but you can set that statically if needed, for example to always have the same link-local IPv6 address. (lxc.network.hwaddr) +A common MAC address with the I/G (Individual/Group) bit not set. `ip`=`<(IPv4/CIDR|dhcp|manual)>` ;; @@ -174,7 +186,7 @@ OS type. This is used to setup configuration inside the container, and correspon Sets the protection flag of the container. This will prevent the CT or CT's disk remove/update operation. -`rootfs`: `[volume=] [,acl=<1|0>] [,quota=<1|0>] [,replicate=<1|0>] [,ro=<1|0>] [,shared=<1|0>] [,size=]` :: +`rootfs`: `[volume=] [,acl=<1|0>] [,mountoptions=] [,quota=<1|0>] [,replicate=<1|0>] [,ro=<1|0>] [,shared=<1|0>] [,size=]` :: Use volume as container root. @@ -182,6 +194,10 @@ Use volume as container root. Explicitly enable or disable ACL support. +`mountoptions`=`` ;; + +Extra mount options for rootfs/mps. + `quota`=`` ;; Enable user quotas inside the container (not supported with zfs subvolumes)