You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+22-6Lines changed: 22 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,6 +86,7 @@ More detailed instructions are in the [`example README.md`](https://github.com/R
86
86
|**args**|[]string | no | Arguments to the command. |
87
87
|**privileged**| bool | no | Run container in privileged mode. Your container will have all linux capabilities when running in privileged mode. |
88
88
|**seccomp**| bool | no | Enable default seccomp profile. List of [`allowed syscalls`](https://github.com/containerd/containerd/blob/master/contrib/seccomp/seccomp_default.go#L51-L390). |
89
+
|**seccomp_profile**| string | no | Path to custom seccomp profile. `seccomp` must be set to `true` in order to use `seccomp_profile`. The default `docker` seccomp profile found [`here`](https://github.com/moby/moby/blob/master/profiles/seccomp/default.json) can be used as a reference, and modified to create a custom seccomp profile. |
89
90
|**readonly_rootfs**| bool | no | Container root filesystem will be read-only. |
90
91
|**host_network**| bool | no | Enable host network. This is equivalent to `--net=host` in docker. |
91
92
|**cap_add**|[]string | no | Add individual capabilities. |
@@ -112,6 +113,19 @@ mounts = [
112
113
}
113
114
]
114
115
```
116
+
**Custom seccomp profile example**
117
+
118
+
The default `docker` seccomp profile found [`here`](https://github.com/moby/moby/blob/master/profiles/seccomp/default.json)
119
+
can be downloaded, and modified (by removing/adding syscalls) to create a custom seccomp profile.<br/>
120
+
The custom seccomp profile can then be saved under `/opt/seccomp/seccomp.json` on the Nomad client nodes.
121
+
122
+
A nomad job can be launched using this custom seccomp profile.
123
+
```
124
+
config {
125
+
seccomp = true
126
+
seccomp_profile = "/opt/seccomp/seccomp.json"
127
+
}
128
+
```
115
129
116
130
## Networking
117
131
@@ -120,7 +134,7 @@ mounts = [
120
134
**NOTE:**`host` and `bridge` are mutually exclusive options, and only one of them should be used at a time.
121
135
122
136
1.**Host** network can be enabled by setting `host_network` to `true` in task config
123
-
of the job spec [Check under [`Supported options`](https://github.com/Roblox/nomad-driver-containerd#supported-options)].
137
+
of the job spec (see under [`Supported options`](https://github.com/Roblox/nomad-driver-containerd#supported-options)).
124
138
125
139
2.**Bridge** network can be enabled by setting the `network` stanza in the task group section of the job spec.
126
140
@@ -129,12 +143,14 @@ network {
129
143
mode = "bridge"
130
144
}
131
145
```
132
-
You need to install CNI plugins on nomad client nodes under `/opt/cni/bin` before you can use `bridge` networks.
146
+
You need to install CNI plugins on Nomad client nodes under `/opt/cni/bin` before you can use `bridge` networks.
0 commit comments