You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: runtime-config-linux.md
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,7 @@ Each entry has a type field with possible values described below and an optional
9
9
If a path is specified, that particular file is used to join that type of namespace.
10
10
Also, when a path is specified, a runtime MUST assume that the setup for that particular namespace has already been done and error out if the config specifies anything else related to that namespace.
11
11
12
+
*Example*
12
13
```json
13
14
"namespaces": [
14
15
{
@@ -61,6 +62,7 @@ Next parameters can be specified:
61
62
***uid** - uid of device owner
62
63
***gid** - gid of device owner
63
64
65
+
*Example*
64
66
```json
65
67
"devices": [
66
68
{
@@ -140,6 +142,7 @@ The Spec does not include naming schema for cgroups.
140
142
The Spec does not support [split hierarchy](https://www.kernel.org/doc/Documentation/cgroups/unified-hierarchy.txt).
141
143
The cgroups will be created if they don't exist.
142
144
145
+
*Example*
143
146
```json
144
147
"cgroupsPath": "/myRuntime/myContainer"
145
148
```
@@ -152,12 +155,14 @@ For example, to run a new process in an existing container without updating limi
152
155
153
156
#### Disable out-of-memory killer
154
157
158
+
*Example*
155
159
```json
156
160
"disableOOMKiller": false
157
161
```
158
162
159
163
#### Memory
160
164
165
+
*Example*
161
166
```json
162
167
"memory": {
163
168
"limit": 0,
@@ -170,6 +175,7 @@ For example, to run a new process in an existing container without updating limi
170
175
171
176
#### CPU
172
177
178
+
*Example*
173
179
```json
174
180
"cpu": {
175
181
"shares": 0,
@@ -206,6 +212,7 @@ The following parameters can be specified to setup the block io controller:
206
212
207
213
###### Example
208
214
215
+
*Example*
209
216
```json
210
217
"blockIO": {
211
218
"blkioWeight": 0,
@@ -242,6 +249,7 @@ The following parameters can be specified to setup the block io controller:
242
249
243
250
#### Huge page limits
244
251
252
+
*Example*
245
253
```json
246
254
"hugepageLimits": [
247
255
{
@@ -253,6 +261,7 @@ The following parameters can be specified to setup the block io controller:
253
261
254
262
#### Network
255
263
264
+
*Example*
256
265
```json
257
266
"network": {
258
267
"classId": "ClassId",
@@ -274,6 +283,7 @@ The following parameters can be specified to setup the block io controller:
274
283
sysctl allows kernel parameters to be modified at runtime for the container.
275
284
For more information, see [the man page](http://man7.org/linux/man-pages/man8/sysctl.8.html)
276
285
286
+
*Example*
277
287
```json
278
288
"sysctl": {
279
289
"net.ipv4.ip_forward": "1",
@@ -301,6 +311,7 @@ The kernel enforces the `soft` limit for a resource while the `hard` limit acts
301
311
302
312
SELinux process label specifies the label with which the processes in a container are run.
303
313
For more information about SELinux, see [Selinux documentation](http://selinuxproject.org/page/Main_Page)
0 commit comments