You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: config-linux.md
+45-45Lines changed: 45 additions & 45 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ For more information, see [the man page](http://man7.org/linux/man-pages/man7/na
26
26
Namespaces are specified as an array of entries inside the `namespaces` root field.
27
27
The following parameters can be specified to setup namespaces:
28
28
29
-
***`type`***(string, required)* - namespace type. The following namespaces types are supported:
29
+
***`type`***(string, REQUIRED)* - namespace type. The following namespaces types are supported:
30
30
***`pid`** processes inside the container will only be able to see other processes inside the same container.
31
31
***`network`** the container will have its own network stack.
32
32
***`mount`** the container will have an isolated mount table.
@@ -35,7 +35,7 @@ The following parameters can be specified to setup namespaces:
35
35
***`user`** the container will be able to remap user and group IDs from the host to local users and groups within the container.
36
36
***`cgroup`** the container will have an isolated view of the cgroup hierarchy.
37
37
38
-
***`path`***(string, optional)* - path to namespace file in the [runtime mount namespace](glossary.md#runtime-namespace)
38
+
***`path`***(string, OPTIONAL)* - path to namespace file in the [runtime mount namespace](glossary.md#runtime-namespace)
39
39
40
40
If a path is specified, that particular file is used to join that type of namespace.
41
41
If a namespace type is not specified in the `namespaces` array, the container MUST inherit the [runtime namespace](glossary.md#runtime-namespace) of that type.
@@ -99,19 +99,19 @@ There is a limit of 5 mappings which is the Linux kernel hard limit.
99
99
100
100
## Devices
101
101
102
-
**`devices`** (array, optional) lists devices that MUST be available in the container.
102
+
**`devices`** (array, OPTIONAL) lists devices that MUST be available in the container.
103
103
The runtime may supply them however it likes (with [mknod][mknod.2], by bind mounting from the runtime mount namespace, etc.).
104
104
105
105
The following parameters can be specified:
106
106
107
-
***`type`***(string, required)* - type of device: `c`, `b`, `u` or `p`.
107
+
***`type`***(string, REQUIRED)* - type of device: `c`, `b`, `u` or `p`.
108
108
More info in [mknod(1)][mknod.1].
109
-
***`path`***(string, required)* - full path to device inside container.
110
-
***`major, minor`***(int64, required unless **`type`** is `p`)* - [major, minor numbers][devices] for the device.
111
-
***`fileMode`***(uint32, optional)* - file mode for the device.
109
+
***`path`***(string, REQUIRED)* - full path to device inside container.
110
+
***`major, minor`***(int64, REQUIRED unless **`type`** is `p`)* - [major, minor numbers][devices] for the device.
111
+
***`fileMode`***(uint32, OPTIONAL)* - file mode for the device.
112
112
You can also control access to devices [with cgroups](#device-whitelist).
113
-
***`uid`***(uint32, optional)* - id of device owner.
114
-
***`gid`***(uint32, optional)* - id of device group.
113
+
***`uid`***(uint32, OPTIONAL)* - id of device owner.
114
+
***`gid`***(uint32, OPTIONAL)* - id of device group.
115
115
116
116
###### Example
117
117
@@ -199,17 +199,17 @@ However, a runtime MAY attach the container process to additional cgroup control
199
199
200
200
#### Device whitelist
201
201
202
-
**`devices`** (array, optional) configures the [device whitelist][cgroup-v1-devices].
202
+
**`devices`** (array, OPTIONAL) configures the [device whitelist][cgroup-v1-devices].
203
203
The runtime MUST apply entries in the listed order.
204
204
205
205
The following parameters can be specified:
206
206
207
-
***`allow`***(boolean, required)* - whether the entry is allowed or denied.
208
-
***`type`***(string, optional)* - type of device: `a` (all), `c` (char), or `b` (block).
207
+
***`allow`***(boolean, REQUIRED)* - whether the entry is allowed or denied.
208
+
***`type`***(string, OPTIONAL)* - type of device: `a` (all), `c` (char), or `b` (block).
209
209
`null` or unset values mean "all", mapping to `a`.
210
-
***`major, minor`***(int64, optional)* - [major, minor numbers][devices] for the device.
210
+
***`major, minor`***(int64, OPTIONAL)* - [major, minor numbers][devices] for the device.
211
211
`null` or unset values mean "all", mapping to [`*` in the filesystem API][cgroup-v1-devices].
212
-
***`access`***(string, optional)* - cgroup permissions for device.
212
+
***`access`***(string, OPTIONAL)* - cgroup permissions for device.
213
213
A composition of `r` (read), `w` (write), and `m` (mknod).
214
214
215
215
###### Example
@@ -245,7 +245,7 @@ The OOM killer is enabled by default in every cgroup using the `memory` subsyste
245
245
To disable it, specify a value of `true`.
246
246
For more information, see [the memory cgroup man page][cgroup-v1-memory].
247
247
248
-
***`disableOOMKiller`***(bool, optional)* - enables or disables the OOM killer
248
+
***`disableOOMKiller`***(bool, OPTIONAL)* - enables or disables the OOM killer
249
249
250
250
###### Example
251
251
@@ -260,7 +260,7 @@ For more information, see [the proc filesystem documentation section 3.1](https:
260
260
This is a kernel/system level setting, where as `disableOOMKiller` is scoped for a memory cgroup.
261
261
For more information on how these two settings work together, see [the memory cgroup documentation section 10. OOM Contol][cgroup-v1-memory].
262
262
263
-
***`oomScoreAdj`***(int, optional)* - adjust the oom-killer score
263
+
***`oomScoreAdj`***(int, OPTIONAL)* - adjust the oom-killer score
264
264
265
265
###### Example
266
266
@@ -275,17 +275,17 @@ For more information, see [the memory cgroup man page][cgroup-v1-memory].
275
275
276
276
The following parameters can be specified to setup the controller:
277
277
278
-
***`limit`***(uint64, optional)* - sets limit of memory usage in bytes
278
+
***`limit`***(uint64, OPTIONAL)* - sets limit of memory usage in bytes
279
279
280
-
***`reservation`***(uint64, optional)* - sets soft limit of memory usage in bytes
280
+
***`reservation`***(uint64, OPTIONAL)* - sets soft limit of memory usage in bytes
281
281
282
-
***`swap`***(uint64, optional)* - sets limit of memory+Swap usage
282
+
***`swap`***(uint64, OPTIONAL)* - sets limit of memory+Swap usage
283
283
284
-
***`kernel`***(uint64, optional)* - sets hard limit for kernel memory
284
+
***`kernel`***(uint64, OPTIONAL)* - sets hard limit for kernel memory
285
285
286
-
***`kernelTCP`***(uint64, optional)* - sets hard limit in bytes for kernel TCP buffer memory
286
+
***`kernelTCP`***(uint64, OPTIONAL)* - sets hard limit in bytes for kernel TCP buffer memory
287
287
288
-
***`swappiness`***(uint64, optional)* - sets swappiness parameter of vmscan (See sysctl's vm.swappiness)
288
+
***`swappiness`***(uint64, OPTIONAL)* - sets swappiness parameter of vmscan (See sysctl's vm.swappiness)
289
289
290
290
###### Example
291
291
@@ -307,19 +307,19 @@ For more information, see [the cpusets cgroup man page][cgroup-v1-cpusets].
307
307
308
308
The following parameters can be specified to setup the controller:
309
309
310
-
***`shares`***(uint64, optional)* - specifies a relative share of CPU time available to the tasks in a cgroup
310
+
***`shares`***(uint64, OPTIONAL)* - specifies a relative share of CPU time available to the tasks in a cgroup
311
311
312
-
***`quota`***(uint64, optional)* - specifies the total amount of time in microseconds for which all tasks in a cgroup can run during one period (as defined by **`period`** below)
312
+
***`quota`***(uint64, OPTIONAL)* - specifies the total amount of time in microseconds for which all tasks in a cgroup can run during one period (as defined by **`period`** below)
313
313
314
-
***`period`***(uint64, optional)* - specifies a period of time in microseconds for how regularly a cgroup's access to CPU resources should be reallocated (CFS scheduler only)
314
+
***`period`***(uint64, OPTIONAL)* - specifies a period of time in microseconds for how regularly a cgroup's access to CPU resources should be reallocated (CFS scheduler only)
315
315
316
-
***`realtimeRuntime`***(uint64, optional)* - specifies a period of time in microseconds for the longest continuous period in which the tasks in a cgroup have access to CPU resources
316
+
***`realtimeRuntime`***(uint64, OPTIONAL)* - specifies a period of time in microseconds for the longest continuous period in which the tasks in a cgroup have access to CPU resources
317
317
318
-
***`realtimePeriod`***(uint64, optional)* - same as **`period`** but applies to realtime scheduler only
318
+
***`realtimePeriod`***(uint64, OPTIONAL)* - same as **`period`** but applies to realtime scheduler only
319
319
320
-
***`cpus`***(string, optional)* - list of CPUs the container will run in
320
+
***`cpus`***(string, OPTIONAL)* - list of CPUs the container will run in
321
321
322
-
***`mems`***(string, optional)* - list of Memory Nodes the container will run in
322
+
***`mems`***(string, OPTIONAL)* - list of Memory Nodes the container will run in
323
323
324
324
###### Example
325
325
@@ -342,20 +342,20 @@ For more information, see [the kernel cgroups documentation about blkio][cgroup-
342
342
343
343
The following parameters can be specified to setup the controller:
344
344
345
-
***`blkioWeight`***(uint16, optional)* - specifies per-cgroup weight. This is default weight of the group on all devices until and unless overridden by per-device rules. The range is from 10 to 1000.
345
+
***`blkioWeight`***(uint16, OPTIONAL)* - specifies per-cgroup weight. This is default weight of the group on all devices until and unless overridden by per-device rules. The range is from 10 to 1000.
346
346
347
-
***`blkioLeafWeight`***(uint16, optional)* - equivalents of `blkioWeight` for the purpose of deciding how much weight tasks in the given cgroup has while competing with the cgroup's child cgroups. The range is from 10 to 1000.
347
+
***`blkioLeafWeight`***(uint16, OPTIONAL)* - equivalents of `blkioWeight` for the purpose of deciding how much weight tasks in the given cgroup has while competing with the cgroup's child cgroups. The range is from 10 to 1000.
348
348
349
-
***`blkioWeightDevice`***(array, optional)* - specifies the list of devices which will be bandwidth rate limited. The following parameters can be specified per-device:
350
-
***`major, minor`***(int64, required)* - major, minor numbers for device. More info in `man mknod`.
351
-
***`weight`***(uint16, optional)* - bandwidth rate for the device, range is from 10 to 1000
352
-
***`leafWeight`***(uint16, optional)* - bandwidth rate for the device while competing with the cgroup's child cgroups, range is from 10 to 1000, CFQ scheduler only
349
+
***`blkioWeightDevice`***(array, OPTIONAL)* - specifies the list of devices which will be bandwidth rate limited. The following parameters can be specified per-device:
350
+
***`major, minor`***(int64, REQUIRED)* - major, minor numbers for device. More info in `man mknod`.
351
+
***`weight`***(uint16, OPTIONAL)* - bandwidth rate for the device, range is from 10 to 1000
352
+
***`leafWeight`***(uint16, OPTIONAL)* - bandwidth rate for the device while competing with the cgroup's child cgroups, range is from 10 to 1000, CFQ scheduler only
353
353
354
354
You must specify at least one of `weight` or `leafWeight` in a given entry, and can specify both.
355
355
356
-
***`blkioThrottleReadBpsDevice`**, **`blkioThrottleWriteBpsDevice`**, **`blkioThrottleReadIOPSDevice`**, **`blkioThrottleWriteIOPSDevice`***(array, optional)* - specify the list of devices which will be IO rate limited. The following parameters can be specified per-device:
357
-
***`major, minor`***(int64, required)* - major, minor numbers for device. More info in `man mknod`.
358
-
***`rate`***(uint64, required)* - IO rate limit for the device
356
+
***`blkioThrottleReadBpsDevice`**, **`blkioThrottleWriteBpsDevice`**, **`blkioThrottleReadIOPSDevice`**, **`blkioThrottleWriteIOPSDevice`***(array, OPTIONAL)* - specify the list of devices which will be IO rate limited. The following parameters can be specified per-device:
357
+
***`major, minor`***(int64, REQUIRED)* - major, minor numbers for device. More info in `man mknod`.
358
+
***`rate`***(uint64, REQUIRED)* - IO rate limit for the device
359
359
360
360
###### Example
361
361
@@ -401,9 +401,9 @@ For more information, see the [kernel cgroups documentation about HugeTLB][cgrou
401
401
402
402
`hugepageLimits` is an array of entries, each having the following structure:
Copy file name to clipboardExpand all lines: config-solaris.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ Solaris application containers can be configured using the following properties,
5
5
## milestone
6
6
The SMF(Service Management Facility) FMRI which should go to "online" state before we start the desired process within the container.
7
7
8
-
**`milestone`***(string, optional)*
8
+
**`milestone`***(string, OPTIONAL)*
9
9
10
10
### Example
11
11
```json
@@ -16,7 +16,7 @@ The SMF(Service Management Facility) FMRI which should go to "online" state befo
16
16
The maximum set of privileges any process in this container can obtain.
17
17
The property should consist of a comma-separated privilege set specification as described in priv_str_to_set(3C) man page for the respective release of Solaris.
18
18
19
-
**`limitpriv`***(string, optional)*
19
+
**`limitpriv`***(string, OPTIONAL)*
20
20
21
21
### Example
22
22
```json
@@ -28,7 +28,7 @@ The maximum amount of shared memory allowed for this application container.
28
28
A scale (K, M, G, T) can be applied to the value for each of these numbers (for example, 1M is one megabyte).
29
29
Mapped to max-shm-memory in zonecfg(1M) man page.
30
30
31
-
**`maxShmMemory`***(string, optional)*
31
+
**`maxShmMemory`***(string, OPTIONAL)*
32
32
33
33
### Example
34
34
```json
@@ -42,7 +42,7 @@ An ncpu value of 1 means 100% of a CPU, a value of 1.25 means 125%, .75 mean 75%
42
42
When projects within a capped container have their own caps, the minimum value takes precedence.
43
43
cappedCPU is mapped to capped-cpu in zonecfg(1M) man page.
44
44
45
-
***`ncpus`***(string, optional)*
45
+
***`ncpus`***(string, OPTIONAL)*
46
46
47
47
### Example
48
48
```json
@@ -56,8 +56,8 @@ The physical and swap caps on the memory that can be used by this application co
56
56
A scale (K, M, G, T) can be applied to the value for each of these numbers (for example, 1M is one megabyte).
57
57
cappedMemory is mapped to capped-memory in zonecfg(1M) man page.
58
58
59
-
***`physical`***(string, optional)*
60
-
***`swap`***(string, optional)*
59
+
***`physical`***(string, OPTIONAL)*
60
+
***`swap`***(string, OPTIONAL)*
61
61
62
62
### Example
63
63
```json
@@ -80,22 +80,22 @@ The VNIC is deleted when the container is torn down.
80
80
The following properties can be used to setup automatic networks.
81
81
For additional information on properties check zonecfg(1M) man page for the respective release of Solaris.
82
82
83
-
***`linkname`***(string, optional)* Specify a name for the automatically created VNIC datalink.
84
-
***`lowerLink`***(string, optional)* Specify the link over which the VNIC will be created.
83
+
***`linkname`***(string, OPTIONAL)* Specify a name for the automatically created VNIC datalink.
84
+
***`lowerLink`***(string, OPTIONAL)* Specify the link over which the VNIC will be created.
85
85
Mapped to lower-link in the zonecfg(1M) man page.
86
-
***`allowedAddress`***(string, optional)* The set of IP addresses that the container can use might be constrained by specifying the allowedAddress property.
86
+
***`allowedAddress`***(string, OPTIONAL)* The set of IP addresses that the container can use might be constrained by specifying the allowedAddress property.
87
87
If allowedAddress has not been specified, then they can use any IP address on the associated physical interface for the network resource.
88
88
Otherwise, when allowedAddress is specified, the container cannot use IP addresses that are not in the allowedAddress list for the physical address.
89
89
Mapped to allowed-address in the zonecfg(1M) man page.
90
-
***`configureAllowedAddress`***(string, optional)* If configureAllowedAddress is set to true, the addresses specified by allowedAddress are automatically configured on the interface each time the container starts.
90
+
***`configureAllowedAddress`***(string, OPTIONAL)* If configureAllowedAddress is set to true, the addresses specified by allowedAddress are automatically configured on the interface each time the container starts.
91
91
When it is set to false, the allowedAddress will not be configured on container start.
92
92
Mapped to configure-allowed-address in the zonecfg(1M) man page.
93
-
***`defrouter`***(string, optional)* The value for the optional default router.
94
-
***`macAddress`***(string, optional)* Set the VNIC's MAC addresses based on the specified value or keyword.
93
+
***`defrouter`***(string, OPTIONAL)* The value for the OPTIONAL default router.
94
+
***`macAddress`***(string, OPTIONAL)* Set the VNIC's MAC addresses based on the specified value or keyword.
95
95
If not a keyword, it is interpreted as a unicast MAC address.
96
96
For a list of the supported keywords please refer to the zonecfg(1M) man page of the respective Solaris release.
97
97
Mapped to mac-address in the zonecfg(1M) man page.
98
-
***`linkProtection`***(string, optional)* Enables one or more types of link protection using comma-separated values.
98
+
***`linkProtection`***(string, OPTIONAL)* Enables one or more types of link protection using comma-separated values.
99
99
See the protection property in dladm(8) for supported values in respective release of Solaris.
100
100
Mapped to link-protection in the zonecfg(1M) man page.
0 commit comments