You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In all of these cases we want to use the RFC 2119 semantics.
Generated with:
$ sed -i 's/optional/OPTIONAL/g' config*.md
Signed-off-by: W. Trevor King <[email protected]>
Copy file name to clipboardExpand all lines: config-linux.md
+32-32Lines changed: 32 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ The following parameters can be specified to setup namespaces:
35
35
***`user`** the container will be able to remap user and group IDs from the host to local users and groups within the container.
36
36
***`cgroup`** the container will have an isolated view of the cgroup hierarchy.
37
37
38
-
***`path`***(string, optional)* - path to namespace file in the [runtime mount namespace](glossary.md#runtime-namespace)
38
+
***`path`***(string, OPTIONAL)* - path to namespace file in the [runtime mount namespace](glossary.md#runtime-namespace)
39
39
40
40
If a path is specified, that particular file is used to join that type of namespace.
41
41
If a namespace type is not specified in the `namespaces` array, the container MUST inherit the [runtime namespace](glossary.md#runtime-namespace) of that type.
@@ -99,7 +99,7 @@ There is a limit of 5 mappings which is the Linux kernel hard limit.
99
99
100
100
## Devices
101
101
102
-
**`devices`** (array, optional) lists devices that MUST be available in the container.
102
+
**`devices`** (array, OPTIONAL) lists devices that MUST be available in the container.
103
103
The runtime may supply them however it likes (with [mknod][mknod.2], by bind mounting from the runtime mount namespace, etc.).
104
104
105
105
The following parameters can be specified:
@@ -108,10 +108,10 @@ The following parameters can be specified:
108
108
More info in [mknod(1)][mknod.1].
109
109
***`path`***(string, required)* - full path to device inside container.
110
110
***`major, minor`***(int64, required unless **`type`** is `p`)* - [major, minor numbers][devices] for the device.
111
-
***`fileMode`***(uint32, optional)* - file mode for the device.
111
+
***`fileMode`***(uint32, OPTIONAL)* - file mode for the device.
112
112
You can also control access to devices [with cgroups](#device-whitelist).
113
-
***`uid`***(uint32, optional)* - id of device owner.
114
-
***`gid`***(uint32, optional)* - id of device group.
113
+
***`uid`***(uint32, OPTIONAL)* - id of device owner.
114
+
***`gid`***(uint32, OPTIONAL)* - id of device group.
115
115
116
116
###### Example
117
117
@@ -199,17 +199,17 @@ However, a runtime MAY attach the container process to additional cgroup control
199
199
200
200
#### Device whitelist
201
201
202
-
**`devices`** (array, optional) configures the [device whitelist][cgroup-v1-devices].
202
+
**`devices`** (array, OPTIONAL) configures the [device whitelist][cgroup-v1-devices].
203
203
The runtime MUST apply entries in the listed order.
204
204
205
205
The following parameters can be specified:
206
206
207
207
***`allow`***(boolean, required)* - whether the entry is allowed or denied.
208
-
***`type`***(string, optional)* - type of device: `a` (all), `c` (char), or `b` (block).
208
+
***`type`***(string, OPTIONAL)* - type of device: `a` (all), `c` (char), or `b` (block).
209
209
`null` or unset values mean "all", mapping to `a`.
210
-
***`major, minor`***(int64, optional)* - [major, minor numbers][devices] for the device.
210
+
***`major, minor`***(int64, OPTIONAL)* - [major, minor numbers][devices] for the device.
211
211
`null` or unset values mean "all", mapping to [`*` in the filesystem API][cgroup-v1-devices].
212
-
***`access`***(string, optional)* - cgroup permissions for device.
212
+
***`access`***(string, OPTIONAL)* - cgroup permissions for device.
213
213
A composition of `r` (read), `w` (write), and `m` (mknod).
214
214
215
215
###### Example
@@ -245,7 +245,7 @@ The OOM killer is enabled by default in every cgroup using the `memory` subsyste
245
245
To disable it, specify a value of `true`.
246
246
For more information, see [the memory cgroup man page][cgroup-v1-memory].
247
247
248
-
***`disableOOMKiller`***(bool, optional)* - enables or disables the OOM killer
248
+
***`disableOOMKiller`***(bool, OPTIONAL)* - enables or disables the OOM killer
249
249
250
250
###### Example
251
251
@@ -260,7 +260,7 @@ For more information, see [the proc filesystem documentation section 3.1](https:
260
260
This is a kernel/system level setting, where as `disableOOMKiller` is scoped for a memory cgroup.
261
261
For more information on how these two settings work together, see [the memory cgroup documentation section 10. OOM Contol][cgroup-v1-memory].
262
262
263
-
***`oomScoreAdj`***(int, optional)* - adjust the oom-killer score
263
+
***`oomScoreAdj`***(int, OPTIONAL)* - adjust the oom-killer score
264
264
265
265
###### Example
266
266
@@ -275,17 +275,17 @@ For more information, see [the memory cgroup man page][cgroup-v1-memory].
275
275
276
276
The following parameters can be specified to setup the controller:
277
277
278
-
***`limit`***(uint64, optional)* - sets limit of memory usage in bytes
278
+
***`limit`***(uint64, OPTIONAL)* - sets limit of memory usage in bytes
279
279
280
-
***`reservation`***(uint64, optional)* - sets soft limit of memory usage in bytes
280
+
***`reservation`***(uint64, OPTIONAL)* - sets soft limit of memory usage in bytes
281
281
282
-
***`swap`***(uint64, optional)* - sets limit of memory+Swap usage
282
+
***`swap`***(uint64, OPTIONAL)* - sets limit of memory+Swap usage
283
283
284
-
***`kernel`***(uint64, optional)* - sets hard limit for kernel memory
284
+
***`kernel`***(uint64, OPTIONAL)* - sets hard limit for kernel memory
285
285
286
-
***`kernelTCP`***(uint64, optional)* - sets hard limit in bytes for kernel TCP buffer memory
286
+
***`kernelTCP`***(uint64, OPTIONAL)* - sets hard limit in bytes for kernel TCP buffer memory
287
287
288
-
***`swappiness`***(uint64, optional)* - sets swappiness parameter of vmscan (See sysctl's vm.swappiness)
288
+
***`swappiness`***(uint64, OPTIONAL)* - sets swappiness parameter of vmscan (See sysctl's vm.swappiness)
289
289
290
290
###### Example
291
291
@@ -307,19 +307,19 @@ For more information, see [the cpusets cgroup man page][cgroup-v1-cpusets].
307
307
308
308
The following parameters can be specified to setup the controller:
309
309
310
-
***`shares`***(uint64, optional)* - specifies a relative share of CPU time available to the tasks in a cgroup
310
+
***`shares`***(uint64, OPTIONAL)* - specifies a relative share of CPU time available to the tasks in a cgroup
311
311
312
-
***`quota`***(uint64, optional)* - specifies the total amount of time in microseconds for which all tasks in a cgroup can run during one period (as defined by **`period`** below)
312
+
***`quota`***(uint64, OPTIONAL)* - specifies the total amount of time in microseconds for which all tasks in a cgroup can run during one period (as defined by **`period`** below)
313
313
314
-
***`period`***(uint64, optional)* - specifies a period of time in microseconds for how regularly a cgroup's access to CPU resources should be reallocated (CFS scheduler only)
314
+
***`period`***(uint64, OPTIONAL)* - specifies a period of time in microseconds for how regularly a cgroup's access to CPU resources should be reallocated (CFS scheduler only)
315
315
316
-
***`realtimeRuntime`***(uint64, optional)* - specifies a period of time in microseconds for the longest continuous period in which the tasks in a cgroup have access to CPU resources
316
+
***`realtimeRuntime`***(uint64, OPTIONAL)* - specifies a period of time in microseconds for the longest continuous period in which the tasks in a cgroup have access to CPU resources
317
317
318
-
***`realtimePeriod`***(uint64, optional)* - same as **`period`** but applies to realtime scheduler only
318
+
***`realtimePeriod`***(uint64, OPTIONAL)* - same as **`period`** but applies to realtime scheduler only
319
319
320
-
***`cpus`***(string, optional)* - list of CPUs the container will run in
320
+
***`cpus`***(string, OPTIONAL)* - list of CPUs the container will run in
321
321
322
-
***`mems`***(string, optional)* - list of Memory Nodes the container will run in
322
+
***`mems`***(string, OPTIONAL)* - list of Memory Nodes the container will run in
323
323
324
324
###### Example
325
325
@@ -342,18 +342,18 @@ For more information, see [the kernel cgroups documentation about blkio][cgroup-
342
342
343
343
The following parameters can be specified to setup the controller:
344
344
345
-
***`blkioWeight`***(uint16, optional)* - specifies per-cgroup weight. This is default weight of the group on all devices until and unless overridden by per-device rules. The range is from 10 to 1000.
345
+
***`blkioWeight`***(uint16, OPTIONAL)* - specifies per-cgroup weight. This is default weight of the group on all devices until and unless overridden by per-device rules. The range is from 10 to 1000.
346
346
347
-
***`blkioLeafWeight`***(uint16, optional)* - equivalents of `blkioWeight` for the purpose of deciding how much weight tasks in the given cgroup has while competing with the cgroup's child cgroups. The range is from 10 to 1000.
347
+
***`blkioLeafWeight`***(uint16, OPTIONAL)* - equivalents of `blkioWeight` for the purpose of deciding how much weight tasks in the given cgroup has while competing with the cgroup's child cgroups. The range is from 10 to 1000.
348
348
349
-
***`blkioWeightDevice`***(array, optional)* - specifies the list of devices which will be bandwidth rate limited. The following parameters can be specified per-device:
349
+
***`blkioWeightDevice`***(array, OPTIONAL)* - specifies the list of devices which will be bandwidth rate limited. The following parameters can be specified per-device:
350
350
***`major, minor`***(int64, required)* - major, minor numbers for device. More info in `man mknod`.
351
-
***`weight`***(uint16, optional)* - bandwidth rate for the device, range is from 10 to 1000
352
-
***`leafWeight`***(uint16, optional)* - bandwidth rate for the device while competing with the cgroup's child cgroups, range is from 10 to 1000, CFQ scheduler only
351
+
***`weight`***(uint16, OPTIONAL)* - bandwidth rate for the device, range is from 10 to 1000
352
+
***`leafWeight`***(uint16, OPTIONAL)* - bandwidth rate for the device while competing with the cgroup's child cgroups, range is from 10 to 1000, CFQ scheduler only
353
353
354
354
You must specify at least one of `weight` or `leafWeight` in a given entry, and can specify both.
355
355
356
-
***`blkioThrottleReadBpsDevice`**, **`blkioThrottleWriteBpsDevice`**, **`blkioThrottleReadIOPSDevice`**, **`blkioThrottleWriteIOPSDevice`***(array, optional)* - specify the list of devices which will be IO rate limited. The following parameters can be specified per-device:
356
+
***`blkioThrottleReadBpsDevice`**, **`blkioThrottleWriteBpsDevice`**, **`blkioThrottleReadIOPSDevice`**, **`blkioThrottleWriteIOPSDevice`***(array, OPTIONAL)* - specify the list of devices which will be IO rate limited. The following parameters can be specified per-device:
357
357
***`major, minor`***(int64, required)* - major, minor numbers for device. More info in `man mknod`.
358
358
***`rate`***(uint64, required)* - IO rate limit for the device
359
359
@@ -423,9 +423,9 @@ For more information, see [the net\_cls cgroup man page][cgroup-v1-net-cls] and
423
423
424
424
The following parameters can be specified to setup these cgroup controllers:
425
425
426
-
***`classID`***(uint32, optional)* - is the network class identifier the cgroup's network packets will be tagged with
426
+
***`classID`***(uint32, OPTIONAL)* - is the network class identifier the cgroup's network packets will be tagged with
427
427
428
-
***`priorities`***(array, optional)* - specifies a list of objects of the priorities assigned to traffic originating from
428
+
***`priorities`***(array, OPTIONAL)* - specifies a list of objects of the priorities assigned to traffic originating from
429
429
processes in the group and egressing the system on various interfaces. The following parameters can be specified per-priority:
430
430
* **`name`***(string, required)* - interface name
431
431
* **`priority`***(uint32, required)* - priority applied to the interface
Copy file name to clipboardExpand all lines: config-solaris.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ Solaris application containers can be configured using the following properties,
5
5
## milestone
6
6
The SMF(Service Management Facility) FMRI which should go to "online" state before we start the desired process within the container.
7
7
8
-
**`milestone`***(string, optional)*
8
+
**`milestone`***(string, OPTIONAL)*
9
9
10
10
### Example
11
11
```json
@@ -16,7 +16,7 @@ The SMF(Service Management Facility) FMRI which should go to "online" state befo
16
16
The maximum set of privileges any process in this container can obtain.
17
17
The property should consist of a comma-separated privilege set specification as described in priv_str_to_set(3C) man page for the respective release of Solaris.
18
18
19
-
**`limitpriv`***(string, optional)*
19
+
**`limitpriv`***(string, OPTIONAL)*
20
20
21
21
### Example
22
22
```json
@@ -28,7 +28,7 @@ The maximum amount of shared memory allowed for this application container.
28
28
A scale (K, M, G, T) can be applied to the value for each of these numbers (for example, 1M is one megabyte).
29
29
Mapped to max-shm-memory in zonecfg(1M) man page.
30
30
31
-
**`maxShmMemory`***(string, optional)*
31
+
**`maxShmMemory`***(string, OPTIONAL)*
32
32
33
33
### Example
34
34
```json
@@ -42,7 +42,7 @@ An ncpu value of 1 means 100% of a CPU, a value of 1.25 means 125%, .75 mean 75%
42
42
When projects within a capped container have their own caps, the minimum value takes precedence.
43
43
cappedCPU is mapped to capped-cpu in zonecfg(1M) man page.
44
44
45
-
***`ncpus`***(string, optional)*
45
+
***`ncpus`***(string, OPTIONAL)*
46
46
47
47
### Example
48
48
```json
@@ -56,8 +56,8 @@ The physical and swap caps on the memory that can be used by this application co
56
56
A scale (K, M, G, T) can be applied to the value for each of these numbers (for example, 1M is one megabyte).
57
57
cappedMemory is mapped to capped-memory in zonecfg(1M) man page.
58
58
59
-
***`physical`***(string, optional)*
60
-
***`swap`***(string, optional)*
59
+
***`physical`***(string, OPTIONAL)*
60
+
***`swap`***(string, OPTIONAL)*
61
61
62
62
### Example
63
63
```json
@@ -80,22 +80,22 @@ The VNIC is deleted when the container is torn down.
80
80
The following properties can be used to setup automatic networks.
81
81
For additional information on properties check zonecfg(1M) man page for the respective release of Solaris.
82
82
83
-
***`linkname`***(string, optional)* Specify a name for the automatically created VNIC datalink.
84
-
***`lowerLink`***(string, optional)* Specify the link over which the VNIC will be created.
83
+
***`linkname`***(string, OPTIONAL)* Specify a name for the automatically created VNIC datalink.
84
+
***`lowerLink`***(string, OPTIONAL)* Specify the link over which the VNIC will be created.
85
85
Mapped to lower-link in the zonecfg(1M) man page.
86
-
***`allowedAddress`***(string, optional)* The set of IP addresses that the container can use might be constrained by specifying the allowedAddress property.
86
+
***`allowedAddress`***(string, OPTIONAL)* The set of IP addresses that the container can use might be constrained by specifying the allowedAddress property.
87
87
If allowedAddress has not been specified, then they can use any IP address on the associated physical interface for the network resource.
88
88
Otherwise, when allowedAddress is specified, the container cannot use IP addresses that are not in the allowedAddress list for the physical address.
89
89
Mapped to allowed-address in the zonecfg(1M) man page.
90
-
***`configureAllowedAddress`***(string, optional)* If configureAllowedAddress is set to true, the addresses specified by allowedAddress are automatically configured on the interface each time the container starts.
90
+
***`configureAllowedAddress`***(string, OPTIONAL)* If configureAllowedAddress is set to true, the addresses specified by allowedAddress are automatically configured on the interface each time the container starts.
91
91
When it is set to false, the allowedAddress will not be configured on container start.
92
92
Mapped to configure-allowed-address in the zonecfg(1M) man page.
93
-
***`defrouter`***(string, optional)* The value for the optional default router.
94
-
***`macAddress`***(string, optional)* Set the VNIC's MAC addresses based on the specified value or keyword.
93
+
***`defrouter`***(string, OPTIONAL)* The value for the OPTIONAL default router.
94
+
***`macAddress`***(string, OPTIONAL)* Set the VNIC's MAC addresses based on the specified value or keyword.
95
95
If not a keyword, it is interpreted as a unicast MAC address.
96
96
For a list of the supported keywords please refer to the zonecfg(1M) man page of the respective Solaris release.
97
97
Mapped to mac-address in the zonecfg(1M) man page.
98
-
***`linkProtection`***(string, optional)* Enables one or more types of link protection using comma-separated values.
98
+
***`linkProtection`***(string, OPTIONAL)* Enables one or more types of link protection using comma-separated values.
99
99
See the protection property in dladm(8) for supported values in respective release of Solaris.
100
100
Mapped to link-protection in the zonecfg(1M) man page.
0 commit comments