You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/source/Introduction.rst
+2-2
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ You can poke around in the busybox container for a while, but you’ll quickly f
30
30
31
31
There’s an old saying that “nobody runs an operating system just to run an operating system” and the same is true with containers. It’s the workload running on top of an operating system or in a container that’s interesting and valuable.
32
32
33
-
Sometimes we can find a publicly available container image for the exact workload we’re looking for and it will already be packaged exactly how we want. But, more often than not, there’s something that we want to add, remove, or customize. It could be as simple as a configuration setting for security or performance, or as complex as adding a complex workload. Either way, containers make it fairly easy to make the changes we need.
33
+
Sometimes we can find a publicly available container image for the exact workload we’re looking for and it will already be packaged exactly how we want. But, more often than not, there’s something that we want to add, remove, or customize. It can be as simple as a configuration setting for security or performance, or as complex as adding a complex workload. Either way, containers make it fairly easy to make the changes we need.
34
34
35
35
Container Images aren’t actually images, they’re repositories often made up of multiple layers. These layers can easily be added, saved, and shared with others by using a Containerfile (Dockerfile). This single file often contains all the instructions needed to build a new container image and can easily be shared with others publicly using tools like GitHub.
36
36
@@ -49,7 +49,7 @@ Output::
49
49
<p><em>Thank you for using nginx.</em></p>
50
50
...
51
51
52
-
Building new images is great, but sharing our work with others let’s them review our work, critique how we built them, and offer improved versions. Our newly built Nginx image could be published at quay.io or docker.io to share it with the world. Everything needed to run the Nginx application is provided in the container image. Others could easily pull it down and use it, or make improvements to it.
52
+
Building new images is great, but sharing our work with others lets them review our work, critique how we built them, and offer improved versions. Our newly built Nginx image can be published at quay.io or docker.io to share it with the world. Everything needed to run the Nginx application is provided in the container image. Others can easily pull it down and use it, or make improvements to it.
53
53
54
54
Standardizing on container images and `Container Registries`_ enable a new level of collaboration through simple consumption. This simple consumption model is possible because every major Container Engine and Registry Server uses the Open Containers Initiative (OCI_) format. This allows users to find, run, build, share and deploy containers anywhere they want. Podman and other `Container Engines`_ like CRI-O, Docker, or containerd can create and consume container images from docker.io, quay.io, an on premise registry or even one provided by a cloud provider. The OCI image format facilitates this ecosystem through a single standard.
Copy file name to clipboardExpand all lines: docs/source/markdown/options/cgroups.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -4,11 +4,11 @@
4
4
####> are applicable to all of those.
5
5
#### **--cgroups**=*how*
6
6
7
-
Determines whether the container will create CGroups.
7
+
Determines whether the container creates CGroups.
8
8
9
9
Default is **enabled**.
10
10
11
-
The **enabled** option will create a new cgroup under the cgroup-parent.
12
-
The **disabled** option will force the container to not create CGroups, and thus conflicts with CGroup options (**--cgroupns** and **--cgroup-parent**).
11
+
The **enabled** option creates a new cgroup under the cgroup-parent.
12
+
The **disabled** option forces the container to not create CGroups, and thus conflicts with CGroup options (**--cgroupns** and **--cgroup-parent**).
13
13
The **no-conmon** option disables a new CGroup only for the **conmon** process.
14
14
The **split** option splits the current CGroup in two sub-cgroups: one for conmon and one for the container payload. It is not possible to set **--cgroup-parent** with **split**.
Copy file name to clipboardExpand all lines: docs/source/markdown/options/chrootdirs.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,6 @@
4
4
####> are applicable to all of those.
5
5
#### **--chrootdirs**=*path*
6
6
7
-
Path to a directory inside the container that should be treated as a `chroot` directory.
8
-
Any Podman managed file (e.g., /etc/resolv.conf, /etc/hosts, etc/hostname) that is mounted into the root directory will be mounted into that location as well.
9
-
Multiple directories should be separated with a comma.
7
+
Path to a directory inside the container that is treated as a `chroot` directory.
8
+
Any Podman managed file (e.g., /etc/resolv.conf, /etc/hosts, etc/hostname) that is mounted into the root directory is mounted into that location as well.
Copy file name to clipboardExpand all lines: docs/source/markdown/options/cpu-rt-runtime.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@
7
7
Limit the CPU real-time runtime in microseconds.
8
8
9
9
Limit the containers Real Time CPU usage. This option tells the kernel to limit the amount of time in a given CPU period Real Time tasks may consume. Ex:
10
-
Period of 1,000,000us and Runtime of 950,000us means that this container could consume 95% of available CPU and leave the remaining 5% to normal priority tasks.
10
+
Period of 1,000,000us and Runtime of 950,000us means that this container can consume 95% of available CPU and leave the remaining 5% to normal priority tasks.
11
11
12
12
The sum of all runtimes across containers cannot exceed the amount allotted to the parent cgroup.
Copy file name to clipboardExpand all lines: docs/source/markdown/options/decryption-key.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -4,4 +4,4 @@
4
4
####> are applicable to all of those.
5
5
#### **--decryption-key**=*key[:passphrase]*
6
6
7
-
The [key[:passphrase]] to be used for decryption of images. Key can point to keys and/or certificates. Decryption will be tried with all keys. If the key is protected by a passphrase, it is required to be passed in the argument and omitted otherwise.
7
+
The [key[:passphrase]] to be used for decryption of images. Key can point to keys and/or certificates. Decryption is tried with all keys. If the key is protected by a passphrase, it is required to be passed in the argument and omitted otherwise.
Copy file name to clipboardExpand all lines: docs/source/markdown/options/detach-keys.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,6 @@
4
4
####> are applicable to all of those.
5
5
#### **--detach-keys**=*sequence*
6
6
7
-
Specify the key sequence for detaching a container. Format is a single character `[a-Z]` or one or more `ctrl-<value>` characters where `<value>` is one of: `a-z`, `@`, `^`, `[`, `,` or `_`. Specifying "" will disable this feature. The default is *ctrl-p,ctrl-q*.
7
+
Specify the key sequence for detaching a container. Format is a single character `[a-Z]` or one or more `ctrl-<value>` characters where `<value>` is one of: `a-z`, `@`, `^`, `[`, `,` or `_`. Specifying "" disables this feature. The default is *ctrl-p,ctrl-q*.
8
8
9
9
This option can also be set in **containers.conf**(5) file.
Copy file name to clipboardExpand all lines: docs/source/markdown/options/env.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -6,4 +6,4 @@
6
6
7
7
Set environment variables.
8
8
9
-
This option allows arbitrary environment variables that are available for the process to be launched inside of the container. If an environment variable is specified without a value, Podman will check the host environment for a value and set the variable only if it is set on the host. As a special case, if an environment variable ending in __*__ is specified without a value, Podman will search the host environment for variables starting with the prefix and will add those variables to the container.
9
+
This option allows arbitrary environment variables that are available for the process to be launched inside of the container. If an environment variable is specified without a value, Podman checks the host environment for a value and set the variable only if it is set on the host. As a special case, if an environment variable ending in __*__ is specified without a value, Podman searches the host environment for variables starting with the prefix and adds those variables to the container.
Copy file name to clipboardExpand all lines: docs/source/markdown/options/health-startup-retries.md
+1-2
Original file line number
Diff line number
Diff line change
@@ -4,5 +4,4 @@
4
4
####> are applicable to all of those.
5
5
#### **--health-startup-retries**=*retries*
6
6
7
-
The number of attempts allowed before the startup healthcheck restarts the container. If set to **0**, the container will never be
8
-
restarted. The default is **0**.
7
+
The number of attempts allowed before the startup healthcheck restarts the container. If set to **0**, the container is never restarted. The default is **0**.
Copy file name to clipboardExpand all lines: docs/source/markdown/options/hostname.container.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -6,4 +6,4 @@
6
6
7
7
Container host name
8
8
9
-
Sets the container host name that is available inside the container. Can only be used with a private UTS namespace `--uts=private` (default). If `--pod` is specified and the pod shares the UTS namespace (default) the pod's hostname will be used.
9
+
Sets the container host name that is available inside the container. Can only be used with a private UTS namespace `--uts=private` (default). If `--pod` is specified and the pod shares the UTS namespace (default) the pod's hostname is used.
0 commit comments