diff options
author | Ed Santiago <santiago@redhat.com> | 2022-08-24 18:00:11 -0600 |
---|---|---|
committer | Ed Santiago <santiago@redhat.com> | 2022-08-25 08:52:41 -0600 |
commit | 42fdc72aa8b56bd4ff04ba497c46a5f2978d9f2a (patch) | |
tree | 18230cf9664d7f627777675e130f42a07ac47116 /docs/source/markdown/options | |
parent | eb7894764e0f1a020f03385a8a4423482989c9d3 (diff) | |
download | podman-42fdc72aa8b56bd4ff04ba497c46a5f2978d9f2a.tar.gz podman-42fdc72aa8b56bd4ff04ba497c46a5f2978d9f2a.tar.bz2 podman-42fdc72aa8b56bd4ff04ba497c46a5f2978d9f2a.zip |
Man pages: refactor common options: --systemd
I went with the podman-run version, which better conforms to
style conventions.
Signed-off-by: Ed Santiago <santiago@redhat.com>
Diffstat (limited to 'docs/source/markdown/options')
-rw-r--r-- | docs/source/markdown/options/systemd.md | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/docs/source/markdown/options/systemd.md b/docs/source/markdown/options/systemd.md new file mode 100644 index 000000000..a341edbc2 --- /dev/null +++ b/docs/source/markdown/options/systemd.md @@ -0,0 +1,29 @@ +#### **--systemd**=*true* | *false* | *always* + +Run container in systemd mode. The default is **true**. + +The value *always* enforces the systemd mode is enforced without +looking at the executable name. Otherwise, if set to true and the +command you are running inside the container is **systemd**, **/usr/sbin/init**, +**/sbin/init** or **/usr/local/sbin/init**. + +Running the container in systemd mode causes the following changes: + +* Podman mounts tmpfs file systems on the following directories + * _/run_ + * _/run/lock_ + * _/tmp_ + * _/sys/fs/cgroup/systemd_ + * _/var/lib/journal_ +* Podman sets the default stop signal to **SIGRTMIN+3**. +* Podman sets **container_uuid** environment variable in the container to the +first 32 characters of the container id. + +This allows systemd to run in a confined container without any modifications. + +Note that on **SELinux** systems, systemd attempts to write to the cgroup +file system. Containers writing to the cgroup file system are denied by default. +The **container_manage_cgroup** boolean must be enabled for this to be allowed on an SELinux separated system. +``` +setsebool -P container_manage_cgroup true +``` |