fa61e0
% containers.conf 5 Container engine configuration file
fa61e0
fa61e0
# NAME
fa61e0
containers.conf - The container engine configuration file specifies default
fa61e0
configuration options and command-line flags for container engines.
fa61e0
fa61e0
# DESCRIPTION
fa61e0
Container engines like Podman & Buildah read containers.conf file, if it exists
fa61e0
and modify the defaults for running containers on the host. containers.conf uses
fa61e0
a TOML format that can be easily modified and versioned.
fa61e0
fa61e0
Container engines read the /usr/share/containers/containers.conf and
fa61e0
/etc/containers/containers.conf, and /etc/containers/containers.conf.d/*.conf files
0106cf
if they exist. When running in rootless mode, they also read
fa61e0
$HOME/.config/containers/containers.conf and
fa61e0
$HOME/.config/containers/containers.conf.d/*.conf files.
fa61e0
fa61e0
Fields specified in containers conf override the default options, as well as
fa61e0
options in previously read containers.conf files.
fa61e0
fa61e0
Config files in the `.d` directories, are added in alpha numeric sorted order and must end in `.conf`.
fa61e0
fa61e0
Not all options are supported in all container engines.
fa61e0
fa61e0
Note container engines also use other configuration files for configuring the environment.
fa61e0
fa61e0
* `storage.conf` for configuration of container and images storage.
fa61e0
* `registries.conf` for definition of container registires to search while pulling.
fa61e0
container images.
fa61e0
* `policy.conf` for controlling which images can be pulled to the system.
fa61e0
fa61e0
# FORMAT
fa61e0
The [TOML format][toml] is used as the encoding of the configuration file.
fa61e0
Every option is nested under its table. No bare options are used. The format of
fa61e0
TOML can be simplified to:
fa61e0
fa61e0
    [table1]
fa61e0
    option = value
fa61e0
fa61e0
    [table2]
fa61e0
    option = value
fa61e0
fa61e0
    [table3]
fa61e0
    option = value
fa61e0
fa61e0
    [table3.subtable1]
fa61e0
    option = value
fa61e0
fa61e0
## CONTAINERS TABLE
0106cf
The containers table contains settings to configure and manage the OCI runtime.
fa61e0
fa61e0
**annotations** = []
fa61e0
List of annotations. Specified as "key=value" pairs to be added to all containers.
fa61e0
fa61e0
Example: "run.oci.keep_original_groups=1"
fa61e0
fa61e0
**apparmor_profile**="container-default"
fa61e0
fa61e0
Used to change the name of the default AppArmor profile of container engines.
fa61e0
The default profile name is "container-default".
fa61e0
fa61e0
**cgroups**="enabled"
fa61e0
fa61e0
Determines  whether  the  container will create CGroups.
fa61e0
Options are:
fa61e0
  `enabled`   Enable cgroup support within container
fa61e0
  `disabled`  Disable cgroup support, will inherit cgroups from parent
fa61e0
  `no-conmon` Do not create a cgroup dedicated to conmon.
fa61e0
fa61e0
**cgroupns**="private"
fa61e0
fa61e0
Default way to to create a cgroup namespace for the container.
fa61e0
Options are:
fa61e0
`private` Create private Cgroup Namespace for the container.
fa61e0
`host`    Share host Cgroup Namespace with the container.
fa61e0
fa61e0
**default_capabilities**=[]
fa61e0
fa61e0
List of default capabilities for containers.
fa61e0
fa61e0
The default list is:
fa61e0
```
fa61e0
default_capabilities = [
fa61e0
"AUDIT_WRITE",
fa61e0
      "CHOWN",
fa61e0
      "DAC_OVERRIDE",
fa61e0
      "FOWNER",
fa61e0
      "FSETID",
fa61e0
      "KILL",
fa61e0
      "MKNOD",
fa61e0
      "NET_BIND_SERVICE",
fa61e0
      "NET_RAW",
fa61e0
      "SETGID",
fa61e0
      "SETPCAP",
fa61e0
      "SETUID",
fa61e0
      "SYS_CHROOT",
fa61e0
]
fa61e0
```
fa61e0
fa61e0
**default_sysctls**=[]
fa61e0
fa61e0
A list of sysctls to be set in containers by default,
fa61e0
specified as "name=value".
fa61e0
fa61e0
Example:"net.ipv4.ping_group_range=0 1000".
fa61e0
fa61e0
**default_ulimits**=[]
fa61e0
fa61e0
A list of ulimits to be set in containers by default,
fa61e0
specified as "name=soft-limit:hard-limit".
fa61e0
fa61e0
Example: "nofile=1024:2048".
fa61e0
fa61e0
**devices**=[]
fa61e0
fa61e0
List of devices.
fa61e0
Specified as 'device-on-host:device-on-container:permissions'.
fa61e0
fa61e0
Example: "/dev/sdc:/dev/xvdc:rwm".
fa61e0
fa61e0
**dns_options**=[]
fa61e0
fa61e0
List of default DNS options to be added to /etc/resolv.conf inside of the
fa61e0
container.
fa61e0
fa61e0
**dns_searches**=[]
fa61e0
fa61e0
List of default DNS search domains to be added to /etc/resolv.conf inside of
fa61e0
the container.
fa61e0
fa61e0
**dns_servers**=[]
fa61e0
fa61e0
A list of dns servers to override the DNS configuration passed to the
fa61e0
container. The special value “none” can be specified to disable creation of
fa61e0
/etc/resolv.conf in the container.
fa61e0
fa61e0
**env**=["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "TERM=xterm"]
fa61e0
fa61e0
Environment variable list for the container process, used for passing
fa61e0
environment variables to the container.
fa61e0
fa61e0
**env_host**=false
fa61e0
fa61e0
Pass all host environment variables into the container.
fa61e0
fa61e0
**http_proxy**=true
fa61e0
fa61e0
Default proxy environment variables will be passed into the container.
fa61e0
The environment variables passed in include:
fa61e0
`http_proxy`, `https_proxy`, `ftp_proxy`, `no_proxy`, and the upper case
fa61e0
versions of these. The `no_proxy` option is needed when host system uses a proxy
fa61e0
but container should not use proxy. Proxy environment variables specified for
fa61e0
the container in any other way will override the values passed from the host.
fa61e0
fa61e0
**init**=false
fa61e0
fa61e0
Run an init inside the container that forwards signals and reaps processes.
fa61e0
fa61e0
**init_path**="/usr/libexec/podman/catatonit"
fa61e0
fa61e0
Path to the container-init binary, which forwards signals and reaps processes
0106cf
within containers. Note that the container-init binary will only be used when
fa61e0
the `--init` for podman-create and podman-run is set.
fa61e0
fa61e0
**ipcns**="private"
fa61e0
fa61e0
Default way to to create a IPC namespace for the container.
fa61e0
Options are:
fa61e0
  `private` Create private IPC Namespace for the container.
fa61e0
  `host`    Share host IPC Namespace with the container.
fa61e0
fa61e0
**keyring**=true
fa61e0
fa61e0
Indicates whether the container engines create a kernel keyring for use within
fa61e0
the container.
fa61e0
fa61e0
**label**=true
fa61e0
fa61e0
Indicates whether the container engine uses MAC(SELinux) container separation via labeling. This option is ignored on disabled systems.
fa61e0
fa61e0
**log_driver**="k8s-file"
fa61e0
fa61e0
Logging driver for the container. Available options: `k8s-file` and `journald`.
fa61e0
fa61e0
**log_size_max**=-1
fa61e0
fa61e0
Maximum size allowed for the container's log file. Negative numbers indicate
fa61e0
that no size limit is imposed. If it is positive, it must be >= 8192 to
fa61e0
match/exceed conmon's read buffer. The file is truncated and re-opened so the
fa61e0
limit is never exceeded.
fa61e0
fa61e0
**log_tag**=""
fa61e0
0106cf
Default format tag for container log messages. This is useful for creating a specific tag for container log messages. Container log messages default to using the truncated container ID as a tag.
fa61e0
fa61e0
**netns**="private"
fa61e0
fa61e0
Default way to to create a NET namespace for the container.
fa61e0
Options are:
fa61e0
  `private` Create private NET Namespace for the container.
fa61e0
  `host`    Share host NET Namespace with the container.
fa61e0
  `none`    Containers do not use the network.
fa61e0
fa61e0
**no_hosts**=false
fa61e0
0106cf
Create /etc/hosts for the container. By default, container engines manage
fa61e0
/etc/hosts, automatically adding  the container's  own  IP  address.
fa61e0
fa61e0
**pidns**="private"
fa61e0
fa61e0
Default way to to create a PID namespace for the container.
fa61e0
Options are:
fa61e0
  `private` Create private PID Namespace for the container.
fa61e0
  `host`    Share host PID Namespace with the container.
fa61e0
fa61e0
**pids_limit**=1024
fa61e0
fa61e0
Maximum number of processes allowed in a container. 0 indicates that no limit
fa61e0
is imposed.
fa61e0
fa61e0
**prepare_volume_on_create**=false
fa61e0
fa61e0
Copy the content from the underlying image into the newly created volume when the container is created instead of when it is started. If `false`, the container engine will not copy the content until the container is started. Setting it to `true` may have negative performance implications.
fa61e0
fa61e0
**seccomp_profile**="/usr/share/containers/seccomp.json"
fa61e0
fa61e0
Path to the seccomp.json profile which is used as the default seccomp profile
fa61e0
for the runtime.
fa61e0
fa61e0
**shm_size**="65536k"
fa61e0
fa61e0
Size of `/dev/shm`. The format is `<number><unit>`. `number` must be greater
fa61e0
than `0`.
fa61e0
Unit is optional and can be:
fa61e0
`b` (bytes), `k` (kilobytes), `m`(megabytes), or `g` (gigabytes).
fa61e0
If you omit the unit, the system uses bytes. If you omit the size entirely,
fa61e0
the system uses `65536k`.
fa61e0
fa61e0
**tz=**""
fa61e0
fa61e0
Set timezone in container. Takes IANA timezones as well as `local`, which sets the timezone in the container to match the host machine.
fa61e0
If not set, then containers will run with the time zone specified in the image.
fa61e0
fa61e0
Examples:
fa61e0
  `tz="local"`
fa61e0
  `tz="America/New_York"`
fa61e0
fa61e0
**umask**="0022"
fa61e0
fa61e0
Sets umask inside the container.
fa61e0
fa61e0
**userns**="host"
fa61e0
fa61e0
Default way to to create a USER namespace for the container.
fa61e0
Options are:
fa61e0
  `private` Create private USER Namespace for the container.
fa61e0
  `host`    Share host USER Namespace with the container.
fa61e0
fa61e0
**userns_size**=65536
fa61e0
fa61e0
Number of UIDs to allocate for the automatic container creation. UIDs are
fa61e0
allocated from the “container” UIDs listed in /etc/subuid & /etc/subgid.
fa61e0
fa61e0
**utsns**="private"
fa61e0
fa61e0
Default way to to create a UTS namespace for the container.
fa61e0
Options are:
fa61e0
  `private` Create private UTS Namespace for the container.
fa61e0
  `host`    Share host UTS Namespace with the container.
fa61e0
fa61e0
fa61e0
## NETWORK TABLE
fa61e0
The `network` table contains settings pertaining to the management of CNI
fa61e0
plugins.
fa61e0
0106cf
**network_backend**=""
0106cf
0106cf
Network backend determines what network driver will be used to set up and tear down container networks.
0106cf
Valid values are "cni" and "netavark".
0106cf
The default value is empty which means that it will automatically choose CNI or netavark. If there are
0106cf
already containers/images or CNI networks preset it will choose CNI.
0106cf
0106cf
Before changing this value all containers must be stopped otherwise it is likely that
0106cf
iptables rules and network interfaces might leak on the host. A reboot will fix this.
0106cf
fa61e0
**cni_plugin_dirs**=[]
fa61e0
fa61e0
List of paths to directories where CNI plugin binaries are located.
fa61e0
fa61e0
The default list is:
fa61e0
```
fa61e0
cni_plugin_dirs = [
fa61e0
  "/usr/local/libexec/cni",
fa61e0
  "/usr/libexec/cni",
fa61e0
  "/usr/local/lib/cni",
fa61e0
  "/usr/lib/cni",
fa61e0
  "/opt/cni/bin",
fa61e0
]
fa61e0
```
fa61e0
fa61e0
**default_network**="podman"
fa61e0
0106cf
The network name of the default network to attach pods to.
fa61e0
fa61e0
**default_subnet**="10.88.0.0/16"
fa61e0
0106cf
The subnet to use for the default network (named above in **default_network**).
fa61e0
If the default network does not exist, it will be automatically created the first time a tool is run using this subnet.
fa61e0
fa61e0
**network_config_dir**="/etc/cni/net.d/"
fa61e0
0106cf
Path to the directory where network configuration files are located.
0106cf
For the CNI backend the default is "/etc/cni/net.d" as root
0106cf
and "$HOME/.config/cni/net.d" as rootless.
0106cf
For the netavark backend "/etc/containers/networks" is used as root
0106cf
and "$graphroot/networks" as rootless.
fa61e0
fa61e0
**volumes**=[]
fa61e0
fa61e0
List of volumes.
fa61e0
Specified as "directory-on-host:directory-in-container:options".
fa61e0
fa61e0
Example:  "/db:/var/lib/db:ro".
fa61e0
fa61e0
## ENGINE TABLE
fa61e0
The `engine` table contains configuration options used to set up container engines such as Podman and Buildah.
fa61e0
fa61e0
**active_service**=""
fa61e0
fa61e0
Name of destination for accessing the Podman service. See SERVICE DESTINATION TABLE below.
fa61e0
fa61e0
**cgroup_manager**="systemd"
fa61e0
fa61e0
The cgroup management implementation used for the runtime. Supports `cgroupfs`
fa61e0
and `systemd`.
fa61e0
fa61e0
**conmon_env_vars**=[]
fa61e0
fa61e0
Environment variables to pass into Conmon.
fa61e0
fa61e0
**conmon_path**=[]
fa61e0
fa61e0
Paths to search for the conmon container manager binary. If the paths are
fa61e0
empty or no valid path was found, then the `$PATH` environment variable will be
fa61e0
used as the fallback.
fa61e0
fa61e0
The default list is:
fa61e0
```
fa61e0
conmon_path=[
fa61e0
    "/usr/libexec/podman/conmon",
fa61e0
    "/usr/local/libexec/podman/conmon",
fa61e0
    "/usr/local/lib/podman/conmon",
fa61e0
    "/usr/bin/conmon",
fa61e0
    "/usr/sbin/conmon",
fa61e0
    "/usr/local/bin/conmon",
fa61e0
    "/usr/local/sbin/conmon",
fa61e0
    "/run/current-system/sw/bin/conmon",
fa61e0
]
fa61e0
```
fa61e0
fa61e0
**detach_keys**="ctrl-p,ctrl-q"
fa61e0
fa61e0
Keys sequence used for detaching a container.
fa61e0
Specify the keys sequence used to detach a container.
fa61e0
Format is a single character `[a-Z]` or a comma separated sequence of
fa61e0
`ctrl-<value>`, where `<value>` is one of:
fa61e0
`a-z`, `@`, `^`, `[`, `\`, `]`, `^` or `_`
fa61e0
fa61e0
**enable_port_reservation**=true
fa61e0
fa61e0
Determines whether the engine will reserve ports on the host when they are
fa61e0
forwarded to containers. When enabled, when ports are forwarded to containers,
fa61e0
they are held open by conmon as long as the container is running, ensuring that
fa61e0
they cannot be reused by other programs on the host. However, this can cause
fa61e0
significant memory usage if a container has many ports forwarded to it.
fa61e0
Disabling this can save memory.
fa61e0
fa61e0
**env**=[]
fa61e0
0106cf
Environment variables to be used when running the container engine (e.g., Podman, Buildah). For example "http_proxy=internal.proxy.company.com".
fa61e0
Note these environment variables will not be used within the container. Set the env section under [containers] table,
fa61e0
if you want to set environment variables for the container.
fa61e0
0106cf
**events_logfile_path**=""
0106cf
0106cf
Define where event logs will be stored, when events_logger is "file".
0106cf
fa61e0
**events_logger**="journald"
fa61e0
fa61e0
Default method to use when logging events.
fa61e0
Valid values: `file`, `journald`, and `none`.
fa61e0
fa61e0
**helper_binaries_dir**=["/usr/libexec/podman", ...]
fa61e0
fa61e0
A is a list of directories which are used to search for helper binaries.
fa61e0
fa61e0
The default paths on Linux are:
fa61e0
- `/usr/local/libexec/podman`
fa61e0
- `/usr/local/lib/podman`
fa61e0
- `/usr/libexec/podman`
fa61e0
- `/usr/lib/podman`
fa61e0
fa61e0
The default paths on macOS are:
fa61e0
- `/usr/local/opt/podman/libexec`
fa61e0
-	`/opt/homebrew/bin`
fa61e0
-	`/opt/homebrew/opt/podman/libexec`
fa61e0
- `/usr/local/bin`
fa61e0
-	`/usr/local/libexec/podman`
fa61e0
-	`/usr/local/lib/podman`
fa61e0
-	`/usr/libexec/podman`
fa61e0
-	`/usr/lib/podman`
fa61e0
fa61e0
The default path on Windows is:
fa61e0
- `C:\Program Files\RedHat\Podman`
fa61e0
fa61e0
**hooks_dir**=["/etc/containers/oci/hooks.d", ...]
fa61e0
fa61e0
Path to the OCI hooks directories for automatically executed hooks.
fa61e0
fa61e0
**image_default_format**="oci"|"v2s2"|"v2s1"
fa61e0
fa61e0
Manifest Type (oci, v2s2, or v2s1) to use when pulling, pushing, building
fa61e0
container images. By default images pulled and pushed match the format of the
fa61e0
source image. Building/committing defaults to OCI.
fa61e0
Note: **image_build_format** is deprecated.
fa61e0
fa61e0
**image_default_transport**="docker://"
fa61e0
fa61e0
Default transport method for pulling and pushing images.
fa61e0
fa61e0
**image_parallel_copies**=0
fa61e0
fa61e0
Maximum number of image layers to be copied (pulled/pushed) simultaneously.
fa61e0
Not setting this field will fall back to containers/image defaults. (6)
fa61e0
fa61e0
**infra_command**="/pause"
fa61e0
0106cf
Infra (pause) container image command for pod infra containers. When running a
0106cf
pod, we start a `/pause` process in a container to hold open the namespaces
0106cf
associated with the pod. This container does nothing other then sleep,
0106cf
reserving the pods resources for the lifetime of the pod.
fa61e0
0106cf
**infra_image**=""
fa61e0
0106cf
Infra (pause) container image for pod infra containers. When running a
fa61e0
pod, we start a `pause` process in a container to hold open the namespaces
0106cf
associated with the pod. This container does nothing other then sleep,
0106cf
reserving the pods resources for the lifetime of the pod. By default container
0106cf
engines run a builtin container using the pause executable. If you want override
0106cf
specify an image to pull.
fa61e0
fa61e0
**lock_type**="shm"
fa61e0
fa61e0
Specify the locking mechanism to use; valid values are "shm" and "file".
fa61e0
Change the default only if you are sure of what you are doing, in general
fa61e0
"file" is useful only on platforms where cgo is not available for using the
0106cf
faster "shm" lock type. You may need to run "podman system renumber" after you
fa61e0
change the lock type.
fa61e0
fa61e0
**machine_enabled**=false
fa61e0
fa61e0
Indicates if Podman is running inside a VM via Podman Machine.
fa61e0
Podman uses this value to do extra setup around networking from the
fa61e0
container inside the VM to to host.
fa61e0
fa61e0
**multi_image_archive**=false
fa61e0
0106cf
Allows for creating archives (e.g., tarballs) with more than one image. Some container engines, such as Podman, interpret additional arguments as tags for one image and hence do not store more than one image. The default behavior can be altered with this option.
fa61e0
fa61e0
**namespace**=""
fa61e0
fa61e0
Default engine namespace. If the engine is joined to a namespace, it will see
fa61e0
only containers and pods that were created in the same namespace, and will
0106cf
create new containers and pods in that namespace. The default namespace is "",
fa61e0
which corresponds to no namespace. When no namespace is set, all containers
fa61e0
and pods are visible.
fa61e0
fa61e0
**network_cmd_path**=""
fa61e0
fa61e0
Path to the slirp4netns binary.
fa61e0
0106cf
**network_cmd_options**=["enable_ipv6=true",]
fa61e0
fa61e0
Default options to pass to the slirp4netns binary.
fa61e0
0106cf
Valid options values are:
0106cf
0106cf
  - **allow_host_loopback=true|false**: Allow the slirp4netns to reach the host loopback IP (`10.0.2.2`, which is added to `/etc/hosts` as `host.containers.internal` for your convenience). Default is false.
0106cf
  - **mtu=MTU**: Specify the MTU to use for this network. (Default is `65520`).
0106cf
  - **cidr=CIDR**: Specify ip range to use for this network. (Default is `10.0.2.0/24`).
0106cf
  - **enable_ipv6=true|false**: Enable IPv6. Default is false. (Required for `outbound_addr6`).
0106cf
  - **outbound_addr=INTERFACE**: Specify the outbound interface slirp should bind to (ipv4 traffic only).
0106cf
  - **outbound_addr=IPv4**: Specify the outbound ipv4 address slirp should bind to.
0106cf
  - **outbound_addr6=INTERFACE**: Specify the outbound interface slirp should bind to (ipv6 traffic only).
0106cf
  - **outbound_addr6=IPv6**: Specify the outbound ipv6 address slirp should bind to.
0106cf
  - **port_handler=rootlesskit**: Use rootlesskit for port forwarding. Default.
0106cf
  Note: Rootlesskit changes the source IP address of incoming packets to a IP address in the container network namespace, usually `10.0.2.100`. If your application requires the real source IP address, e.g. web server logs, use the slirp4netns port handler. The rootlesskit port handler is also used for rootless containers when connected to user-defined networks.
0106cf
  - **port_handler=slirp4netns**: Use the slirp4netns port forwarding, it is slower than rootlesskit but preserves the correct source IP address. This port handler cannot be used for user-defined networks.
fa61e0
fa61e0
**no_pivot_root**=false
fa61e0
fa61e0
Whether to use chroot instead of pivot_root in the runtime.
fa61e0
fa61e0
**num_locks**=2048
fa61e0
fa61e0
Number of locks available for containers and pods. Each created container or
0106cf
pod consumes one lock. The default number available is 2048. If this is
fa61e0
changed, a lock renumbering must be performed, using the
fa61e0
`podman system renumber` command.
fa61e0
fa61e0
**pull_policy**="always"|"missing"|"never"
fa61e0
fa61e0
Pull image before running or creating a container. The default is **missing**.
fa61e0
fa61e0
- **missing**: attempt to pull the latest image from the registries listed in registries.conf if a local image does not exist. Raise an error if the image is not in any listed registry and is not present locally.
fa61e0
- **always**: pull the image from the first registry it is found in as listed in registries.conf. Raise an error if not found in the registries, even if the image is present locally.
fa61e0
- **never**: do not pull the image from the registry, use only the local version. Raise an error if the image is not present locally.
fa61e0
fa61e0
**remote** = false
fa61e0
Indicates whether the application should be running in remote mode. This flag modifies the
fa61e0
--remote option on container engines. Setting the flag to true will default `podman --remote=true` for access to the remote Podman service.
fa61e0
fa61e0
**runtime**=""
fa61e0
fa61e0
Default OCI specific runtime in runtimes that will be used by default. Must
fa61e0
refer to a member of the runtimes table. Default runtime will be searched for
fa61e0
on the system using the priority: "crun", "runc", "kata".
fa61e0
0106cf
**runtime_supports_json**=["crun", "runc", "kata", "runsc", "krun"]
fa61e0
fa61e0
The list of the OCI runtimes that support `--format=json`.
fa61e0
0106cf
**runtime_supports_kvm**=["kata", "krun"]
fa61e0
fa61e0
The list of OCI runtimes that support running containers with KVM separation.
fa61e0
0106cf
**runtime_supports_nocgroups**=["crun", "krun"]
fa61e0
fa61e0
The list of OCI runtimes that support running containers without CGroups.
fa61e0
0106cf
**image_copy_tmp_dir**="/var/tmp"
0106cf
0106cf
Default location for storing temporary container image content. Can be
0106cf
overridden with the TMPDIR environment variable. If you specify "storage", then
0106cf
the location of the container/storage tmp directory will be used. If set then it
0106cf
is the users responsibility to cleanup storage. Configure tmpfiles.d(5) to
0106cf
cleanup storage.
0106cf
0106cf
**service_timeout**=**5**
0106cf
0106cf
Number of seconds to wait without a connection  before the
0106cf
`podman system service` times out and exits
0106cf
fa61e0
**static_dir**="/var/lib/containers/storage/libpod"
fa61e0
fa61e0
Directory for persistent libpod files (database, etc).
fa61e0
By default this will be configured relative to where containers/storage
fa61e0
stores containers.
fa61e0
fa61e0
**stop_timeout**=10
fa61e0
fa61e0
Number of seconds to wait for container to exit before sending kill signal.
fa61e0
fa61e0
**tmp_dir**="/run/libpod"
fa61e0
fa61e0
The path to a temporary directory to store per-boot container.
fa61e0
Must be a tmpfs (wiped after reboot).
fa61e0
fa61e0
**volume_path**="/var/lib/containers/storage/volumes"
fa61e0
fa61e0
Directory where named volumes will be created in using the default volume
fa61e0
driver.
fa61e0
By default this will be configured relative to where containers/storage store
fa61e0
containers. This convention is followed by the default volume driver, but may
fa61e0
not be by other drivers.
fa61e0
fa61e0
**chown_copied_files**=true
fa61e0
fa61e0
Determines whether file copied into a container will have changed ownership to
fa61e0
the primary uid/gid of the container.
fa61e0
0106cf
**compression_format**=""
0106cf
0106cf
Specifies the compression format to use when pushing an image. Supported values are: `gzip`, `zstd` and `zstd:chunked`.
0106cf
fa61e0
## SERVICE DESTINATION TABLE
fa61e0
The `service_destinations` table contains configuration options used to set up remote connections to the podman service for the podman API.
fa61e0
fa61e0
**[service_destinations.{name}]**
fa61e0
URI to access the Podman service
fa61e0
**uri="ssh://user@production.example.com/run/user/1001/podman/podman.sock"**
fa61e0
fa61e0
  Example URIs:
fa61e0
fa61e0
- **rootless local**  - unix://run/user/1000/podman/podman.sock
fa61e0
- **rootless remote** - ssh://user@engineering.lab.company.com/run/user/1000/podman/podman.sock
fa61e0
- **rootfull local**  - unix://run/podman/podman.sock
fa61e0
- **rootfull remote** - ssh://root@10.10.1.136:22/run/podman/podman.sock
fa61e0
fa61e0
**identity="~/.ssh/id_rsa**
fa61e0
fa61e0
Path to file containing ssh identity key
fa61e0
fa61e0
**[engine.volume_plugins]**
fa61e0
fa61e0
A table of all the enabled volume plugins on the system. Volume plugins can be
fa61e0
used as the backend for Podman named volumes. Individual plugins are specified
fa61e0
below, as a map of the plugin name (what the plugin will be called) to its path
fa61e0
(filepath of the plugin's unix socket).
fa61e0
fa61e0
fa61e0
## SECRET TABLE
fa61e0
The `secret` table contains settings for the configuration of the secret subsystem.
fa61e0
fa61e0
**driver**=file
fa61e0
fa61e0
Name of the secret driver to be used.
fa61e0
Currently valid values are:
fa61e0
  * file
fa61e0
  * pass
fa61e0
fa61e0
**[secrets.opts]**
fa61e0
fa61e0
The driver specific options object.
fa61e0
fa61e0
## MACHINE TABLE
fa61e0
The `machine` table contains configurations for podman machine VMs
fa61e0
fa61e0
**cpus**=1
fa61e0
Number of CPU's a machine is created with.
fa61e0
fa61e0
**disk_size**=10
fa61e0
fa61e0
The size of the disk in GB created when init-ing a podman-machine VM
fa61e0
0106cf
**image**=""
fa61e0
fa61e0
Default image used when creating a new VM using `podman machine init`.
0106cf
Options: On Linux/Mac, `testing`, `stable`, `next`. On Windows, the major
0106cf
version of the OS (e.g `35`). For all platforms you can alternatively specify
0106cf
a custom path or download URL to an image. The default is `testing` on
0106cf
Linux/Mac, and `35` on Windows.
fa61e0
fa61e0
**memory**=2048
fa61e0
fa61e0
Memory in MB a machine is created with.
fa61e0
0106cf
**user**=""
0106cf
0106cf
Username to use and create on the podman machine OS for rootless container
0106cf
access. The default value is `user`. On Linux/Mac the default is`core`.
0106cf
fa61e0
# FILES
fa61e0
fa61e0
**containers.conf**
fa61e0
fa61e0
Distributions often provide a `/usr/share/containers/containers.conf` file to
fa61e0
define default container configuration. Administrators can override fields in
fa61e0
this file by creating `/etc/containers/containers.conf` to specify their own
fa61e0
configuration. Rootless users can further override fields in the config by
fa61e0
creating a config file stored in the `$HOME/.config/containers/containers.conf` file.
fa61e0
fa61e0
If the `CONTAINERS_CONF` path environment variable is set, just
0106cf
this path will be used. This is primarily used for testing.
fa61e0
fa61e0
Fields specified in the containers.conf file override the default options, as
fa61e0
well as options in previously read containers.conf files.
fa61e0
fa61e0
**storage.conf**
fa61e0
fa61e0
The `/etc/containers/storage.conf` file is the default storage configuration file.
fa61e0
Rootless users can override fields in the storage config by creating
fa61e0
`$HOME/.config/containers/storage.conf`.
fa61e0
fa61e0
If the `CONTAINERS_STORAGE_CONF` path environment variable is set, this path
fa61e0
is used for the storage.conf file rather than the default.
fa61e0
This is primarily used for testing.
fa61e0
fa61e0
# SEE ALSO
0106cf
containers-storage.conf(5), containers-policy.json(5), containers-registries.conf(5), tmpfiles.d(5)
fa61e0
fa61e0
[toml]: https://github.com/toml-lang/toml