2566c1
% containers.conf 5 Container engine configuration file
2566c1
2566c1
# NAME
2566c1
containers.conf - The container engine configuration file specifies default
2566c1
configuration options and command-line flags for container engines.
2566c1
2566c1
# DESCRIPTION
2566c1
Container engines like Podman & Buildah read containers.conf file, if it exists
2566c1
and modify the defaults for running containers on the host. containers.conf uses
2566c1
a TOML format that can be easily modified and versioned.
2566c1
2566c1
Container engines read the /usr/share/containers/containers.conf and
2566c1
/etc/containers/containers.conf, and /etc/containers/containers.conf.d/*.conf files
2566c1
if they exist. When running in rootless mode, they also read
2566c1
$HOME/.config/containers/containers.conf and
2566c1
$HOME/.config/containers/containers.conf.d/*.conf files.
2566c1
2566c1
Fields specified in containers conf override the default options, as well as
2566c1
options in previously read containers.conf files.
2566c1
2566c1
Config files in the `.d` directories, are added in alpha numeric sorted order and must end in `.conf`.
2566c1
2566c1
Not all options are supported in all container engines.
2566c1
2566c1
Note container engines also use other configuration files for configuring the environment.
2566c1
2566c1
* `storage.conf` for configuration of container and images storage.
2566c1
* `registries.conf` for definition of container registires to search while pulling.
2566c1
container images.
2566c1
* `policy.conf` for controlling which images can be pulled to the system.
2566c1
2566c1
# FORMAT
2566c1
The [TOML format][toml] is used as the encoding of the configuration file.
2566c1
Every option is nested under its table. No bare options are used. The format of
2566c1
TOML can be simplified to:
2566c1
2566c1
    [table1]
2566c1
    option = value
2566c1
2566c1
    [table2]
2566c1
    option = value
2566c1
2566c1
    [table3]
2566c1
    option = value
2566c1
2566c1
    [table3.subtable1]
2566c1
    option = value
2566c1
2566c1
## CONTAINERS TABLE
2566c1
The containers table contains settings to configure and manage the OCI runtime.
2566c1
2566c1
**annotations** = []
2566c1
List of annotations. Specified as "key=value" pairs to be added to all containers.
2566c1
2566c1
Example: "run.oci.keep_original_groups=1"
2566c1
2566c1
**apparmor_profile**="container-default"
2566c1
2566c1
Used to change the name of the default AppArmor profile of container engines.
2566c1
The default profile name is "container-default".
2566c1
2566c1
**cgroups**="enabled"
2566c1
2566c1
Determines  whether  the  container will create CGroups.
2566c1
Options are:
2566c1
  `enabled`   Enable cgroup support within container
2566c1
  `disabled`  Disable cgroup support, will inherit cgroups from parent
2566c1
  `no-conmon` Do not create a cgroup dedicated to conmon.
2566c1
2566c1
**cgroupns**="private"
2566c1
2566c1
Default way to to create a cgroup namespace for the container.
2566c1
Options are:
2566c1
`private` Create private Cgroup Namespace for the container.
2566c1
`host`    Share host Cgroup Namespace with the container.
2566c1
2566c1
**default_capabilities**=[]
2566c1
2566c1
List of default capabilities for containers.
2566c1
2566c1
The default list is:
2566c1
```
2566c1
default_capabilities = [
2566c1
"AUDIT_WRITE",
2566c1
      "CHOWN",
2566c1
      "DAC_OVERRIDE",
2566c1
      "FOWNER",
2566c1
      "FSETID",
2566c1
      "KILL",
2566c1
      "MKNOD",
2566c1
      "NET_BIND_SERVICE",
2566c1
      "NET_RAW",
2566c1
      "SETGID",
2566c1
      "SETPCAP",
2566c1
      "SETUID",
2566c1
      "SYS_CHROOT",
2566c1
]
2566c1
```
2566c1
2566c1
**default_sysctls**=[]
2566c1
2566c1
A list of sysctls to be set in containers by default,
2566c1
specified as "name=value".
2566c1
2566c1
Example:"net.ipv4.ping_group_range=0 1000".
2566c1
2566c1
**default_ulimits**=[]
2566c1
2566c1
A list of ulimits to be set in containers by default,
2566c1
specified as "name=soft-limit:hard-limit".
2566c1
2566c1
Example: "nofile=1024:2048".
2566c1
2566c1
**devices**=[]
2566c1
2566c1
List of devices.
2566c1
Specified as 'device-on-host:device-on-container:permissions'.
2566c1
2566c1
Example: "/dev/sdc:/dev/xvdc:rwm".
2566c1
2566c1
**dns_options**=[]
2566c1
2566c1
List of default DNS options to be added to /etc/resolv.conf inside of the
2566c1
container.
2566c1
2566c1
**dns_searches**=[]
2566c1
2566c1
List of default DNS search domains to be added to /etc/resolv.conf inside of
2566c1
the container.
2566c1
2566c1
**dns_servers**=[]
2566c1
2566c1
A list of dns servers to override the DNS configuration passed to the
2566c1
container. The special value “none” can be specified to disable creation of
2566c1
/etc/resolv.conf in the container.
2566c1
2566c1
**env**=["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "TERM=xterm"]
2566c1
2566c1
Environment variable list for the container process, used for passing
2566c1
environment variables to the container.
2566c1
2566c1
**env_host**=false
2566c1
2566c1
Pass all host environment variables into the container.
2566c1
2566c1
**http_proxy**=true
2566c1
2566c1
Default proxy environment variables will be passed into the container.
2566c1
The environment variables passed in include:
2566c1
`http_proxy`, `https_proxy`, `ftp_proxy`, `no_proxy`, and the upper case
2566c1
versions of these. The `no_proxy` option is needed when host system uses a proxy
2566c1
but container should not use proxy. Proxy environment variables specified for
2566c1
the container in any other way will override the values passed from the host.
2566c1
2566c1
**init**=false
2566c1
2566c1
Run an init inside the container that forwards signals and reaps processes.
2566c1
2566c1
**init_path**="/usr/libexec/podman/catatonit"
2566c1
2566c1
Path to the container-init binary, which forwards signals and reaps processes
2566c1
within containers. Note that the container-init binary will only be used when
2566c1
the `--init` for podman-create and podman-run is set.
2566c1
2566c1
**ipcns**="private"
2566c1
2566c1
Default way to to create a IPC namespace for the container.
2566c1
Options are:
2566c1
  `private` Create private IPC Namespace for the container.
2566c1
  `host`    Share host IPC Namespace with the container.
2566c1
2566c1
**keyring**=true
2566c1
2566c1
Indicates whether the container engines create a kernel keyring for use within
2566c1
the container.
2566c1
2566c1
**label**=true
2566c1
2566c1
Indicates whether the container engine uses MAC(SELinux) container separation via labeling. This option is ignored on disabled systems.
2566c1
2566c1
**log_driver**="k8s-file"
2566c1
2566c1
Logging driver for the container. Available options: `k8s-file` and `journald`.
2566c1
2566c1
**log_size_max**=-1
2566c1
2566c1
Maximum size allowed for the container's log file. Negative numbers indicate
2566c1
that no size limit is imposed. If it is positive, it must be >= 8192 to
2566c1
match/exceed conmon's read buffer. The file is truncated and re-opened so the
2566c1
limit is never exceeded.
2566c1
2566c1
**log_tag**=""
2566c1
2566c1
Default format tag for container log messages. This is useful for creating a specific tag for container log messages. Container log messages default to using the truncated container ID as a tag.
2566c1
2566c1
**netns**="private"
2566c1
2566c1
Default way to to create a NET namespace for the container.
2566c1
Options are:
2566c1
  `private` Create private NET Namespace for the container.
2566c1
  `host`    Share host NET Namespace with the container.
2566c1
  `none`    Containers do not use the network.
2566c1
2566c1
**no_hosts**=false
2566c1
2566c1
Create /etc/hosts for the container. By default, container engines manage
2566c1
/etc/hosts, automatically adding  the container's  own  IP  address.
2566c1
2566c1
**pidns**="private"
2566c1
2566c1
Default way to to create a PID namespace for the container.
2566c1
Options are:
2566c1
  `private` Create private PID Namespace for the container.
2566c1
  `host`    Share host PID Namespace with the container.
2566c1
2566c1
**pids_limit**=1024
2566c1
2566c1
Maximum number of processes allowed in a container. 0 indicates that no limit
2566c1
is imposed.
2566c1
2566c1
**prepare_volume_on_create**=false
2566c1
2566c1
Copy the content from the underlying image into the newly created volume when the container is created instead of when it is started. If `false`, the container engine will not copy the content until the container is started. Setting it to `true` may have negative performance implications.
2566c1
2566c1
**seccomp_profile**="/usr/share/containers/seccomp.json"
2566c1
2566c1
Path to the seccomp.json profile which is used as the default seccomp profile
2566c1
for the runtime.
2566c1
2566c1
**shm_size**="65536k"
2566c1
2566c1
Size of `/dev/shm`. The format is `<number><unit>`. `number` must be greater
2566c1
than `0`.
2566c1
Unit is optional and can be:
2566c1
`b` (bytes), `k` (kilobytes), `m`(megabytes), or `g` (gigabytes).
2566c1
If you omit the unit, the system uses bytes. If you omit the size entirely,
2566c1
the system uses `65536k`.
2566c1
2566c1
**tz=**""
2566c1
2566c1
Set timezone in container. Takes IANA timezones as well as `local`, which sets the timezone in the container to match the host machine.
2566c1
If not set, then containers will run with the time zone specified in the image.
2566c1
2566c1
Examples:
2566c1
  `tz="local"`
2566c1
  `tz="America/New_York"`
2566c1
2566c1
**umask**="0022"
2566c1
2566c1
Sets umask inside the container.
2566c1
2566c1
**userns**="host"
2566c1
2566c1
Default way to to create a USER namespace for the container.
2566c1
Options are:
2566c1
  `private` Create private USER Namespace for the container.
2566c1
  `host`    Share host USER Namespace with the container.
2566c1
2566c1
**userns_size**=65536
2566c1
2566c1
Number of UIDs to allocate for the automatic container creation. UIDs are
2566c1
allocated from the “container” UIDs listed in /etc/subuid & /etc/subgid.
2566c1
2566c1
**utsns**="private"
2566c1
2566c1
Default way to to create a UTS namespace for the container.
2566c1
Options are:
2566c1
  `private` Create private UTS Namespace for the container.
2566c1
  `host`    Share host UTS Namespace with the container.
2566c1
2566c1
2566c1
## NETWORK TABLE
2566c1
The `network` table contains settings pertaining to the management of CNI
2566c1
plugins.
2566c1
2566c1
**network_backend**=""
2566c1
2566c1
Network backend determines what network driver will be used to set up and tear down container networks.
2566c1
Valid values are "cni" and "netavark".
2566c1
The default value is empty which means that it will automatically choose CNI or netavark. If there are
2566c1
already containers/images or CNI networks preset it will choose CNI.
2566c1
2566c1
Before changing this value all containers must be stopped otherwise it is likely that
2566c1
iptables rules and network interfaces might leak on the host. A reboot will fix this.
2566c1
2566c1
**cni_plugin_dirs**=[]
2566c1
2566c1
List of paths to directories where CNI plugin binaries are located.
2566c1
2566c1
The default list is:
2566c1
```
2566c1
cni_plugin_dirs = [
2566c1
  "/usr/local/libexec/cni",
2566c1
  "/usr/libexec/cni",
2566c1
  "/usr/local/lib/cni",
2566c1
  "/usr/lib/cni",
2566c1
  "/opt/cni/bin",
2566c1
]
2566c1
```
2566c1
2566c1
**default_network**="podman"
2566c1
2566c1
The network name of the default network to attach pods to.
2566c1
2566c1
**default_subnet**="10.88.0.0/16"
2566c1
2566c1
The subnet to use for the default network (named above in **default_network**).
2566c1
If the default network does not exist, it will be automatically created the first time a tool is run using this subnet.
2566c1
2566c1
**network_config_dir**="/etc/cni/net.d/"
2566c1
2566c1
Path to the directory where network configuration files are located.
2566c1
For the CNI backend the default is "/etc/cni/net.d" as root
2566c1
and "$HOME/.config/cni/net.d" as rootless.
2566c1
For the netavark backend "/etc/containers/networks" is used as root
2566c1
and "$graphroot/networks" as rootless.
2566c1
2566c1
**volumes**=[]
2566c1
2566c1
List of volumes.
2566c1
Specified as "directory-on-host:directory-in-container:options".
2566c1
2566c1
Example:  "/db:/var/lib/db:ro".
2566c1
2566c1
## ENGINE TABLE
2566c1
The `engine` table contains configuration options used to set up container engines such as Podman and Buildah.
2566c1
2566c1
**active_service**=""
2566c1
2566c1
Name of destination for accessing the Podman service. See SERVICE DESTINATION TABLE below.
2566c1
2566c1
**cgroup_manager**="systemd"
2566c1
2566c1
The cgroup management implementation used for the runtime. Supports `cgroupfs`
2566c1
and `systemd`.
2566c1
2566c1
**conmon_env_vars**=[]
2566c1
2566c1
Environment variables to pass into Conmon.
2566c1
2566c1
**conmon_path**=[]
2566c1
2566c1
Paths to search for the conmon container manager binary. If the paths are
2566c1
empty or no valid path was found, then the `$PATH` environment variable will be
2566c1
used as the fallback.
2566c1
2566c1
The default list is:
2566c1
```
2566c1
conmon_path=[
2566c1
    "/usr/libexec/podman/conmon",
2566c1
    "/usr/local/libexec/podman/conmon",
2566c1
    "/usr/local/lib/podman/conmon",
2566c1
    "/usr/bin/conmon",
2566c1
    "/usr/sbin/conmon",
2566c1
    "/usr/local/bin/conmon",
2566c1
    "/usr/local/sbin/conmon",
2566c1
    "/run/current-system/sw/bin/conmon",
2566c1
]
2566c1
```
2566c1
2566c1
**detach_keys**="ctrl-p,ctrl-q"
2566c1
2566c1
Keys sequence used for detaching a container.
2566c1
Specify the keys sequence used to detach a container.
2566c1
Format is a single character `[a-Z]` or a comma separated sequence of
2566c1
`ctrl-<value>`, where `<value>` is one of:
2566c1
`a-z`, `@`, `^`, `[`, `\`, `]`, `^` or `_`
2566c1
2566c1
**enable_port_reservation**=true
2566c1
2566c1
Determines whether the engine will reserve ports on the host when they are
2566c1
forwarded to containers. When enabled, when ports are forwarded to containers,
2566c1
they are held open by conmon as long as the container is running, ensuring that
2566c1
they cannot be reused by other programs on the host. However, this can cause
2566c1
significant memory usage if a container has many ports forwarded to it.
2566c1
Disabling this can save memory.
2566c1
2566c1
**env**=[]
2566c1
2566c1
Environment variables to be used when running the container engine (e.g., Podman, Buildah). For example "http_proxy=internal.proxy.company.com".
2566c1
Note these environment variables will not be used within the container. Set the env section under [containers] table,
2566c1
if you want to set environment variables for the container.
2566c1
2566c1
**events_logfile_path**=""
2566c1
2566c1
Define where event logs will be stored, when events_logger is "file".
2566c1
2566c1
**events_logger**="journald"
2566c1
2566c1
Default method to use when logging events.
2566c1
Valid values: `file`, `journald`, and `none`.
2566c1
2566c1
**helper_binaries_dir**=["/usr/libexec/podman", ...]
2566c1
2566c1
A is a list of directories which are used to search for helper binaries.
2566c1
2566c1
The default paths on Linux are:
2566c1
- `/usr/local/libexec/podman`
2566c1
- `/usr/local/lib/podman`
2566c1
- `/usr/libexec/podman`
2566c1
- `/usr/lib/podman`
2566c1
2566c1
The default paths on macOS are:
2566c1
- `/usr/local/opt/podman/libexec`
2566c1
-	`/opt/homebrew/bin`
2566c1
-	`/opt/homebrew/opt/podman/libexec`
2566c1
- `/usr/local/bin`
2566c1
-	`/usr/local/libexec/podman`
2566c1
-	`/usr/local/lib/podman`
2566c1
-	`/usr/libexec/podman`
2566c1
-	`/usr/lib/podman`
2566c1
2566c1
The default path on Windows is:
2566c1
- `C:\Program Files\RedHat\Podman`
2566c1
2566c1
**hooks_dir**=["/etc/containers/oci/hooks.d", ...]
2566c1
2566c1
Path to the OCI hooks directories for automatically executed hooks.
2566c1
2566c1
**image_default_format**="oci"|"v2s2"|"v2s1"
2566c1
2566c1
Manifest Type (oci, v2s2, or v2s1) to use when pulling, pushing, building
2566c1
container images. By default images pulled and pushed match the format of the
2566c1
source image. Building/committing defaults to OCI.
2566c1
Note: **image_build_format** is deprecated.
2566c1
2566c1
**image_default_transport**="docker://"
2566c1
2566c1
Default transport method for pulling and pushing images.
2566c1
2566c1
**image_parallel_copies**=0
2566c1
2566c1
Maximum number of image layers to be copied (pulled/pushed) simultaneously.
2566c1
Not setting this field will fall back to containers/image defaults. (6)
2566c1
2566c1
**infra_command**="/pause"
2566c1
2566c1
Infra (pause) container image command for pod infra containers. When running a
2566c1
pod, we start a `/pause` process in a container to hold open the namespaces
2566c1
associated with the pod. This container does nothing other then sleep,
2566c1
reserving the pods resources for the lifetime of the pod.
2566c1
2566c1
**infra_image**=""
2566c1
2566c1
Infra (pause) container image for pod infra containers. When running a
2566c1
pod, we start a `pause` process in a container to hold open the namespaces
2566c1
associated with the pod. This container does nothing other then sleep,
2566c1
reserving the pods resources for the lifetime of the pod. By default container
2566c1
engines run a builtin container using the pause executable. If you want override
2566c1
specify an image to pull.
2566c1
2566c1
**lock_type**="shm"
2566c1
2566c1
Specify the locking mechanism to use; valid values are "shm" and "file".
2566c1
Change the default only if you are sure of what you are doing, in general
2566c1
"file" is useful only on platforms where cgo is not available for using the
2566c1
faster "shm" lock type. You may need to run "podman system renumber" after you
2566c1
change the lock type.
2566c1
2566c1
**machine_enabled**=false
2566c1
2566c1
Indicates if Podman is running inside a VM via Podman Machine.
2566c1
Podman uses this value to do extra setup around networking from the
2566c1
container inside the VM to to host.
2566c1
2566c1
**multi_image_archive**=false
2566c1
2566c1
Allows for creating archives (e.g., tarballs) with more than one image. Some container engines, such as Podman, interpret additional arguments as tags for one image and hence do not store more than one image. The default behavior can be altered with this option.
2566c1
2566c1
**namespace**=""
2566c1
2566c1
Default engine namespace. If the engine is joined to a namespace, it will see
2566c1
only containers and pods that were created in the same namespace, and will
2566c1
create new containers and pods in that namespace. The default namespace is "",
2566c1
which corresponds to no namespace. When no namespace is set, all containers
2566c1
and pods are visible.
2566c1
2566c1
**network_cmd_path**=""
2566c1
2566c1
Path to the slirp4netns binary.
2566c1
2566c1
**network_cmd_options**=["enable_ipv6=true",]
2566c1
2566c1
Default options to pass to the slirp4netns binary.
2566c1
2566c1
Valid options values are:
2566c1
2566c1
  - **allow_host_loopback=true|false**: Allow the slirp4netns to reach the host loopback IP (`10.0.2.2`, which is added to `/etc/hosts` as `host.containers.internal` for your convenience). Default is false.
2566c1
  - **mtu=MTU**: Specify the MTU to use for this network. (Default is `65520`).
2566c1
  - **cidr=CIDR**: Specify ip range to use for this network. (Default is `10.0.2.0/24`).
2566c1
  - **enable_ipv6=true|false**: Enable IPv6. Default is false. (Required for `outbound_addr6`).
2566c1
  - **outbound_addr=INTERFACE**: Specify the outbound interface slirp should bind to (ipv4 traffic only).
2566c1
  - **outbound_addr=IPv4**: Specify the outbound ipv4 address slirp should bind to.
2566c1
  - **outbound_addr6=INTERFACE**: Specify the outbound interface slirp should bind to (ipv6 traffic only).
2566c1
  - **outbound_addr6=IPv6**: Specify the outbound ipv6 address slirp should bind to.
2566c1
  - **port_handler=rootlesskit**: Use rootlesskit for port forwarding. Default.
2566c1
  Note: Rootlesskit changes the source IP address of incoming packets to a IP address in the container network namespace, usually `10.0.2.100`. If your application requires the real source IP address, e.g. web server logs, use the slirp4netns port handler. The rootlesskit port handler is also used for rootless containers when connected to user-defined networks.
2566c1
  - **port_handler=slirp4netns**: Use the slirp4netns port forwarding, it is slower than rootlesskit but preserves the correct source IP address. This port handler cannot be used for user-defined networks.
2566c1
2566c1
**no_pivot_root**=false
2566c1
2566c1
Whether to use chroot instead of pivot_root in the runtime.
2566c1
2566c1
**num_locks**=2048
2566c1
2566c1
Number of locks available for containers and pods. Each created container or
2566c1
pod consumes one lock. The default number available is 2048. If this is
2566c1
changed, a lock renumbering must be performed, using the
2566c1
`podman system renumber` command.
2566c1
2566c1
**pull_policy**="always"|"missing"|"never"
2566c1
2566c1
Pull image before running or creating a container. The default is **missing**.
2566c1
2566c1
- **missing**: attempt to pull the latest image from the registries listed in registries.conf if a local image does not exist. Raise an error if the image is not in any listed registry and is not present locally.
2566c1
- **always**: pull the image from the first registry it is found in as listed in registries.conf. Raise an error if not found in the registries, even if the image is present locally.
2566c1
- **never**: do not pull the image from the registry, use only the local version. Raise an error if the image is not present locally.
2566c1
2566c1
**remote** = false
2566c1
Indicates whether the application should be running in remote mode. This flag modifies the
2566c1
--remote option on container engines. Setting the flag to true will default `podman --remote=true` for access to the remote Podman service.
2566c1
2566c1
**runtime**=""
2566c1
2566c1
Default OCI specific runtime in runtimes that will be used by default. Must
2566c1
refer to a member of the runtimes table. Default runtime will be searched for
2566c1
on the system using the priority: "crun", "runc", "kata".
2566c1
2566c1
**runtime_supports_json**=["crun", "runc", "kata", "runsc", "krun"]
2566c1
2566c1
The list of the OCI runtimes that support `--format=json`.
2566c1
2566c1
**runtime_supports_kvm**=["kata", "krun"]
2566c1
2566c1
The list of OCI runtimes that support running containers with KVM separation.
2566c1
2566c1
**runtime_supports_nocgroups**=["crun", "krun"]
2566c1
2566c1
The list of OCI runtimes that support running containers without CGroups.
2566c1
2566c1
**image_copy_tmp_dir**="/var/tmp"
2566c1
2566c1
Default location for storing temporary container image content. Can be
2566c1
overridden with the TMPDIR environment variable. If you specify "storage", then
2566c1
the location of the container/storage tmp directory will be used. If set then it
2566c1
is the users responsibility to cleanup storage. Configure tmpfiles.d(5) to
2566c1
cleanup storage.
2566c1
2566c1
**service_timeout**=**5**
2566c1
2566c1
Number of seconds to wait without a connection  before the
2566c1
`podman system service` times out and exits
2566c1
2566c1
**static_dir**="/var/lib/containers/storage/libpod"
2566c1
2566c1
Directory for persistent libpod files (database, etc).
2566c1
By default this will be configured relative to where containers/storage
2566c1
stores containers.
2566c1
2566c1
**stop_timeout**=10
2566c1
2566c1
Number of seconds to wait for container to exit before sending kill signal.
2566c1
2566c1
**tmp_dir**="/run/libpod"
2566c1
2566c1
The path to a temporary directory to store per-boot container.
2566c1
Must be a tmpfs (wiped after reboot).
2566c1
2566c1
**volume_path**="/var/lib/containers/storage/volumes"
2566c1
2566c1
Directory where named volumes will be created in using the default volume
2566c1
driver.
2566c1
By default this will be configured relative to where containers/storage store
2566c1
containers. This convention is followed by the default volume driver, but may
2566c1
not be by other drivers.
2566c1
2566c1
**chown_copied_files**=true
2566c1
2566c1
Determines whether file copied into a container will have changed ownership to
2566c1
the primary uid/gid of the container.
2566c1
2566c1
**compression_format**=""
2566c1
2566c1
Specifies the compression format to use when pushing an image. Supported values are: `gzip`, `zstd` and `zstd:chunked`.
2566c1
2566c1
## SERVICE DESTINATION TABLE
2566c1
The `service_destinations` table contains configuration options used to set up remote connections to the podman service for the podman API.
2566c1
2566c1
**[service_destinations.{name}]**
2566c1
URI to access the Podman service
2566c1
**uri="ssh://user@production.example.com/run/user/1001/podman/podman.sock"**
2566c1
2566c1
  Example URIs:
2566c1
2566c1
- **rootless local**  - unix://run/user/1000/podman/podman.sock
2566c1
- **rootless remote** - ssh://user@engineering.lab.company.com/run/user/1000/podman/podman.sock
2566c1
- **rootfull local**  - unix://run/podman/podman.sock
2566c1
- **rootfull remote** - ssh://root@10.10.1.136:22/run/podman/podman.sock
2566c1
2566c1
**identity="~/.ssh/id_rsa**
2566c1
2566c1
Path to file containing ssh identity key
2566c1
2566c1
**[engine.volume_plugins]**
2566c1
2566c1
A table of all the enabled volume plugins on the system. Volume plugins can be
2566c1
used as the backend for Podman named volumes. Individual plugins are specified
2566c1
below, as a map of the plugin name (what the plugin will be called) to its path
2566c1
(filepath of the plugin's unix socket).
2566c1
2566c1
2566c1
## SECRET TABLE
2566c1
The `secret` table contains settings for the configuration of the secret subsystem.
2566c1
2566c1
**driver**=file
2566c1
2566c1
Name of the secret driver to be used.
2566c1
Currently valid values are:
2566c1
  * file
2566c1
  * pass
2566c1
2566c1
**[secrets.opts]**
2566c1
2566c1
The driver specific options object.
2566c1
2566c1
## MACHINE TABLE
2566c1
The `machine` table contains configurations for podman machine VMs
2566c1
2566c1
**cpus**=1
2566c1
Number of CPU's a machine is created with.
2566c1
2566c1
**disk_size**=10
2566c1
2566c1
The size of the disk in GB created when init-ing a podman-machine VM
2566c1
2566c1
**image**=""
2566c1
2566c1
Default image used when creating a new VM using `podman machine init`.
2566c1
Options: On Linux/Mac, `testing`, `stable`, `next`. On Windows, the major
2566c1
version of the OS (e.g `35`). For all platforms you can alternatively specify
2566c1
a custom path or download URL to an image. The default is `testing` on
2566c1
Linux/Mac, and `35` on Windows.
2566c1
2566c1
**memory**=2048
2566c1
2566c1
Memory in MB a machine is created with.
2566c1
2566c1
**user**=""
2566c1
2566c1
Username to use and create on the podman machine OS for rootless container
2566c1
access. The default value is `user`. On Linux/Mac the default is`core`.
2566c1
2566c1
# FILES
2566c1
2566c1
**containers.conf**
2566c1
2566c1
Distributions often provide a `/usr/share/containers/containers.conf` file to
2566c1
define default container configuration. Administrators can override fields in
2566c1
this file by creating `/etc/containers/containers.conf` to specify their own
2566c1
configuration. Rootless users can further override fields in the config by
2566c1
creating a config file stored in the `$HOME/.config/containers/containers.conf` file.
2566c1
2566c1
If the `CONTAINERS_CONF` path environment variable is set, just
2566c1
this path will be used. This is primarily used for testing.
2566c1
2566c1
Fields specified in the containers.conf file override the default options, as
2566c1
well as options in previously read containers.conf files.
2566c1
2566c1
**storage.conf**
2566c1
2566c1
The `/etc/containers/storage.conf` file is the default storage configuration file.
2566c1
Rootless users can override fields in the storage config by creating
2566c1
`$HOME/.config/containers/storage.conf`.
2566c1
2566c1
If the `CONTAINERS_STORAGE_CONF` path environment variable is set, this path
2566c1
is used for the storage.conf file rather than the default.
2566c1
This is primarily used for testing.
2566c1
2566c1
# SEE ALSO
2566c1
containers-storage.conf(5), containers-policy.json(5), containers-registries.conf(5), tmpfiles.d(5)
2566c1
2566c1
[toml]: https://github.com/toml-lang/toml