fa61e0
# The containers configuration file specifies all of the available configuration
fa61e0
# command-line options/flags for container engine tools like Podman & Buildah,
fa61e0
# but in a TOML format that can be easily modified and versioned.
fa61e0
fa61e0
# Please refer to containers.conf(5) for details of all configuration options.
fa61e0
# Not all container engines implement all of the options.
fa61e0
# All of the options have hard coded defaults and these options will override
fa61e0
# the built in defaults. Users can then override these options via the command
fa61e0
# line. Container engines will read containers.conf files in up to three
fa61e0
# locations in the following order:
fa61e0
#  1. /usr/share/containers/containers.conf
fa61e0
#  2. /etc/containers/containers.conf
fa61e0
#  3. $HOME/.config/containers/containers.conf (Rootless containers ONLY)
fa61e0
#  Items specified in the latter containers.conf, if they exist, override the
fa61e0
# previous containers.conf settings, or the default settings.
fa61e0
fa61e0
[containers]
fa61e0
fa61e0
# List of annotation. Specified as
fa61e0
# "key = value"
fa61e0
# If it is empty or commented out, no annotations will be added
fa61e0
#
fa61e0
#annotations = []
fa61e0
fa61e0
# Used to change the name of the default AppArmor profile of container engine.
fa61e0
#
fa61e0
#apparmor_profile = "container-default"
fa61e0
fa61e0
# Default way to to create a cgroup namespace for the container
fa61e0
# Options are:
fa61e0
# `private` Create private Cgroup Namespace for the container.
fa61e0
# `host`    Share host Cgroup Namespace with the container.
fa61e0
#
fa61e0
#cgroupns = "private"
fa61e0
fa61e0
# Control container cgroup configuration
fa61e0
# Determines  whether  the  container will create CGroups.
fa61e0
# Options are:
fa61e0
# `enabled`   Enable cgroup support within container
fa61e0
# `disabled`  Disable cgroup support, will inherit cgroups from parent
fa61e0
# `no-conmon` Do not create a cgroup dedicated to conmon.
fa61e0
#
fa61e0
#cgroups = "enabled"
fa61e0
fa61e0
# List of default capabilities for containers. If it is empty or commented out,
fa61e0
# the default capabilities defined in the container engine will be added.
fa61e0
#
fa61e0
default_capabilities = [
fa61e0
    "NET_RAW",
fa61e0
  "CHOWN",
fa61e0
  "DAC_OVERRIDE",
fa61e0
  "FOWNER",
fa61e0
  "FSETID",
fa61e0
  "KILL",
fa61e0
  "NET_BIND_SERVICE",
fa61e0
  "SETFCAP",
fa61e0
  "SETGID",
fa61e0
  "SETPCAP",
fa61e0
  "SETUID",
fa61e0
  "SYS_CHROOT"
fa61e0
]
fa61e0
fa61e0
# A list of sysctls to be set in containers by default,
fa61e0
# specified as "name=value",
fa61e0
# for example:"net.ipv4.ping_group_range=0 0".
fa61e0
#
fa61e0
default_sysctls = [
fa61e0
  "net.ipv4.ping_group_range=0 0",
fa61e0
]
fa61e0
fa61e0
# A list of ulimits to be set in containers by default, specified as
fa61e0
# "<ulimit name>=<soft limit>:<hard limit>", for example:
fa61e0
# "nofile=1024:2048"
fa61e0
# See setrlimit(2) for a list of resource names.
fa61e0
# Any limit not specified here will be inherited from the process launching the
fa61e0
# container engine.
fa61e0
# Ulimits has limits for non privileged container engines.
fa61e0
#
fa61e0
#default_ulimits = [
fa61e0
#  "nofile=1280:2560",
fa61e0
#]
fa61e0
fa61e0
# List of devices. Specified as
fa61e0
# "<device-on-host>:<device-on-container>:<permissions>", for example:
fa61e0
# "/dev/sdc:/dev/xvdc:rwm".
fa61e0
# If it is empty or commented out, only the default devices will be used
fa61e0
#
fa61e0
#devices = []
fa61e0
fa61e0
# List of default DNS options to be added to /etc/resolv.conf inside of the container.
fa61e0
#
fa61e0
#dns_options = []
fa61e0
fa61e0
# List of default DNS search domains to be added to /etc/resolv.conf inside of the container.
fa61e0
#
fa61e0
#dns_searches = []
fa61e0
fa61e0
# Set default DNS servers.
fa61e0
# This option can be used to override the DNS configuration passed to the
fa61e0
# container. The special value "none" can be specified to disable creation of
fa61e0
# /etc/resolv.conf in the container.
fa61e0
# The /etc/resolv.conf file in the image will be used without changes.
fa61e0
#
fa61e0
#dns_servers = []
fa61e0
fa61e0
# Environment variable list for the conmon process; used for passing necessary
fa61e0
# environment variables to conmon or the runtime.
fa61e0
#
fa61e0
#env = [
fa61e0
#  "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
fa61e0
#  "TERM=xterm",
fa61e0
#]
fa61e0
fa61e0
# Pass all host environment variables into the container.
fa61e0
#
fa61e0
#env_host = false
fa61e0
fa61e0
# Default proxy environment variables passed into the container.
fa61e0
# The environment variables passed in include:
fa61e0
# http_proxy, https_proxy, ftp_proxy, no_proxy, and the upper case versions of
fa61e0
# these. This option is needed when host system uses a proxy but container
fa61e0
# should not use proxy. Proxy environment variables specified for the container
fa61e0
# in any other way will override the values passed from the host.
fa61e0
#
fa61e0
#http_proxy = true
fa61e0
fa61e0
# Run an init inside the container that forwards signals and reaps processes.
fa61e0
#
fa61e0
#init = false
fa61e0
fa61e0
# Container init binary, if init=true, this is the init binary to be used for containers.
fa61e0
#
fa61e0
#init_path = "/usr/libexec/podman/catatonit"
fa61e0
fa61e0
# Default way to to create an IPC namespace (POSIX SysV IPC) for the container
fa61e0
# Options are:
fa61e0
# `private` Create private IPC Namespace for the container.
fa61e0
# `host`    Share host IPC Namespace with the container.
fa61e0
#
fa61e0
#ipcns = "private"
fa61e0
fa61e0
# keyring tells the container engine whether to create
fa61e0
# a kernel keyring for use within the container.
fa61e0
#
fa61e0
#keyring = true
fa61e0
fa61e0
# label tells the container engine whether to use container separation using
fa61e0
# MAC(SELinux) labeling or not.
fa61e0
# The label flag is ignored on label disabled systems.
fa61e0
#
fa61e0
#label = true
fa61e0
fa61e0
# Logging driver for the container. Available options: k8s-file and journald.
fa61e0
#
fa61e0
#log_driver = "k8s-file"
fa61e0
fa61e0
# Maximum size allowed for the container log file. Negative numbers indicate
fa61e0
# that no size limit is imposed. If positive, it must be >= 8192 to match or
fa61e0
# exceed conmon's read buffer. The file is truncated and re-opened so the
fa61e0
# limit is never exceeded.
fa61e0
#
fa61e0
#log_size_max = -1
fa61e0
fa61e0
# Specifies default format tag for container log messages.
fa61e0
# This is useful for creating a specific tag for container log messages.
fa61e0
# Containers logs default to truncated container ID as a tag.
fa61e0
#
fa61e0
#log_tag = ""
fa61e0
fa61e0
# Default way to to create a Network namespace for the container
fa61e0
# Options are:
fa61e0
# `private` Create private Network Namespace for the container.
fa61e0
# `host`    Share host Network Namespace with the container.
fa61e0
# `none`    Containers do not use the network
fa61e0
#
fa61e0
#netns = "private"
fa61e0
fa61e0
# Create /etc/hosts for the container.  By default, container engine manage
fa61e0
# /etc/hosts, automatically adding  the container's  own  IP  address.
fa61e0
#
fa61e0
#no_hosts = false
fa61e0
fa61e0
# Default way to to create a PID namespace for the container
fa61e0
# Options are:
fa61e0
# `private` Create private PID Namespace for the container.
fa61e0
# `host`    Share host PID Namespace with the container.
fa61e0
#
fa61e0
#pidns = "private"
fa61e0
fa61e0
# Maximum number of processes allowed in a container.
fa61e0
#
fa61e0
#pids_limit = 2048
fa61e0
fa61e0
# Copy the content from the underlying image into the newly created volume
fa61e0
# when the container is created instead of when it is started. If false,
fa61e0
# the container engine will not copy the content until the container is started.
fa61e0
# Setting it to true may have negative performance implications.
fa61e0
#
fa61e0
#prepare_volume_on_create = false
fa61e0
fa61e0
# Indicates the networking to be used for rootless containers
fa61e0
#
fa61e0
#rootless_networking = "slirp4netns"
fa61e0
fa61e0
# Path to the seccomp.json profile which is used as the default seccomp profile
fa61e0
# for the runtime.
fa61e0
#
fa61e0
#seccomp_profile = "/usr/share/containers/seccomp.json"
fa61e0
fa61e0
# Size of /dev/shm. Specified as <number><unit>.
fa61e0
# Unit is optional, values:
fa61e0
# b (bytes), k (kilobytes), m (megabytes), or g (gigabytes).
fa61e0
# If the unit is omitted, the system uses bytes.
fa61e0
#
fa61e0
#shm_size = "65536k"
fa61e0
fa61e0
# Set timezone in container. Takes IANA timezones as well as "local",
fa61e0
# which sets the timezone in the container to match the host machine.
fa61e0
#
fa61e0
#tz = ""
fa61e0
fa61e0
# Set umask inside the container
fa61e0
#
fa61e0
#umask = "0022"
fa61e0
fa61e0
# Default way to to create a User namespace for the container
fa61e0
# Options are:
fa61e0
# `auto`        Create unique User Namespace for the container.
fa61e0
# `host`    Share host User Namespace with the container.
fa61e0
#
fa61e0
#userns = "host"
fa61e0
fa61e0
# Number of UIDs to allocate for the automatic container creation.
fa61e0
# UIDs are allocated from the "container" UIDs listed in
fa61e0
# /etc/subuid & /etc/subgid
fa61e0
#
fa61e0
#userns_size = 65536
fa61e0
fa61e0
# Default way to to create a UTS namespace for the container
fa61e0
# Options are:
fa61e0
# `private`        Create private UTS Namespace for the container.
fa61e0
# `host`    Share host UTS Namespace with the container.
fa61e0
#
fa61e0
#utsns = "private"
fa61e0
fa61e0
# List of volumes. Specified as
fa61e0
# "<directory-on-host>:<directory-in-container>:<options>", for example:
fa61e0
# "/db:/var/lib/db:ro".
fa61e0
# If it is empty or commented out, no volumes will be added
fa61e0
#
fa61e0
#volumes = []
fa61e0
fa61e0
# The network table contains settings pertaining to the management of
fa61e0
# CNI plugins.
fa61e0
fa61e0
[secrets]
fa61e0
#driver = "file"
fa61e0
fa61e0
[secrets.opts]
fa61e0
#root = "/example/directory"
fa61e0
fa61e0
[network]
fa61e0
fa61e0
# Path to directory where CNI plugin binaries are located.
fa61e0
#
fa61e0
#cni_plugin_dirs = [
fa61e0
#  "/usr/local/libexec/cni",
fa61e0
#  "/usr/libexec/cni",
fa61e0
#  "/usr/local/lib/cni",
fa61e0
#  "/usr/lib/cni",
fa61e0
#  "/opt/cni/bin",
fa61e0
#]
fa61e0
fa61e0
# The network name of the default CNI network to attach pods to.
fa61e0
#
fa61e0
#default_network = "podman"
fa61e0
fa61e0
# The default subnet for the default CNI network given in default_network.
fa61e0
# If a network with that name does not exist, a new network using that name and
fa61e0
# this subnet will be created.
fa61e0
# Must be a valid IPv4 CIDR prefix.
fa61e0
#
fa61e0
#default_subnet = "10.88.0.0/16"
fa61e0
fa61e0
# Path to the directory where CNI configuration files are located.
fa61e0
#
fa61e0
#network_config_dir = "/etc/cni/net.d/"
fa61e0
fa61e0
[engine]
fa61e0
# Index to the active service
fa61e0
#
fa61e0
#active_service = production
fa61e0
fa61e0
# Cgroup management implementation used for the runtime.
fa61e0
# Valid options "systemd" or "cgroupfs"
fa61e0
#
fa61e0
#cgroup_manager = "systemd"
fa61e0
fa61e0
# Environment variables to pass into conmon
fa61e0
#
fa61e0
#conmon_env_vars = [
fa61e0
#  "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
fa61e0
#]
fa61e0
fa61e0
# Paths to look for the conmon container manager binary
fa61e0
#
fa61e0
#conmon_path = [
fa61e0
#  "/usr/libexec/podman/conmon",
fa61e0
#  "/usr/local/libexec/podman/conmon",
fa61e0
#  "/usr/local/lib/podman/conmon",
fa61e0
#  "/usr/bin/conmon",
fa61e0
#  "/usr/sbin/conmon",
fa61e0
#  "/usr/local/bin/conmon",
fa61e0
#  "/usr/local/sbin/conmon"
fa61e0
#]
fa61e0
fa61e0
# Specify the keys sequence used to detach a container.
fa61e0
# Format is a single character [a-Z] or a comma separated sequence of
fa61e0
# `ctrl-<value>`, where `<value>` is one of:
fa61e0
# `a-z`, `@`, `^`, `[`, `\`, `]`, `^` or `_`
fa61e0
#
fa61e0
#detach_keys = "ctrl-p,ctrl-q"
fa61e0
fa61e0
# Determines whether engine will reserve ports on the host when they are
fa61e0
# forwarded to containers. When enabled, when ports are forwarded to containers,
fa61e0
# ports are held open by as long as the container is running, ensuring that
fa61e0
# they cannot be reused by other programs on the host. However, this can cause
fa61e0
# significant memory usage if a container has many ports forwarded to it.
fa61e0
# Disabling this can save memory.
fa61e0
#
fa61e0
#enable_port_reservation = true
fa61e0
fa61e0
# Environment variables to be used when running the container engine (e.g., Podman, Buildah).
fa61e0
# For example "http_proxy=internal.proxy.company.com".
fa61e0
# Note these environment variables will not be used within the container.
fa61e0
# Set the env section under [containers] table, if you want to set environment variables for the container.
fa61e0
#
fa61e0
#env = []
fa61e0
fa61e0
# Selects which logging mechanism to use for container engine events.
fa61e0
# Valid values are `journald`, `file` and `none`.
fa61e0
#
fa61e0
#events_logger = "journald"
fa61e0
events_logger = "file"
fa61e0
fa61e0
# A is a list of directories which are used to search for helper binaries.
fa61e0
#
fa61e0
#helper_binaries_dir = [
fa61e0
#  "/usr/local/libexec/podman",
fa61e0
#  "/usr/local/lib/podman",
fa61e0
#  "/usr/libexec/podman",
fa61e0
#  "/usr/lib/podman",
fa61e0
#]
fa61e0
fa61e0
# Path to OCI hooks directories for automatically executed hooks.
fa61e0
#
fa61e0
#hooks_dir = [
fa61e0
#  "/usr/share/containers/oci/hooks.d",
fa61e0
#]
fa61e0
fa61e0
# Manifest Type (oci, v2s2, or v2s1) to use when pulling, pushing, building
fa61e0
# container images. By default image pulled and pushed match the format of the
fa61e0
# source image. Building/committing defaults to OCI.
fa61e0
#
fa61e0
#image_default_format = ""
fa61e0
fa61e0
# Default transport method for pulling and pushing for images
fa61e0
#
fa61e0
#image_default_transport = "docker://"
fa61e0
fa61e0
# Maximum number of image layers to be copied (pulled/pushed) simultaneously.
fa61e0
# Not setting this field, or setting it to zero, will fall back to containers/image defaults.
fa61e0
#
fa61e0
#image_parallel_copies = 0
fa61e0
fa61e0
# Default command to run the infra container
fa61e0
#
fa61e0
#infra_command = "/pause"
fa61e0
fa61e0
# Infra (pause) container image name for pod infra containers.  When running a
fa61e0
# pod, we start a `pause` process in a container to hold open the namespaces
fa61e0
# associated with the  pod.  This container does nothing other then sleep,
fa61e0
# reserving the pods resources for the lifetime of the pod.
fa61e0
#
fa61e0
#infra_image = "k8s.gcr.io/pause:3.4.1"
fa61e0
infra_image = "registry.access.redhat.com/ubi9/pause"
fa61e0
fa61e0
# Specify the locking mechanism to use; valid values are "shm" and "file".
fa61e0
# Change the default only if you are sure of what you are doing, in general
fa61e0
# "file" is useful only on platforms where cgo is not available for using the
fa61e0
# faster "shm" lock type.  You may need to run "podman system renumber" after
fa61e0
# you change the lock type.
fa61e0
#
fa61e0
#lock_type** = "shm"
fa61e0
fa61e0
# Indicates if Podman is running inside a VM via Podman Machine.
fa61e0
# Podman uses this value to do extra setup around networking from the
fa61e0
# container inside the VM to to host.
fa61e0
#
fa61e0
#machine_enabled = false
fa61e0
fa61e0
# MultiImageArchive - if true, the container engine allows for storing archives
fa61e0
# (e.g., of the docker-archive transport) with multiple images.  By default,
fa61e0
# Podman creates single-image archives.
fa61e0
#
fa61e0
#multi_image_archive = "false"
fa61e0
fa61e0
# Default engine namespace
fa61e0
# If engine is joined to a namespace, it will see only containers and pods
fa61e0
# that were created in the same namespace, and will create new containers and
fa61e0
# pods in that namespace.
fa61e0
# The default namespace is "", which corresponds to no namespace. When no
fa61e0
# namespace is set, all containers and pods are visible.
fa61e0
#
fa61e0
#namespace = ""
fa61e0
fa61e0
# Path to the slirp4netns binary
fa61e0
#
fa61e0
#network_cmd_path = ""
fa61e0
fa61e0
# Default options to pass to the slirp4netns binary.
fa61e0
# For example "allow_host_loopback=true"
fa61e0
#
fa61e0
#network_cmd_options = ["enable_ipv6=true",]
fa61e0
fa61e0
# Whether to use chroot instead of pivot_root in the runtime
fa61e0
#
fa61e0
#no_pivot_root = false
fa61e0
fa61e0
# Number of locks available for containers and pods.
fa61e0
# If this is changed, a lock renumber must be performed (e.g. with the
fa61e0
# 'podman system renumber' command).
fa61e0
#
fa61e0
#num_locks = 2048
fa61e0
fa61e0
# Whether to pull new image before running a container
fa61e0
#
fa61e0
#pull_policy = "missing"
fa61e0
fa61e0
# Indicates whether the application should be running in remote mode. This flag modifies the
fa61e0
# --remote option on container engines. Setting the flag to true will default
fa61e0
# `podman --remote=true` for access to the remote Podman service.
fa61e0
#
fa61e0
#remote = false
fa61e0
fa61e0
# Default OCI runtime
fa61e0
#
fa61e0
#runtime = "crun"
fa61e0
runtime = "crun"
fa61e0
fa61e0
# List of the OCI runtimes that support --format=json.  When json is supported
fa61e0
# engine will use it for reporting nicer errors.
fa61e0
#
fa61e0
#runtime_supports_json = ["crun", "runc", "kata", "runsc", "krun"]
fa61e0
fa61e0
# List of the OCI runtimes that supports running containers with KVM Separation.
fa61e0
#
fa61e0
#runtime_supports_kvm = ["kata", "krun"]
fa61e0
fa61e0
# List of the OCI runtimes that supports running containers without cgroups.
fa61e0
#
fa61e0
#runtime_supports_nocgroups = ["crun", "krun"]
fa61e0
fa61e0
# Default location for storing temporary container image content.  Can be overridden with the TMPDIR environment
fa61e0
# variable.  If you specify "storage", then the location of the
fa61e0
# container/storage tmp directory will be used.
fa61e0
# image_copy_tmp_dir="/var/tmp"
fa61e0
fa61e0
# Number of seconds to wait without a connection
fa61e0
# before the `podman system service` times out and exits
fa61e0
#
fa61e0
#service_timeout = 5
fa61e0
fa61e0
# Directory for persistent engine files (database, etc)
fa61e0
# By default, this will be configured relative to where the containers/storage
fa61e0
# stores containers
fa61e0
# Uncomment to change location from this default
fa61e0
#
fa61e0
#static_dir = "/var/lib/containers/storage/libpod"
fa61e0
fa61e0
# Number of seconds to wait for container to exit before sending kill signal.
fa61e0
#
fa61e0
#stop_timeout = 10
fa61e0
fa61e0
# map of service destinations
fa61e0
#
fa61e0
#[service_destinations]
fa61e0
#  [service_destinations.production]
fa61e0
#     URI to access the Podman service
fa61e0
#     Examples:
fa61e0
#       rootless "unix://run/user/$UID/podman/podman.sock" (Default)
fa61e0
#       rootfull "unix://run/podman/podman.sock (Default)
fa61e0
#       remote rootless ssh://engineering.lab.company.com/run/user/1000/podman/podman.sock
fa61e0
#       remote rootfull ssh://root@10.10.1.136:22/run/podman/podman.sock
fa61e0
#
fa61e0
#    uri = "ssh://user@production.example.com/run/user/1001/podman/podman.sock"
fa61e0
#    Path to file containing ssh identity key
fa61e0
#    identity = "~/.ssh/id_rsa"
fa61e0
fa61e0
# Directory for temporary files. Must be tmpfs (wiped after reboot)
fa61e0
#
fa61e0
#tmp_dir = "/run/libpod"
fa61e0
fa61e0
# Directory for libpod named volumes.
fa61e0
# By default, this will be configured relative to where containers/storage
fa61e0
# stores containers.
fa61e0
# Uncomment to change location from this default.
fa61e0
#
fa61e0
#volume_path = "/var/lib/containers/storage/volumes"
fa61e0
fa61e0
# Paths to look for a valid OCI runtime (crun, runc, kata, runsc, krun, etc)
fa61e0
[engine.runtimes]
fa61e0
#crun = [
fa61e0
#  "/usr/bin/crun",
fa61e0
#  "/usr/sbin/crun",
fa61e0
#  "/usr/local/bin/crun",
fa61e0
#  "/usr/local/sbin/crun",
fa61e0
#  "/sbin/crun",
fa61e0
#  "/bin/crun",
fa61e0
#  "/run/current-system/sw/bin/crun",
fa61e0
#]
fa61e0
fa61e0
#kata = [
fa61e0
#  "/usr/bin/kata-runtime",
fa61e0
#  "/usr/sbin/kata-runtime",
fa61e0
#  "/usr/local/bin/kata-runtime",
fa61e0
#  "/usr/local/sbin/kata-runtime",
fa61e0
#  "/sbin/kata-runtime",
fa61e0
#  "/bin/kata-runtime",
fa61e0
#  "/usr/bin/kata-qemu",
fa61e0
#  "/usr/bin/kata-fc",
fa61e0
#]
fa61e0
fa61e0
#runc = [
fa61e0
#  "/usr/bin/runc",
fa61e0
#  "/usr/sbin/runc",
fa61e0
#  "/usr/local/bin/runc",
fa61e0
#  "/usr/local/sbin/runc",
fa61e0
#  "/sbin/runc",
fa61e0
#  "/bin/runc",
fa61e0
#  "/usr/lib/cri-o-runc/sbin/runc",
fa61e0
#]
fa61e0
fa61e0
#runsc = [
fa61e0
#  "/usr/bin/runsc",
fa61e0
#  "/usr/sbin/runsc",
fa61e0
#  "/usr/local/bin/runsc",
fa61e0
#  "/usr/local/sbin/runsc",
fa61e0
#  "/bin/runsc",
fa61e0
#  "/sbin/runsc",
fa61e0
#  "/run/current-system/sw/bin/runsc",
fa61e0
#]
fa61e0
fa61e0
#krun = [
fa61e0
#  "/usr/bin/krun",
fa61e0
#  "/usr/local/bin/krun",
fa61e0
#]
fa61e0
fa61e0
[engine.volume_plugins]
fa61e0
#testplugin = "/run/podman/plugins/test.sock"
fa61e0
fa61e0
[machine]
fa61e0
# Number of CPU's a machine is created with.
fa61e0
#
fa61e0
#cpus=1
fa61e0
fa61e0
# The size of the disk in GB created when init-ing a podman-machine VM.
fa61e0
#
fa61e0
#disk_size=10
fa61e0
fa61e0
# The image used when creating a podman-machine VM.
fa61e0
#
fa61e0
#image = "testing"
fa61e0
fa61e0
# Memory in MB a machine is created with.
fa61e0
#
fa61e0
#memory=2048
fa61e0
fa61e0
# The [machine] table MUST be the last entry in this file.
fa61e0
# (Unless another table is added)
fa61e0
# TOML does not provide a way to end a table other than a further table being
fa61e0
# defined, so every key hereafter will be part of [machine] and not the
fa61e0
# main config.