Skip to content

Latest commit

 

History

History
49 lines (31 loc) · 1.21 KB

config-linux.md

File metadata and controls

49 lines (31 loc) · 1.21 KB

Linux

Linux Namespaces

    "namespaces": [
        "process",
        "network",
        "mount",
        "ipc",
        "uts"
    ],

Namespaces for the container are specified as an array of strings under the namespaces key. The list of constants that can be used is portable across operating systems. Here is a table mapping these names to native OS equivalent.

For Linux the mapping is

  • process -> pid: the process ID number space is specific to the container, meaning that processes in different PID namespaces can have the same PID

  • network -> network: the container will have an isolated network stack

  • mount -> mnt container can only access mounts local to itself

  • ipc -> ipc processes in the container can only communicate with other processes inside same container

  • uts -> uts Hostname and NIS domain name are specific to the container

Linux Control groups

Linux Seccomp

Linux Process Capabilities

   "capabilities": [
        "AUDIT_WRITE",
        "KILL",
        "NET_BIND_SERVICE"
    ],

capabilities is an array of Linux process capabilities. Valid values are the string after CAP_ for capabilities defined in http://linux.die.net/man/7/capabilities

SELinux

Apparmor