Control Linux Containers via Salt
lxc package for distribution
lxc >= 1.0 (even beta alpha) is required
Add a veth to a container. Note : this function doesn't update the container config, just add the interface at runtime
Name of the container
Name of the interface in the container
Name of the bridge to attach the interface to (facultative)
CLI Examples:
salt '*' lxc.add_veth container_name eth1 br1
salt '*' lxc.add_veth container_name eth1
New in version 2015.5.0.
Apply a network profile to a container
profile name or default values (dict)
values to override in defaults (dict) indexed by nic card names
path to the container parent
New in version 2015.8.0.
CLI Examples:
salt 'minion' lxc.apply_network_profile web1 centos
salt 'minion' lxc.apply_network_profile web1 centos \
nic_opts="{'eth0': {'mac': 'xx:xx:xx:xx:xx:xx'}}"
salt 'minion' lxc.apply_network_profile web1 \
"{'eth0': {'mac': 'xx:xx:xx:xx:xx:yy'}}"
nic_opts="{'eth0': {'mac': 'xx:xx:xx:xx:xx:xx'}}"
The special case to disable use of ethernet nics:
salt 'minion' lxc.apply_network_profile web1 centos \
"{eth0: {disable: true}}"
Return True if the named container can be attached to via the lxc-attach command
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
CLI Example:
salt 'minion' lxc.attachable ubuntu
Install and configure salt in a container.
Minion configuration options. By default, the master
option is set
to the target host's master.
Request a pre-approval of the generated minion key. Requires
that the salt-master be configured to either auto-accept all keys or
expect a signing request from the target host. Default: True
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
Explicit public key to pressed the minion with (optional). This can be either a filepath or a string representing the key
Explicit private key to pressed the minion with (optional). This can be either a filepath or a string representing the key
Delay in seconds between end of container creation and bootstrapping. Useful when waiting for container to obtain a DHCP lease.
New in version 2015.5.0.
url, content or filepath to the salt bootstrap script
salt bootstrap script arguments
shell to execute the script into
Whether to attempt a full installation of salt-minion if needed.
Force installation even if salt-minion is detected, this is the way to run vendor bootstrap scripts even if a salt minion is already present in the container
Run the script even if the container seems seeded
CLI Examples:
salt 'minion' lxc.bootstrap container_name [config=config_data] \
[approve_key=(True|False)] [install=(True|False)]
Create a new container as a clone of another container
Name of the container
Name of the original container to be cloned
Profile to use in container cloning (see
lxc.get_container_profile
). Values in a profile will be
overridden by the Container Cloning Arguments listed below.
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
Container Cloning Arguments
Use Copy On Write snapshots (LVM)
Size of the volume to create. Only applicable if backing=lvm
.
The type of storage to use. Set to lvm
to use an LVM group.
Defaults to filesystem within /var/lib/lxc.
Network profile to use for container
New in version 2015.8.0.
give extra opts overriding network profile values
New in version 2015.8.0.
CLI Examples:
salt '*' lxc.clone myclone orig=orig_container
salt '*' lxc.clone myclone orig=orig_container snapshot=True
Thin wrapper to lxc.init to be used from the saltcloud lxc driver
Name of the container may be None and then guessed from saltcloud mapping
saltcloud mapping defaults for the vm
CLI Example:
salt '*' lxc.cloud_init foo
Interface between salt.cloud.lxc driver and lxc.init
vm_
is a mapping of vm opts in the salt.cloud format
as documented for the lxc driver.
This can be used either:
from the salt cloud driver
because you find the argument to give easier here than using directly lxc.init
Warning
BE REALLY CAREFUL CHANGING DEFAULTS !!! IT'S A RETRO COMPATIBLE INTERFACE WITH THE SALT CLOUD DRIVER (ask kiorky).
name of the lxc container to create
public key to preseed the minion with. Can be the keycontent or a filepath
private key to preseed the minion with. Can be the keycontent or a filepath
path to the container parent directory (default: /var/lib/lxc)
New in version 2015.8.0.
profile selection
network profile selection
per interface settings compatibles with network profile (ipv4/ipv6/link/gateway/mac/netmask)
eg:
- {'eth0': {'mac': '00:16:3e:01:29:40',
'gateway': None, (default)
'link': 'br0', (default)
'gateway': None, (default)
'netmask': '', (default)
'ip': '22.1.4.25'}}
given to lxc.bootstrap (see relative doc)
given to lxc.bootstrap (see relative doc)
any extra argument for the salt minion config
list of DNS servers to set inside the container
do not set the dns servers, let them be set by the dhcp.
autostart the container at boot time
administrative password for the container
delay before launching bootstrap script at Container init
Warning
Legacy but still supported options:
which container we use as a template when running lxc.clone
which template do we use when we are using lxc.create. This is the default mode unless you specify something in from_container
which backing store to use. Values can be: overlayfs, dir(default), lvm, zfs, brtfs
When using a blockdevice level backing store, which filesystem to use on
When using a blockdevice level backing store, which size for the filesystem to use on
Use snapshot when cloning the container source
if using LVM: vgname
if using LVM: lvname
if using LVM: thinpool
ip for the primary nic
mac address for the primary nic
netmask for the primary nic (24)
= vm_.get('netmask', '24')
bridge for the primary nic (lxcbr0)
network gateway for the container
additional ips which will be wired on the main bridge (br0) which is connected to internet. Be aware that you may use manual virtual mac addresses providen by you provider (online, ovh, etc). This is a list of mappings {ip: '', mac: '', netmask:''} Set gateway to None and an interface with a gateway to escape from another interface that eth0. eg:
- {'mac': '00:16:3e:01:29:40',
'gateway': None, (default)
'link': 'br0', (default)
'netmask': '', (default)
'ip': '22.1.4.25'}
administrative users for the container default: [root] and [root, ubuntu] on ubuntu
name of the first interface, you should really not override this
CLI Example:
salt '*' lxc.cloud_init_interface foo
Changed in version 2015.8.0: Function renamed from lxc.cp
to lxc.copy_to
for consistency
with other container types. lxc.cp
will continue to work, however.
For versions 2015.2.x and earlier, use lxc.cp
.
Copy a file or directory from the host into a container
Container name
File to be copied to the container
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
Destination on the container. Must be an absolute path.
Changed in version 2015.5.0: If the destination is a directory, the file will be copied into that directory.
Unless this option is set to True
, then if a file exists at the
location specified by the dest
argument, an error will be raised.
New in version 2015.8.0.
makedirs : False
Create the parent directory on the container if it does not already exist.
New in version 2015.5.0.
CLI Example:
salt 'minion' lxc.copy_to /tmp/foo /root/foo
salt 'minion' lxc.cp /tmp/foo /root/foo
This function is an alias of copy_to
.
Changed in version 2015.8.0: Function renamed from
lxc.cp
tolxc.copy_to
for consistency with other container types.lxc.cp
will continue to work, however. For versions 2015.2.x and earlier, uselxc.cp
.Copy a file or directory from the host into a container
- name
Container name
- source
File to be copied to the container
- path
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
- dest
Destination on the container. Must be an absolute path.
Changed in version 2015.5.0: If the destination is a directory, the file will be copied into that directory.
- overwriteFalse
Unless this option is set to
True
, then if a file exists at the location specified by thedest
argument, an error will be raised.New in version 2015.8.0.
makedirs : False
Create the parent directory on the container if it does not already exist.
New in version 2015.5.0.
CLI Example:
salt 'minion' lxc.copy_to /tmp/foo /root/foo salt 'minion' lxc.cp /tmp/foo /root/foo
Create a new container.
Name of the container
The config file to use for the container. Defaults to system-wide config (usually in /etc/lxc/lxc.conf).
Profile to use in container creation (see
lxc.get_container_profile
). Values in a profile will be
overridden by the Container Creation Arguments listed below.
Network profile to use for container
New in version 2015.5.0.
Container Creation Arguments
The template to use. For example, ubuntu
or fedora
.
For a full list of available templates, check out
the lxc.templates
function.
Conflicts with the image
argument.
Note
The download
template requires the following three parameters
to be defined in options
:
dist - The name of the distribution
release - Release name/version
arch - Architecture of the container
The available images can be listed using the lxc.images
function.
Template-specific options to pass to the lxc-create command. These correspond to the long options (ones beginning with two dashes) that the template script accepts. For example:
options='{"dist": "centos", "release": "6", "arch": "amd64"}'
For available template options, refer to the lxc template scripts
which are usually located under /usr/share/lxc/templates
,
or run lxc-create -t <template> -h
.
A tar archive to use as the rootfs for the container. Conflicts with
the template
argument.
The type of storage to use. Set to lvm
to use an LVM group.
Defaults to filesystem within /var/lib/lxc.
Filesystem type to use on LVM logical volume
Size of the volume to create. Only applicable if backing=lvm
.
Name of the LVM volume group in which to create the volume for this
container. Only applicable if backing=lvm
.
Name of the LVM logical volume in which to create the volume for this
container. Only applicable if backing=lvm
.
Name of a pool volume that will be used for thin-provisioning this
container. Only applicable if backing=lvm
.
give extra opts overriding network profile values
parent path for the container creation (default: /var/lib/lxc)
Name of the ZFS root in which to create the volume for this container.
Only applicable if backing=zfs
. (default: tank/lxc)
New in version 2015.8.0.
Destroy the named container.
Warning
Destroys all data associated with the container.
path to the container parent directory (default: /var/lib/lxc)
New in version 2015.8.0.
If True
, the container will be destroyed even if it is
running/frozen.
Changed in version 2015.5.0: Default value changed to False
. This more closely matches the
behavior of lxc-destroy(1)
, and also makes it less likely that
an accidental command will destroy a running container that was
being used for important things.
CLI Examples:
salt '*' lxc.destroy foo
salt '*' lxc.destroy foo stop=True
Edit an LXC configuration file. If a setting is already present inside the file, its value will be replaced. If it does not exist, it will be appended to the end of the file. Comments and blank lines will be kept in-tact if they already exist in the file.
Set to simple if you need backward compatibility (multiple items for a simple key is not supported)
return only the edited configuration without applying it to the underlying lxc configuration file
List of dict containning lxc configuration items For network configuration, you also need to add the device it belongs to, otherwise it will default to eth0. Also, any change to a network parameter will result in the whole network reconfiguration to avoid mismatchs, be aware of that !
After the file is edited, its contents will be returned. By default, it
will be returned in simple
format, meaning an unordered dict (which
may not represent the actual file order). Passing in an out_format
of
commented
will return a data structure which accurately represents the
order and content of the file.
CLI Example:
salt 'minion' lxc.edit_conf /etc/lxc/mycontainer.conf \
out_format=commented lxc.network.type=veth
salt 'minion' lxc.edit_conf /etc/lxc/mycontainer.conf \
out_format=commented \
lxc_config="[{'lxc.network.name': 'eth0', \
'lxc.network.ipv4': '1.2.3.4'},
{'lxc.network.name': 'eth2', \
'lxc.network.ipv4': '1.2.3.5',\
'lxc.network.gateway': '1.2.3.1'}]"
Returns whether the named container exists.
path to the container parent directory (default: /var/lib/lxc)
New in version 2015.8.0.
CLI Example:
salt '*' lxc.exists name
Freeze the named container
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
If True
and the container is stopped, the container will be started
before attempting to freeze.
New in version 2015.5.0.
run the command through VT
New in version 2015.8.0.
CLI Example:
salt '*' lxc.freeze name
New in version 2015.5.0.
Gather a pre-configured set of container configuration parameters. If no arguments are passed, an empty profile is returned.
Profiles can be defined in the minion or master config files, or in pillar
or grains, and are loaded using config.get
. The key under which LXC profiles must be
configured is lxc.container_profile.profile_name
. An example container
profile would be as follows:
lxc.container_profile:
ubuntu:
template: ubuntu
backing: lvm
vgname: lxc
size: 1G
Parameters set in a profile can be overridden by passing additional
container creation arguments (such as the ones passed to lxc.create
) to this function.
A profile can be defined either as the name of the profile, or a dictionary of variable names and values. See the LXC Tutorial for more information on how to use LXC profiles.
CLI Example:
salt-call lxc.get_container_profile centos
salt-call lxc.get_container_profile ubuntu template=ubuntu backing=overlayfs
New in version 2015.5.0.
Gather a pre-configured set of network configuration parameters. If no arguments are passed, the following default profile is returned:
{'eth0': {'link': 'br0', 'type': 'veth', 'flags': 'up'}}
Profiles can be defined in the minion or master config files, or in pillar
or grains, and are loaded using config.get
. The key under which LXC profiles must be
configured is lxc.network_profile
. An example network profile would be
as follows:
lxc.network_profile.centos:
eth0:
link: br0
type: veth
flags: up
To disable networking entirely:
lxc.network_profile.centos:
eth0:
disable: true
Parameters set in a profile can be overridden by passing additional arguments to this function.
A profile can be passed either as the name of the profile, or a dictionary of variable names and values. See the LXC Tutorial for more information on how to use network profiles.
Warning
The ipv4
, ipv6
, gateway
, and link
(bridge) settings in
network profiles will only work if the container doesn't redefine the
network configuration (for example in
/etc/sysconfig/network-scripts/ifcfg-<interface_name>
on
RHEL/CentOS, or /etc/network/interfaces
on Debian/Ubuntu/etc.)
CLI Example:
salt-call lxc.get_network_profile default
Returns the value of a cgroup parameter for a container
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
CLI Example:
salt '*' lxc.get_parameter container_name memory.limit_in_bytes
Returns a container pid. Throw an exception if the container isn't running.
CLI Example:
salt '*' lxc.get_pid name
Get the configured lxc root for containers
New in version 2015.8.0.
CLI Example:
salt '*' lxc.get_root_path
New in version 2015.5.0.
List the available images for LXC's download
template.
Filter results to a single Linux distribution
CLI Examples:
salt myminion lxc.images
salt myminion lxc.images dist=centos
Returns information about a container
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
CLI Example:
salt '*' lxc.info name
Initialize a new container.
This is a partial idempotent function as if it is already provisioned, we will reset a bit the lxc configuration file but much of the hard work will be escaped as markers will prevent re-execution of harmful tasks.
Name of the container
A tar archive to use as the rootfs for the container. Conflicts with
the template
argument.
Select a random number of cpu cores and assign it to the cpuset, if the cpuset option is set then this option will be ignored
Explicitly define the cpus this container will be bound to
cgroups cpu shares
autostart container on reboot
cgroups memory limit, in MB
Changed in version 2015.5.0: If no value is passed, no limit is set. In earlier Salt versions,
not passing this value causes a 1024MB memory limit to be set, and
it was necessary to pass memory=0
to set no limit.
the ipv4 gateway to use the default does nothing more than lxcutils does
the bridge to use the default does nothing more than lxcutils does
Network profile to use for the container
New in version 2015.5.0.
Extra options for network interfaces, will override
{"eth0": {"hwaddr": "aa:bb:cc:dd:ee:ff", "ipv4": "10.1.1.1", "ipv6": "2001:db8::ff00:42:8329"}}
or
{"eth0": {"hwaddr": "aa:bb:cc:dd:ee:ff", "ipv4": "10.1.1.1/24", "ipv6": "2001:db8::ff00:42:8329"}}
Users for which the password defined in the password
param should
be set. Can be passed as a comma separated list or a python list.
Defaults to just the root
user.
Set the initial password for the users defined in the users
parameter
Set to True
to denote a password hash instead of a plaintext
password
New in version 2015.5.0.
A LXC profile (defined in config or pillar). This can be either a real profile mapping or a string to retrieve it in configuration
Start the newly-created container
list of dns servers to set in the container, default [] (no setting)
Seed the container with the minion config. Default: True
If salt-minion is not already installed, install it. Default: True
Optional config parameters. By default, the id is set to the name of the container.
salt master (default to minion's master)
salt master port (default to minion's master port)
Explicit public key to preseed the minion with (optional). This can be either a filepath or a string representing the key
Explicit private key to preseed the minion with (optional). This can be either a filepath or a string representing the key
If explicit preseeding is not used;
Attempt to request key approval from the master. Default: True
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
Original from which to use a clone operation to create the container.
Default: None
Delay in seconds between end of container creation and bootstrapping. Useful when waiting for container to obtain a DHCP lease.
New in version 2015.5.0.
See lxc.bootstrap
See lxc.bootstrap
See lxc.bootstrap
Force installation even if salt-minion is detected, this is the way to run vendor bootstrap scripts even if a salt minion is already present in the container
Run the script even if the container seems seeded
CLI Example:
salt 'minion' lxc.init name [cpuset=cgroups_cpuset] \
[cpushare=cgroups_cpushare] [memory=cgroups_memory] \
[nic=nic_profile] [profile=lxc_profile] \
[nic_opts=nic_opts] [start=(True|False)] \
[seed=(True|False)] [install=(True|False)] \
[config=minion_config] [approve_key=(True|False) \
[clone_from=original] [autostart=True] \
[priv_key=/path_or_content] [pub_key=/path_or_content] \
[bridge=lxcbr0] [gateway=10.0.3.1] \
[dnsservers[dns1,dns2]] \
[users=[foo]] [password='secret'] \
[password_encrypted=(True|False)]
List containers classified by state
Also get per-container specific info. This will change the return data.
Instead of returning a list of containers, a dictionary of containers
and each container's output from lxc.info
.
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
Return output matching a specific state (frozen, running, or stopped).
New in version 2015.5.0.
CLI Examples:
salt '*' lxc.list
salt '*' lxc.list extra=True
salt '*' lxc.list limit=running
Return a list of the containers available on the minion
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
If True
, return only active (i.e. running) containers
New in version 2015.5.0.
CLI Example:
salt '*' lxc.ls
salt '*' lxc.ls active=True
Read in an LXC configuration file. By default returns a simple, unsorted dict, but can also return a more detailed structure including blank lines and comments.
set to 'simple' if you need the old and unsupported behavior. This won't support the multiple lxc values (eg: multiple network nics)
CLI Examples:
salt 'minion' lxc.read_conf /etc/lxc/mycontainer.conf
salt 'minion' lxc.read_conf /etc/lxc/mycontainer.conf out_format=commented
Reboot a container.
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
CLI Examples:
salt 'minion' lxc.reboot myvm
Reconfigure a container.
This only applies to a few property
Name of the container.
utsname of the container.
New in version 2016.3.0.
rootfs of the container.
New in version 2016.3.0.
Select a random number of cpu cores and assign it to the cpuset, if the cpuset option is set then this option will be ignored
Explicitly define the cpus this container will be bound to
cgroups cpu shares.
autostart container on reboot
cgroups memory limit, in MB. (0 for nolimit, None for old default 1024MB)
the ipv4 gateway to use the default does nothing more than lxcutils does
the bridge to use the default does nothing more than lxcutils does
Network interfaces profile (defined in config or pillar).
Extra options for network interfaces, will override
{"eth0": {"mac": "aa:bb:cc:dd:ee:ff", "ipv4": "10.1.1.1", "ipv6": "2001:db8::ff00:42:8329"}}
or
{"eth0": {"mac": "aa:bb:cc:dd:ee:ff", "ipv4": "10.1.1.1/24", "ipv6": "2001:db8::ff00:42:8329"}}
path to the container parent
New in version 2015.8.0.
CLI Example:
salt-call -lall mc_lxc_fork.reconfigure foobar nic_opts="{'eth1': {'mac': '00:16:3e:dd:ee:44'}}" memory=4
This function is an alias of destroy
.
Destroy the named container.
Warning
Destroys all data associated with the container.
- path
path to the container parent directory (default: /var/lib/lxc)
New in version 2015.8.0.
- stopFalse
If
True
, the container will be destroyed even if it is running/frozen.Changed in version 2015.5.0: Default value changed to
False
. This more closely matches the behavior oflxc-destroy(1)
, and also makes it less likely that an accidental command will destroy a running container that was being used for important things.CLI Examples:
salt '*' lxc.destroy foo salt '*' lxc.destroy foo stop=True
New in version 2015.5.0.
Restart the named container. If the container was not running, the container will merely be started.
The name of the container
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
path to a lxc config file config file will be guessed from container name otherwise
New in version 2015.8.0.
If True
, the container will be force-stopped instead of gracefully
shut down
CLI Example:
salt myminion lxc.restart name
New in version 2015.5.0.
Run cmd.retcode
within a container
Warning
Many shell builtins do not work, failing with stderr similar to the following:
lxc_container: No such file or directory - failed to exec 'command'
The same error will be displayed in stderr if the command being run
does not exist. If the retcode is nonzero and not what was expected,
try using lxc.run_stderr
or lxc.run_all
.
Name of the container in which to run the command
Command to run
If the container is not running, don't start it
After running the command, return the container to its previous state
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
Standard input to be used for the command
Level at which to log the output from the command. Set to quiet
to
suppress logging.
Use SaltStack's utils.vt to stream output to console
output=all
.
A list of env vars to preserve. May be passed as commma-delimited list.
if the container is not running, try to run the command using chroot default: false
CLI Example:
salt myminion lxc.retcode mycontainer 'ip addr show'
New in version 2015.8.0.
Run cmd.run
within a container
Warning
Many shell builtins do not work, failing with stderr similar to the following:
lxc_container: No such file or directory - failed to exec 'command'
The same error will be displayed in stderr if the command being run
does not exist. If no output is returned using this function, try using
lxc.run_stderr
or
lxc.run_all
.
Name of the container in which to run the command
Command to run
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
If the container is not running, don't start it
After running the command, return the container to its previous state
Standard input to be used for the command
Level at which to log the output from the command. Set to quiet
to
suppress logging.
Use SaltStack's utils.vt to stream output to console. Assumes
output=all
.
if the container is not running, try to run the command using chroot default: false
A list of env vars to preserve. May be passed as commma-delimited list.
CLI Example:
salt myminion lxc.run mycontainer 'ip addr show'
New in version 2015.5.0.
Run cmd.run_all
within a container
Note
While the command is run within the container, it is initiated from the host. Therefore, the PID in the return dict is from the host, not from the container.
Warning
Many shell builtins do not work, failing with stderr similar to the following:
lxc_container: No such file or directory - failed to exec 'command'
The same error will be displayed in stderr if the command being run does not exist.
Name of the container in which to run the command
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
Command to run
If the container is not running, don't start it
After running the command, return the container to its previous state
Standard input to be used for the command
Level at which to log the output from the command. Set to quiet
to
suppress logging.
Use SaltStack's utils.vt to stream output to console
output=all
.
A list of env vars to preserve. May be passed as commma-delimited list.
if the container is not running, try to run the command using chroot default: false
CLI Example:
salt myminion lxc.run_all mycontainer 'ip addr show'
New in version 2015.5.0.
Run cmd.run_stderr
within a container
Warning
Many shell builtins do not work, failing with stderr similar to the following:
lxc_container: No such file or directory - failed to exec 'command'
The same error will be displayed if the command being run does not exist.
Name of the container in which to run the command
Command to run
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
If the container is not running, don't start it
After running the command, return the container to its previous state
Standard input to be used for the command
Level at which to log the output from the command. Set to quiet
to
suppress logging.
Use SaltStack's utils.vt to stream output to console
output=all
.
A list of env vars to preserve. May be passed as commma-delimited list.
if the container is not running, try to run the command using chroot default: false
CLI Example:
salt myminion lxc.run_stderr mycontainer 'ip addr show'
New in version 2015.5.0.
Run cmd.run_stdout
within a container
Warning
Many shell builtins do not work, failing with stderr similar to the following:
lxc_container: No such file or directory - failed to exec 'command'
The same error will be displayed in stderr if the command being run
does not exist. If no output is returned using this function, try using
lxc.run_stderr
or
lxc.run_all
.
Name of the container in which to run the command
Command to run
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
If the container is not running, don't start it
After running the command, return the container to its previous state
Standard input to be used for the command
Level at which to log the output from the command. Set to quiet
to
suppress logging.
Use SaltStack's utils.vt to stream output to console
output=all
.
A list of env vars to preserve. May be passed as commma-delimited list.
if the container is not running, try to run the command using chroot default: false
CLI Example:
salt myminion lxc.run_stdout mycontainer 'ip addr show'
Determine if systemD is running
path to the container parent
New in version 2015.8.0.
CLI Example:
salt '*' lxc.running_systemd ubuntu
Search the first bridge which is potentially available as LXC bridge
CLI Example:
salt '*' lxc.search_lxc_bridge
Search which bridges are potentially available as LXC bridges
CLI Example:
salt '*' lxc.search_lxc_bridges
Changed in version 2015.5.0: The dnsservers
and searchdomains
parameters can now be passed
as a comma-separated list.
Update /etc/resolv.confo
path
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
CLI Example:
salt myminion lxc.set_dns ubuntu "['8.8.8.8', '4.4.4.4']"
Set the value of a cgroup parameter for a container.
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
CLI Example:
salt '*' lxc.set_parameter name parameter value
This function is an alias of set_password
.
Changed in version 2015.5.0: Function renamed from
set_pass
toset_password
. Additionally, this function now supports (and defaults to using) a password hash instead of a plaintext password.Set the password of one or more system users inside containers
- users
Comma-separated list (or python list) of users to change password
- password
Password to set for the specified user(s)
- encryptedTrue
If true,
password
must be a password hash. Set toFalse
to set a plaintext password (not recommended).New in version 2015.5.0.
- path
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
CLI Example:
salt '*' lxc.set_pass container-name root '$6$uJ2uAyLU$KoI67t8As/0fXtJOPcHKGXmUpcoYUcVR2K6x93walnShTCQvjRwq25yIkiCBOqgbfdKQSFnAo28/ek6716vEV1' salt '*' lxc.set_pass container-name root foo encrypted=False
Changed in version 2015.5.0: Function renamed from set_pass
to set_password
. Additionally,
this function now supports (and defaults to using) a password hash
instead of a plaintext password.
Set the password of one or more system users inside containers
Comma-separated list (or python list) of users to change password
Password to set for the specified user(s)
If true, password
must be a password hash. Set to False
to set
a plaintext password (not recommended).
New in version 2015.5.0.
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
CLI Example:
salt '*' lxc.set_pass container-name root '$6$uJ2uAyLU$KoI67t8As/0fXtJOPcHKGXmUpcoYUcVR2K6x93walnShTCQvjRwq25yIkiCBOqgbfdKQSFnAo28/ek6716vEV1'
salt '*' lxc.set_pass container-name root foo encrypted=False
Start the named container
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
path to a lxc config file config file will be guessed from container name otherwise
New in version 2015.8.0.
run the command through VT
New in version 2015.8.0.
CLI Example:
salt myminion lxc.start name
Returns the state of a container.
path to the container parent directory (default: /var/lib/lxc)
New in version 2015.8.0.
CLI Example:
salt '*' lxc.state name
Stop the named container
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
Do not wait for the container to stop, kill all tasks in the container. Older LXC versions will stop containers like this irrespective of this argument.
Changed in version 2015.5.0: Default value changed to False
run the command through VT
New in version 2015.8.0.
CLI Example:
salt myminion lxc.stop name
Get the operational state of a systemd based container
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
CLI Example:
salt myminion lxc.systemd_running_state ubuntu
New in version 2015.5.0.
List the available LXC template scripts installed on the minion
CLI Examples:
salt myminion lxc.templates
Test if a non systemd container is fully started For now, it consists only to test if the container is attachable
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
CLI Example:
salt myminion lxc.test_bare_started_state ubuntu
Test if a systemd container is fully started
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
CLI Example:
salt myminion lxc.test_sd_started_state ubuntu
Unfreeze the named container.
path to the container parent directory default: /var/lib/lxc (system)
New in version 2015.8.0.
run the command through VT
New in version 2015.8.0.
CLI Example:
salt '*' lxc.unfreeze name
Edit LXC configuration options
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
CLI Example:
salt myminion lxc.update_lxc_conf ubuntu \
lxc_conf="[{'network.ipv4.ip':'10.0.3.5'}]" \
lxc_conf_unset="['lxc.utsname']"
Return the actual lxc client version
New in version 2015.8.0.
CLI Example:
salt '*' lxc.version
Check that the system has fully inited
This is actually very important for systemD based containers
see https://github.com/saltstack/salt/issues/23847
path to the container parent default: /var/lib/lxc (system default)
New in version 2015.8.0.
CLI Example:
salt myminion lxc.wait_started ubuntu
Write out an LXC configuration file
This is normally only used internally. The format of the data structure
must match that which is returned from lxc.read_conf()
, with
out_format
set to commented
.
An example might look like:
[
{'lxc.utsname': '$CONTAINER_NAME'},
'# This is a commented line\n',
'\n',
{'lxc.mount': '$CONTAINER_FSTAB'},
{'lxc.rootfs': {'comment': 'This is another test',
'value': 'This is another test'}},
'\n',
{'lxc.network.type': 'veth'},
{'lxc.network.flags': 'up'},
{'lxc.network.link': 'br0'},
{'lxc.network.mac': '$CONTAINER_MACADDR'},
{'lxc.network.ipv4': '$CONTAINER_IPADDR'},
{'lxc.network.name': '$CONTAINER_DEVICENAME'},
]
CLI Example:
salt 'minion' lxc.write_conf /etc/lxc/mycontainer.conf \
out_format=commented