Search results for query: lxc.mount.entry

  1. Impact

    Can't create a container template from a container with mount points

    The lxc.mount.entry documentation about this is a bit sparse but here. There's some more here and here. The mp documntation is here.
  2. D

    Can't create a container template from a container with mount points

    Well, I got it to work again. Based on another post, I removed the leading slashes from the container mount points. From lxc.mount.entry: /mnt/pve/Projects /mnt/projects none bind,rw 0 0 lxc.mount.entry: /mnt/pve/Projects/LinuxTools /mnt/linuxTools none bind,rw 0 0 To lxc.mount.entry...
  3. D

    Can't create a container template from a container with mount points

    Oops. I spoke too soon. Using lxc.mount.entry allowed me to convert the container to a template. Unfortunately, creating a new container from that template results in a container without the mount points. Drat. That's odd. The two lxc.mount.entry lines _are_ in the config file for the new...
  4. D

    Can't create a container template from a container with mount points

    I had to do a little research to find out what the lxc.mount.entry lines are. That works as workaround. I'll see if I can submit a bug report. Thanks very much
  5. Impact

    Can't create a container template from a container with mount points

    ...make it work is to use the same workaround people use to still be able to snapshot CTs with bind mounts For example you can replace mp0 and mp1 with this lxc.mount.entry: /mnt/pve/Projects /mnt/projects none bind,rw 0 0 lxc.mount.entry: /mnt/pve/Projects/LinuxTools /mnt/linuxTools none...
  6. B

    Just another GPU passthrough thread: iGPU for one LXC + dGPU for another (or split to even more)?

    ...swap: 4096 unprivileged: 1 lxc.cgroup2.devices.allow: c 226:0 rwm lxc.cgroup2.devices.allow: c 226:128 rwm lxc.mount.entry: /dev/dri/renderD128 dev/dri/renderD128 none bind,optional,create=file lxc.idmap: u 0 100000 65536 lxc.idmap: g 0 100000 44 lxc.idmap: g 44 44 1 lxc.idmap: g 45 100045 62...
  7. A

    Pass USB modem to LXC

    ...(Mass Storage Mode) root@pve:~# ls -l /dev/bus/usb/001/005 crw-rw-r-- 1 root root 189, 4 Jun 10 19:04 /dev/bus/usb/001/005 I add lxc.mount.entry: /dev/bus/usb/001/005 /dev/ttyUSB0 none bind,optional,create=file to /etc/pve/lxc/102.conf in result I get the following LXC lines there...
  8. A

    service 'ct:4090' in error state, must be disabled and fixed first - How do I disable LXCs in Proxmox?

    ...tags: gpu;ubuntu lxc.cgroup.devices.allow: c 195:* rwm lxc.cgroup.devices.allow: c 509:* rwm lxc.cgroup.devices.allow: c 226:* rwm lxc.mount.entry: /dev/nvidia0 dev/nvidia0 none bind,optional,create=file lxc.mount.entry: /dev/nvidiactl dev/nvidiactl none bind,optional,create=file...
  9. V

    [TUTORIAL] Tutorial: Unprivileged LXCs - Mount CIFS shares

    I noticed that LXC containers behave differently. And when I use 0 1 — which logically shouldn’t work — it actually does. The container takes a long time to start if the network share is unavailable. Inside the container, if the folder isn't accessible, it looks like this: /mnt/video_hdd# ls...
  10. Z

    Create a lxc accessible folder on the host

    ..."${dir}" # Mount shared directory in container; avoid "mpX: entries, as they prevent snapshots. # We create an entry of the form # lxc.mount.entry: /dir dir none rbind,optional,create=dir # Things are slightly more complicated, as we have to edit the configuration file # ourselves...
  11. V

    [TUTORIAL] Tutorial: Unprivileged LXCs - Mount CIFS shares

    Ok. With lxc.mount.entry: ..... ....... none rbind,optional,create=dir Everything works (unlike PCT SET). The only issue is the long startup time, but at least it's functional. What are the fundamental differences in this method? p.s. with none rbind,optional,create=dir 0 0 - automount not...
  12. J

    [SOLVED] No acces webGUI / LXC containers after update

    @bbgeek17 thanks for your help ! using the command journalctl -b0, the first message appearing in red refers to the line 11 of my fstab that is now with # but i cannot save it, the file is in read only mode immediately after the restart. May 31 18:01:08 ms01 systemd-fstab-generator[449]...
  13. C

    VM Migration fails with "only root can set 'affinity' config"

    ...a\nlxc.cap.drop: \nlxc.cgroup2.devices.allow: c 188:* rwm\nlxc.cgroup2.devices.allow: c 189:* rwm\nlxc.mount.entry: /dev/serial/by-id dev/serial/by-id none bind,optional,create=dir\nlxc.mount.entry: /dev/ttyUSB0 dev/ttyUSB0 none bind,optional,create=file\nlxc.mount.entry...
  14. T

    [TUTORIAL] GPU Passthrough with NVIDIA in Linux VM - Improve stability

    ...swap: 0 lxc.apparmor.profile: unconfined lxc.cgroup.devices.allow: a lxc.cgroup2.devices.allow: c 10:200 rwm lxc.mount.entry: /dev/net/tun dev/net/tun none bind,create=file lxc.mount.entry: /etc/lxc/resolv.conf etc/resolv.conf none bind,ro,create=file Example of NFS exports with RW for...
  15. R

    Another Intel Alder Lake igpu passthrough post (Plex)

    ...'130' needs to match on the second and third lines. lxc.cgroup2.devices.allow: c 226:0 rwm lxc.cgroup2.devices.allow: c 226:130 rwm lxc.mount.entry: /dev/dri/renderD130 dev/dri/renderD130 none bind,optional,create=file lxc.idmap: u 0 100000 65536 lxc.idmap: g 0 100000 44 lxc.idmap: g 44 44 1...
  16. V

    Another Intel Alder Lake igpu passthrough post (Plex)

    ...104 (which I also confirmed) with the following: lxc.cgroup2.devices.allow: c 226:0 rwm lxc.cgroup2.devices.allow: c 226:128 rwm lxc.mount.entry: /dev/dri/renderD128 dev/dri/renderD128 none bind,optional,create=file lxc.idmap: u 0 100000 65536 lxc.idmap: g 0 100000 44 lxc.idmap: g 44 44 1...
  17. T

    PCIE Google Coral Install Instructions

    ...6.8.12-10-pve Info: according to the proxmox instructions, the following entries should also be included in the lxc config under /etc/pve/lxc... features: fuse=1,nesting=1 lxc.cgroup2.devices.allow: c 226:128 rwm lxc.mount.entry: /dev/apex_0 dev/apex_0 none...
  18. J

    proxmox container uid/gid mapping

    Agree, this one worked like a charm for me, the other way i couldnt start docker inside the container after mapping the user, dont know why tho, maybe because that method only works for priviledge containers and i have an unpriviledge one with nesting enable, so i needed to mount...
  19. K

    [LXC] Shared bind mount between two unprivileged containers not accessible

    .../mnt/frigate_share/clips chmod 775 /mnt/frigate_share/clips Added bind mount to both containers: # /etc/pve/lxc/101.conf lxc.mount.entry: /mnt/frigate_share/clips /media/frigate/clips none bind,create=dir # /etc/pve/lxc/102.conf lxc.mount.entry: /mnt/frigate_share/clips...