Provided by: podman_5.0.3+ds1-5ubuntu1_amd64 bug

NAME

       podman-systemd.unit - systemd units using Podman Quadlet

SYNOPSIS

       name.container, name.volume, name.network, name.kube name.image, name.pod

   Podman rootful unit search path
       Quadlet files for the root user can be placed in the following two directories:

              • /etc/containers/systemd/

              • /usr/share/containers/systemd/

   Podman rootless unit search path
       Quadlet files for non-root users can be placed in the following directories

              • $XDG_CONFIG_HOME/containers/systemd/ or ~/.config/containers/systemd/

              • /etc/containers/systemd/users/$(UID)

              • /etc/containers/systemd/users/

   Using symbolic links
       Quadlet  supports using symbolic links for the base of the search paths.  Symbolic links below the search
       paths are not supported.

DESCRIPTION

       Podman supports starting containers (and creating volumes) via systemd  by  using  a  systemd  generator.
       These  files  are  read  during boot (and when systemctl daemon-reload is run) and generate corresponding
       regular systemd service unit files. Both system and user systemd units are supported.   All  options  and
       tables  available  in  standard  systemd  unit  files  are supported. For example, options defined in the
       [Service] table and [Install] tables pass directly to systemd and are handled by it.  See systemd.unit(5)
       man page for more information.

       The Podman generator reads the search paths above and reads files with the extensions .container .volume,
       .network, .pod and .kube, and for each file generates a similarly named  .service  file.  Be  aware  that
       existing  vendor  services  (i.e.,  in /usr/) are replaced if they have the same name. The generated unit
       files can be started and managed with systemctl like any other systemd service. systemctl {--user}  list-
       unit-files lists existing unit files on the system.

       The  Podman files use the same format as regular systemd unit files.  Each file type has a custom section
       (for example, [Container]) that is handled by Podman, and all other sections  are  passed  on  untouched,
       allowing the use of any normal systemd configuration options like dependencies or cgroup limits.

       The  source  files  also  support  drop-ins  in  the same way systemd does.  For a given source file (say
       foo.container), the corresponding .ddirectory (in this case foo.container.d) will be  scanned  for  files
       with  a  .conf  extension  that  are merged into the base file in alphabetical order. The format of these
       drop-in files is the same as the base file.  This is useful to alter or add configuration settings for  a
       unit, without having to modify unit files.

       For  rootless  containers,  when  administrators place Quadlet files in the /etc/containers/systemd/users
       directory, all users' sessions execute the Quadlet when the login session begins.  If  the  administrator
       places a Quadlet file in the /etc/containers/systemd/users/${UID}/ directory, then only the user with the
       matching  UID  execute  the  Quadlet  when  the  login  session  gets  started.  For unit files placed in
       subdirectories within /etc/containers/systemd/user/${UID}/ and the other user unit search paths,  Quadlet
       will recursively search and run the unit files present in these subdirectories.

       Note:  When  a  Quadlet  is  starting,  Podman  often  pulls  one  more container images which may take a
       considerable amount of time.  Systemd defaults service start time to 90 seconds, or  fails  the  service.
       Pre-pulling  the  image  or  extending the systemd timeout time for the service using the TimeoutStartSec
       Service option can fix the problem.

       Adding the following snippet to a Quadlet file extends the systemd timeout to 15 minutes.

       [Service]
       TimeoutStartSec=900

       Quadlet requires the use of cgroup v2, use podman info --format {{.Host.CgroupsVersion}} to check on  the
       system.

   Service Type
       By  default,  the Type field of the Service section of the Quadlet file does not need to be set.  Quadlet
       will set it to notify for .container and .kube files, forking for .pod files, and  oneshot  for  .volume,
       .network and .image files.

       However,  Type  may  be  explicitly  set to oneshot for .container and .kube files when no containers are
       expected to run once podman exits.

       When setting Type=oneshot, it is recommended to also set RemainAfterExit=yes to prevent the service state
       from becoming inactive (dead)

       Examples for such cases: - .container file with an image that exits after their entrypoint has finished `
       -.kube` file pointing to a Kubernetes Yaml file that does not define any containers. E.g. PVCs only

   Enabling unit files
       The services created by Podman are considered transient by systemd, which means they don't have the  same
       persistence rules as regular units. In particular, it is not possible to "systemctl enable" them in order
       for them to become automatically enabled on the next boot.

       To  compensate for this, the generator manually applies the [Install] section of the container definition
       unit files during generation, in the same way systemctl enable does when run later.

       For example, to start a container on boot, add something like this to the file:

       [Install]
       WantedBy=default.target

       Currently, only the Alias, WantedBy and RequiredBy keys are supported.

       The Install section can be part of the main file, or it can be in a separate drop-in  file  as  described
       above.  The latter allows you to install an non-enabled unit and then later enabling it by installing the
       drop-in.

       NOTE: To express dependencies between containers, use the generated names of the service. In other  words
       WantedBy=other.service,  not  WantedBy=other.container. The same is true for other kinds of dependencies,
       too, like After=other.service.

   Template files
       Systemd  supports  a  concept  of  template  files.   They   are   units   with   names   of   the   form
       "basename@instancename.service" when they are running, but that can be instantiated multiple times from a
       single  "basename@.service"  file.  The individual instances can also be different by using drop-in files
       with the full instance name.

       Quadlets support these in two ways. First of all, a quadlet unit with a template  form  will  generate  a
       systemd service with a template form, and the template systemd service can be used as a regular template.
       For   example,   "foo@.container"  will  generate  "foo@.service"  and  you  can  then  "systemctl  start
       foo@bar.service".

       Secondly, if you make a  symlink  like  "foo@instance.container",  that  will  generate  an  instantiated
       template  file.  When  generating  this  file  quadlet  will  read  drop-in files both from the instanced
       directory  (foo@instance.container.d)  and  the  template  directory  (foo@.container.d).   This   allows
       customization of individual instances.

       Instanced  template  files (like foo@bar.container) can be enabled just like non-templated ones. However,
       templated ones (foo@.container) are different, because they need to be  instantiated.  If  the  [Install]
       section  contains  a  DefaultInstance=  key, then that instance will be enabled, but if not, nothing will
       happen and the options will only be used as the default for units that are instantiated using symlinks.

       An example template file sleep@.container might look like this:

       [Unit]
       Description=A templated sleepy container

       [Container]
       Image=quay.io/fedora/fedora
       Exec=sleep %i

       [Service]
       # Restart service when sleep finishes
       Restart=always

       [Install]
       WantedBy=multi-user.target
       DefaultInstance=100

       If this is installed, then on boot there will be a sleep@100.service running that sleeps for 100 seconds.
       You can then do something like systemctl start sleep@50.service to start another instance that sleeps  50
       seconds, or alternatively another service can start it via a dependency like Wants=sleep@50.service.

       In  addition,  if  you  do ln -s sleep@.container sleep@10.container you will also have a 10 second sleep
       running at boot. And, if you want that particular instance to be running  with  another  image,  you  can
       create a drop-in file like sleep@10.container.d/10-image.conf:

       [Container]
       Image=quay.io/centos/centos

   Debugging unit files
       After  placing  the  unit  file  in one of the unit search paths (mentioned above), you can start it with
       systemctl start {--user}. If it fails with "Failed to start  example.service:  Unit  example.service  not
       found.", then it is possible that you used incorrect syntax or you used an option from a newer version of
       Podman Quadlet and the generator failed to create a service file.

       View the generated files and/or error messages with:

       /usr/lib/systemd/system-generators/podman-system-generator {--user} --dryrun

   Debugging a limited set of unit files
       If you would like to debug a limited set of unit files, you can copy them to a separate directory and set
       the QUADLET_UNIT_DIRS environment variable to this directory when running the command below:

       QUADLET_UNIT_DIRS=<Directory> /usr/lib/systemd/system-generators/podman-system-generator {--user} --dryrun

       This  will  instruct  Quadlet  to look for units in this directory instead of the common ones and by that
       limit the output to only the units you are debugging.

Container units [Container]

       Container units are named with a .container extension and contain a [Container]  section  describing  the
       container  that is run as a service. The resulting service file contains a line like ExecStart=podman run
        image-name, and most of the keys in this section control the command-line  options  passed  to  Podman.
       However,  some  options  also  affect  the  details of how systemd is set up to run and interact with the
       container.

       By default, the Podman container has the same name as the unit, but  with  a  systemd-  prefix,  i.e.   a
       $name.container file creates a $name.service unit and a systemd-$name Podman container. The ContainerName
       option allows for overriding this default name with a user-provided one.

       There is only one required key, Image, which defines the container image the service runs.

       Valid options for [Container] are listed below:

       ┌────────────────────────────────────┬───────────────────────────────────────┐
       │ [Container] optionspodman run equivalent                 │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ AddCapability=CAP--cap-add CAP                         │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ AddDevice=/dev/foo--device /dev/foo                     │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Annotation="XYZ"--annotation "XYZ"                    │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ AutoUpdate=registry                │ --label                               │
       │                                    │ "io.containers.autoupdate=registry"   │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ ContainerName=name--name name                           │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ ContainersConfModule=/etc/nvd.conf--module=/etc/nvd.conf                │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ DNS=192.168.55.1--dns=192.168.55.1                    │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ DNSOption=ndots:1--dns-option=ndots:1                  │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ DNSSearch=foo.com--dns-search=foo.com                  │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ DropCapability=CAP--cap-drop=CAP                        │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Entrypoint=/foo.sh--entrypoint=/foo.sh                  │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Environment=foo=bar--env foo=bar                         │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ EnvironmentFile=/tmp/env--env-file /tmp/env                   │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ EnvironmentHost=true--env-host                            │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Exec=/usr/bin/command              │ Command  after  image specification - │
       │                                    │ /usr/bin/command                      │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ ExposeHostPort=50-59--expose 50-59                        │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ GIDMap=0:10000:10--gidmap=0:10000:10                   │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ GlobalArgs=--log-level=debug--log-level=debug                     │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Group=1234--user UID:1234                       │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HealthCmd=/usr/bin/command--health-cmd=/usr/bin/command         │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HealthInterval=2m--health-interval=2m                  │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HealthOnFailure=kill--health-on-failure=kill              │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HealthRetries=5--health-retries=5                    │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HealthStartPeriod=1m               │ --health-start-period=period=1m       │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HealthStartupCmd=command--health-startup-cmd=command          │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HealthStartupInterval=1m--health-startup-interval=1m          │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HealthStartupRetries=8--health-startup-retries=8            │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HealthStartupSuccess=2--health-startup-success=2            │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HealthStartupTimeout=1m33s--health-startup-timeout=1m33s        │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HealthTimeout=20s--health-timeout=20s                  │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ HostName=new-host-name--hostname="new-host-name"            │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Image=ubi8Image specification - ubi8            │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ IP=192.5.0.1--ip 192.5.0.1                        │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ IP6=2001:db8::1--ip6 2001:db8::1                     │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Label="XYZ"--label "XYZ"                         │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ LogDriver=journald--log-driver journald                 │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Mask=/proc/sys/foo:/proc/sys/bar   │ --security-opt                        │
       │                                    │ mask=/proc/sys/foo:/proc/sys/bar      │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Mount=type=...--mount type=...                      │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Network=host--net host                            │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ NoNewPrivileges=true               │ --security-opt no-new-privileges      │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Notify=true--sdnotify container                  │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ PidsLimit=10000--pids-limit 10000                    │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Pod=pod-name--pod=pod-name                        │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ PodmanArgs=--add-host foobar--add-host foobar                     │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ PublishPort=50-59--publish 50-59                       │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Pull=never--pull=never                          │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ ReadOnly=true--read-only                           │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ ReadOnlyTmpfs=true--read-only-tmpfs                     │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Rootfs=/var/lib/rootfs--rootfs /var/lib/rootfs              │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ RunInit=true--init                                │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ SeccompProfile=/tmp/s.json         │ --security-opt seccomp=/tmp/s.json    │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Secret=secret--secret=secret[,opt=opt ...]         │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ SecurityLabelDisable=true--security-opt label=disable          │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ SecurityLabelFileType=usr_t        │ --security-opt label=filetype:usr_t   │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ SecurityLabelLevel=s0:c1,c2        │ --security-opt label=level:s0:c1,c2   │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ SecurityLabelNested=true--security-opt label=nested           │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ SecurityLabelType=spc_t            │ --security-opt label=type:spc_t       │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ ShmSize=100m--shm-size=100m                       │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ StopTimeout=20--stop-timeout=20                     │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ SubGIDMap=gtest--subgidname=gtest                    │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ SubUIDMap=utest--subuidname=utest                    │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Sysctl=name=value--sysctl=name=value                   │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Timezone=local--tz local                            │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Tmpfs=/work--tmpfs /work                         │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ UIDMap=0:10000:10--uidmap=0:10000:10                   │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Ulimit=nofile=1000:10000--ulimit nofile=1000:10000            │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Unmask=ALL--security-opt unmask=ALL             │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ User=bin--user bin                            │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ UserNS=keep-id:uid=200,gid=210     │ --userns keep-id:uid=200,gid=210      │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ Volume=/source:/dest--volume /source:/dest                │
       ├────────────────────────────────────┼───────────────────────────────────────┤
       │ WorkingDir=$HOME--workdir $HOME                       │
       └────────────────────────────────────┴───────────────────────────────────────┘

       Description of [Container] section are:

   AddCapability=
       Add these capabilities, in addition to the default Podman capability set, to the container.

       This is a space separated list of capabilities. This key can be listed multiple times.

       For example:

       AddCapability=CAP_DAC_OVERRIDE CAP_IPC_OWNER

   AddDevice=
       Adds a device node from the host into the  container.  The  format  of  this  is  HOST-DEVICE[:CONTAINER-
       DEVICE][:PERMISSIONS],  where HOST-DEVICE is the path of the device node on the host, CONTAINER-DEVICE is
       the path of the device node in the container, and PERMISSIONS is a list of permissions combining 'r'  for
       read, 'w' for write, and 'm' for mknod(2). The - prefix tells Quadlet to add the device only if it exists
       on the host.

       This key can be listed multiple times.

   Annotation=
       Set  one  or  more  OCI annotations on the container. The format is a list of key=value items, similar to
       Environment.

       This key can be listed multiple times.

   AutoUpdate=
       Indicates whether the container will be auto-updated (podman-auto-update(1)). The  following  values  are
       supported:

              • registry:  Requires a fully-qualified image reference (e.g., quay.io/podman/stable:latest) to be
                used to create the container. This enforcement is necessary to  know  which  image  to  actually
                check and pull. If an image ID was used, Podman does not know which image to check/pull anymore.

              • local:  Tells Podman to compare the image a container is using to the image with its raw name in
                local storage. If an image is updated locally, Podman simply restarts the systemd unit executing
                the container.

   ContainerName=
       The (optional) name of the Podman container. If this is not specified, the default value of systemd-%N is
       used, which is the same as the service name but with a systemd- prefix  to  avoid  conflicts  with  user-
       managed containers.

   ContainersConfModule=
       Load the specified containers.conf(5) module. Equivalent to the Podman --module option.

       This key can be listed multiple times.

   DNS=
       Set network-scoped DNS resolver/nameserver for containers in this network.

       This key can be listed multiple times.

   DNSOption=
       Set custom DNS options.

       This key can be listed multiple times.

   DNSSearch=
       Set custom DNS search domains. Use DNSSearch=. to remove the search domain.

       This key can be listed multiple times.

   DropCapability=
       Drop these capabilities from the default podman capability set, or all to drop all capabilities.

       This is a space separated list of capabilities. This key can be listed multiple times.

       For example:

       DropCapability=CAP_DAC_OVERRIDE CAP_IPC_OWNER

   Entrypoint=
       Override  the  default ENTRYPOINT from the image.  Equivalent to the Podman --entrypoint option.  Specify
       multi option commands in the form of a json string.

   Environment=
       Set an environment variable in the container. This uses the same format as services in systemd and can be
       listed multiple times.

   EnvironmentFile=
       Use a line-delimited file to set environment variables in the container.  The path  may  be  absolute  or
       relative  to  the location of the unit file.  This key may be used multiple times, and the order persists
       when passed to podman run.

   EnvironmentHost=
       Use the host environment inside of the container.

   Exec=
       If this is set then it defines what command line to run in the container. If it is not  set  the  default
       entry point of the container image is used. The format is the same as for systemd command lines.

   ExposeHostPort=
       Exposes  a  port,  or  a  range  of ports (e.g. 50-59), from the host to the container. Equivalent to the
       Podman --expose option.

       This key can be listed multiple times.

   GIDMap=
       Run the container in a new user namespace using the supplied  GID  mapping.   Equivalent  to  the  Podman
       --gidmap option.

       This key can be listed multiple times.

   GlobalArgs=
       This  key  contains  a list of arguments passed directly between podman and run in the generated file. It
       can be used to access Podman features otherwise unsupported by the  generator.  Since  the  generator  is
       unaware  of  what  unexpected interactions can be caused by these arguments, it is not recommended to use
       this option.

       The format of this is a space separated list of arguments, which can optionally be  individually  escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   Group=
       The  (numeric) GID to run as inside the container. This does not need to match the GID on the host, which
       can be modified with UsersNS, but if that is not specified, this GID is also used on the host.

   HealthCmd=
       Set or alter a healthcheck command for a container. A  value  of  none  disables  existing  healthchecks.
       Equivalent to the Podman --health-cmd option.

   HealthInterval=
       Set  an  interval  for  the  healthchecks.  An  interval  of disable results in no automatic timer setup.
       Equivalent to the Podman --health-interval option.

   HealthOnFailure=
       Action to take once the container transitions to an unhealthy state.  The "kill"  action  in  combination
       integrates  best  with  systemd. Once the container turns unhealthy, it gets killed, and systemd restarts
       the service.  Equivalent to the Podman --health-on-failure option.

   HealthRetries=
       The number of retries allowed before a healthcheck is considered to  be  unhealthy.   Equivalent  to  the
       Podman --health-retries option.

   HealthStartPeriod=
       The  initialization  time  needed for a container to bootstrap.  Equivalent to the Podman --health-start-
       period option.

   HealthStartupCmd=
       Set a startup healthcheck command for a container.  Equivalent to the Podman --health-startup-cmd option.

   HealthStartupInterval=
       Set an interval for the startup healthcheck. An interval of disable results in no automatic timer  setup.
       Equivalent to the Podman --health-startup-interval option.

   HealthStartupRetries=
       The  number of attempts allowed before the startup healthcheck restarts the container.  Equivalent to the
       Podman --health-startup-retries option.

   HealthStartupSuccess=
       The number of  successful  runs  required  before  the  startup  healthcheck  succeeds  and  the  regular
       healthcheck begins.  Equivalent to the Podman --health-startup-success option.

   HealthStartupTimeout=
       The maximum time a startup healthcheck command has to complete before it is marked as failed.  Equivalent
       to the Podman --health-startup-timeout option.

   HealthTimeout=
       The maximum time allowed to complete the healthcheck before an interval is considered failed.  Equivalent
       to the Podman --health-timeout option.

   HostName=
       Sets the host name that is available inside the container.  Equivalent to the Podman --hostname option.

   Image=
       The  image  to run in the container.  It is recommended to use a fully qualified image name rather than a
       short name, both for performance and robustness reasons.

       The format of the name is the same as when passed to podman pull. So, it supports using :tag  or  digests
       to guarantee the specific image version.

       As  a  special  case, if the name of the image ends with .image, Quadlet will use the image pulled by the
       corresponding .image file, and the  generated  systemd  service  contains  a  dependency  on  the  $name-
       image.service.  Note that the corresponding .image file must exist.

   IP=
       Specify a static IPv4 address for the container, for example 10.88.64.128.  Equivalent to the Podman --ip
       option.

   IP6=
       Specify  a static IPv6 address for the container, for example fd46:db93:aa76:ac37::10.  Equivalent to the
       Podman --ip6 option.

   Label=
       Set one or more OCI labels on the container. The  format  is  a  list  of  key=value  items,  similar  to
       Environment.

       This key can be listed multiple times.

   LogDriver=
       Set  the  log-driver  used  by  Podman when running the container.  Equivalent to the Podman --log-driver
       option.

   Mask=
       Specify the paths to mask separated by a colon. Mask=/path/1:/path/2. A masked path  cannot  be  accessed
       inside the container.

   Mount=
       Attach  a  filesystem  mount  to  the  container.   This  is equivalent to the Podman --mount option, and
       generally has the form type=TYPE,TYPE-SPECIFIC-OPTION[,...].

       As a special  case,  for  type=volume  if  source  ends  with  .volume,  a  Podman  named  volume  called
       systemd-$name  is  used  as  the  source,  and the generated systemd service contains a dependency on the
       $name-volume.service. Such a volume can be automatically  be  lazily  created  by  using  a  $name.volume
       Quadlet file.

       This key can be listed multiple times.

   Network=
       Specify  a  custom  network for the container. This has the same format as the --network option to podman
       run. For example, use host to use the host network in the container, or none to not set up networking  in
       the container.

       As  a  special case, if the name of the network ends with .network, a Podman network called systemd-$name
       is used, and the generated systemd service contains a dependency on  the  $name-network.service.  Such  a
       network can be automatically created by using a $name.network Quadlet file.

       This key can be listed multiple times.

   NoNewPrivileges= (defaults to no)
       If  enabled,  this  disables  the  container processes from gaining additional privileges via things like
       setuid and file capabilities.

   Notify= (defaults to no)
       By default, Podman is run in such a way that the  systemd  startup  notify  command  is  handled  by  the
       container  runtime.  In  other words, the service is deemed started when the container runtime starts the
       child in the container. However, if the container application supports sd_notify, then setting Notify  to
       true passes the notification details to the container allowing it to notify of startup on its own.

       In  addition,  setting  Notify  to  healthy  will  postpone  startup notifications until such time as the
       container is marked healthy, as determined by Podman healthchecks. Note that this requires setting  up  a
       container healthcheck, see the HealthCmd option for more.

   PidsLimit=
       Tune the container's pids limit.  This is equivalent to the Podman --pids-limit option.

   Pod=
       Specify a Quadlet .pod unit to link the container to.  The value must take the form of <name>.pod and the
       .pod unit must exist.

       Quadlet will add all the necessary parameters to link between the container and the pod and between their
       corresponding services.

   PodmanArgs=
       This  key  contains  a  list  of  arguments  passed  directly to the end of the podman run command in the
       generated file (right before the image name in the command  line).  It  can  be  used  to  access  Podman
       features  otherwise  unsupported  by  the  generator.  Since  the generator is unaware of what unexpected
       interactions can be caused by these arguments, it is not recommended to use this option.

       The format of this is a space separated list of arguments, which can optionally be  individually  escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   PublishPort=
       Exposes  a  port,  or  a  range  of ports (e.g. 50-59), from the container to the host. Equivalent to the
       Podman  --publish  option.  The  format  is  similar  to  the  Podman  options,  which  is  of  the  form
       ip:hostPort:containerPort,  ip::containerPort,  hostPort:containerPort or containerPort, where the number
       of host and container ports must be the same (in the case of a range).

       If the IP is set to 0.0.0.0 or not set at all, the port is bound on all IPv4 addresses on the  host;  use
       [::] for IPv6.

       Note  that  not  listing a host port means that Podman automatically selects one, and it may be different
       for each invocation of service. This makes that a less useful option. The allocated  port  can  be  found
       with the podman port command.

       This key can be listed multiple times.

   Pull=
       Set the image pull policy.  This is equivalent to the Podman --pull option

   ReadOnly= (defaults to no)
       If enabled, makes the image read-only.

   ReadOnlyTmpfs= (defaults to yes)
       If ReadOnly is set to yes, mount a read-write tmpfs on /dev, /dev/shm, /run, /tmp, and /var/tmp.

   Rootfs=
       The rootfs to use for the container. Rootfs points to a directory on the system that contains the content
       to be run within the container. This option conflicts with the Image option.

       The format of the rootfs is the same as when passed to podman run --rootfs, so it supports overlay mounts
       as well.

       Note:   On   SELinux   systems,   the   rootfs   needs   the   correct   label,   which   is  by  default
       unconfined_u:object_r:container_file_t:s0.

   RunInit= (default to no)
       If enabled, the container has a minimal init process inside the container that forwards signals and reaps
       processes.

   SeccompProfile=
       Set the seccomp profile to use in the container. If unset, the default podman profile is  used.   Set  to
       either the pathname of a json file, or unconfined to disable the seccomp filters.

   Secret=
       Use  a Podman secret in the container either as a file or an environment variable.  This is equivalent to
       the Podman --secret option and generally has the form secret[,opt=opt ...]

   SecurityLabelDisable=
       Turn off label separation for the container.

   SecurityLabelFileType=
       Set the label file type for the container files.

   SecurityLabelLevel=
       Set the label process level for the container processes.

   SecurityLabelNested=
       Allow SecurityLabels to function within the container.  This  allows  separation  of  containers  created
       within the container.

   SecurityLabelType=
       Set the label process type for the container processes.

   ShmSize=
       Size of /dev/shm.

       This is equivalent to the Podman --shm-size option and generally has the form number[unit]

   StopTimeout=
       Seconds to wait before forcibly stopping the container.

       Note,  this value should be lower than the actual systemd unit timeout to make sure the podman rm command
       is not killed by systemd.

       This is equivalent to the Podman --stop-timeout option

   SubGIDMap=
       Run the container in a new user namespace using the map with name in the /etc/subgid file.  Equivalent to
       the Podman --subgidname option.

   SubUIDMap=
       Run the container in a new user namespace using the map with name in the /etc/subuid file.  Equivalent to
       the Podman --subuidname option.

   Sysctl=
       Configures namespaced kernel parameters for the container. The format is Sysctl=name=value.

       This is a space separated list of kernel parameters. This key can be listed multiple times.

       For example:

       Sysctl=net.ipv6.conf.all.disable_ipv6=1 net.ipv6.conf.all.use_tempaddr=1

   Timezone= (if unset uses system-configured default)
       The timezone to run the container in.

   Tmpfs=
       Mount a tmpfs in the container. This is equivalent to the Podman --tmpfs option, and  generally  has  the
       form CONTAINER-DIR[:OPTIONS].

       This key can be listed multiple times.

   UIDMap=
       Run  the  container  in  a  new  user namespace using the supplied UID mapping.  Equivalent to the Podman
       --uidmap option.

       This key can be listed multiple times.

   Ulimit=
       Ulimit options. Sets the ulimits values inside of the container.

       This key can be listed multiple times.

   Unmask=
       Specify the paths to unmask separated by a colon. unmask=ALL or /path/1:/path/2, or shell expanded  paths
       (/proc/*):

       If set to ALL, Podman will unmask all the paths that are masked or made read-only by default.

       The default masked paths are /proc/acpi, /proc/kcore, /proc/keys, /proc/latency_stats, /proc/sched_debug,
       /proc/scsi, /proc/timer_list, /proc/timer_stats, /sys/firmware, and /sys/fs/selinux.

       The  default  paths  that  are  read-only  are  /proc/asound,  /proc/bus, /proc/fs, /proc/irq, /proc/sys,
       /proc/sysrq-trigger, /sys/fs/cgroup.

   User=
       The (numeric) UID to run as inside the container. This does not need to match the UID on the host,  which
       can be modified with UserNS, but if that is not specified, this UID is also used on the host.

   UserNS=
       Set  the  user  namespace  mode  for  the container. This is equivalent to the Podman --userns option and
       generally has the form MODE[:OPTIONS,...].

   Volume=
       Mount a volume in the container. This is equivalent to the Podman --volume option, and generally has  the
       form [[SOURCE-VOLUME|HOST-DIR:]CONTAINER-DIR[:OPTIONS]].

       If SOURCE-VOLUME starts with ., Quadlet resolves the path relative to the location of the unit file.

       As a special case, if SOURCE-VOLUME ends with .volume, a Podman named volume called systemd-$name is used
       as  the source, and the generated systemd service contains a dependency on the $name-volume.service. Such
       a volume can be automatically be lazily created by using a $name.volume Quadlet file.

       This key can be listed multiple times.

   WorkingDir=
       Working directory inside the container.

       The default working directory for running binaries within a container is  the  root  directory  (/).  The
       image  developer  can  set  a  different  default with the WORKDIR instruction. This option overrides the
       working directory by using the -w option.

Pod units [Pod]

       Pod units are named with a .pod extension and contain a [Pod] section describing the pod that is  created
       and  run  as a service. The resulting service file contains a line like ExecStartPre=podman pod create ,
       and most of the keys in this section control the command-line options passed to Podman.

       By default, the Podman pod has the same name as the unit, but with a systemd- prefix, i.e.   a  $name.pod
       file  creates  a  $name-pod.service  unit  and  a systemd-$name Podman pod. The PodName option allows for
       overriding this default name with a user-provided one.

       Valid options for [Pod] are listed below:

       ┌────────────────────────────────────┬────────────────────────────────────┐
       │ [Pod] optionspodman container create equivalent │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ ContainersConfModule=/etc/nvd.conf--module=/etc/nvd.conf             │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ GlobalArgs=--log-level=debug--log-level=debug                  │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ Network=host--network host                     │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ PodmanArgs=--cpus=2--cpus=2                           │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ PodName=name--name=name                        │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ PublishPort=50-59--publish 50-59                    │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ Volume=/source:/dest--volume /source:/dest             │
       └────────────────────────────────────┴────────────────────────────────────┘

       Supported keys in the [Pod] section are:

   ContainersConfModule=
       Load the specified containers.conf(5) module. Equivalent to the Podman --module option.

       This key can be listed multiple times.

   GlobalArgs=
       This key contains a list of arguments passed directly between podman and pod in the  generated  file.  It
       can  be  used  to  access  Podman features otherwise unsupported by the generator. Since the generator is
       unaware of what unexpected interactions can be caused by these arguments, it is not  recommended  to  use
       this option.

       The  format  of this is a space separated list of arguments, which can optionally be individually escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   Network=
       Specify a custom network for the pod.  This has the same format as the --network  option  to  podman  pod
       create.   For  example,  use host to use the host network in the pod, or none to not set up networking in
       the pod.

       As a special case, if the name of the network ends with .network, Quadlet will look for the corresponding
       .network Quadlet unit.  If found, Quadlet will use the name of the Network set in  the  Unit,  otherwise,
       systemd-$name is used.  The generated systemd service contains a dependency on the service unit generated
       for that .network unit, or on $name-network.service if the .network unit is not found

       This key can be listed multiple times.

   PodmanArgs=
       This  key contains a list of arguments passed directly to the end of the podman pod create command in the
       generated file. It can be used to access Podman features otherwise unsupported by  the  generator.  Since
       the  generator  is  unaware  of  what  unexpected  interactions  can be caused by these arguments, is not
       recommended to use this option.

       The format of this is a space separated list of arguments, which can optionally be  individually  escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   PodName=
       The (optional) name of the Podman pod. If this is not specified, the default value of systemd-%N is used,
       which  is  the  same  as the service name but with a systemd- prefix to avoid conflicts with user-managed
       containers.

       Please note that pods and containers cannot have the same name.  So, if  PodName  is  set,  it  must  not
       conflict with any container.

   PublishPort=
       Exposes  a  port,  or  a  range of ports (e.g. 50-59), from the pod to the host. Equivalent to the Podman
       --publish  option.  The  format  is  similar  to   the   Podman   options,   which   is   of   the   form
       ip:hostPort:containerPort,  ip::containerPort,  hostPort:containerPort or containerPort, where the number
       of host and container ports must be the same (in the case of a range).

       If the IP is set to 0.0.0.0 or not set at all, the port is bound on all IPv4 addresses on the  host;  use
       [::] for IPv6.

       Note  that  not  listing a host port means that Podman automatically selects one, and it may be different
       for each invocation of service. This makes that a less useful option. The allocated  port  can  be  found
       with the podman port command.

       This key can be listed multiple times.

   Volume=
       Mount  a  volume in the pod. This is equivalent to the Podman --volume option, and generally has the form
       [[SOURCE-VOLUME|HOST-DIR:]CONTAINER-DIR[:OPTIONS]].

       If SOURCE-VOLUME starts with ., Quadlet resolves the path relative to the location of the unit file.

       As a special case, if SOURCE-VOLUME ends with .volume, Quadlet will look for  the  corresponding  .volume
       Quadlet  unit.   If  found,  Quadlet  will  use  the  name  of  the  Volume  set  in the Unit, otherwise,
       systemd-$name is used.  The generated systemd service contains a dependency on the service unit generated
       for that .volume unit, or on $name-volume.service if the .volume unit is not found

       This key can be listed multiple times.

Kube units [Kube]

       Kube units are named with a .kube extension and contain a [Kube] section describing how podman kube  play
       runs as a service. The resulting service file contains a line like ExecStart=podman kube play  file.yml,
       and  most  of  the  keys in this section control the command-line options passed to Podman. However, some
       options also affect the details of how systemd is set up to run and interact with the container.

       There is only one required key, Yaml, which defines the path to the Kubernetes YAML file.

       Valid options for [Kube] are listed below:

       ┌────────────────────────────────────┬────────────────────────────────────────────────────────────────┐
       │ [Kube] optionspodman kube play equivalent                                    │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ AutoUpdate=registry                │ --annotation "io.containers.autoupdate=registry"               │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ ConfigMap=/tmp/config.map--config-map /tmp/config.map                                   │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ ContainersConfModule=/etc/nvd.conf--module=/etc/nvd.conf                                         │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ ExitCodePropagation=how            │ How to propagate container error status                        │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ GlobalArgs=--log-level=debug--log-level=debug                                              │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ KubeDownForce=true--force (for podman kube down)                                 │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ LogDriver=journald                 │ --log-driver journald                                          │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ Network=host                       │ --net host                                                     │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ PodmanArgs=--annotation=key=value  │ --annotation=key=value                                         │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ PublishPort=59-60                  │ --publish=59-60                                                │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ SetWorkingDirectory=yaml           │ Set WorkingDirectory of unit file to location of the YAML file │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ UserNS=keep-id:uid=200,gid=210     │ --userns keep-id:uid=200,gid=210                               │
       ├────────────────────────────────────┼────────────────────────────────────────────────────────────────┤
       │ Yaml=/tmp/kube.yaml                │ podman kube play /tmp/kube.yaml                                │
       └────────────────────────────────────┴────────────────────────────────────────────────────────────────┘

       Supported keys in the [Kube] section are:

   AutoUpdate=
       Indicates whether containers will be auto-updated (podman-auto-update(1)). AutoUpdate  can  be  specified
       multiple times. The following values are supported:

              • registry:  Requires a fully-qualified image reference (e.g., quay.io/podman/stable:latest) to be
                used to create the container. This enforcement is necessary to know  which  images  to  actually
                check and pull. If an image ID was used, Podman does not know which image to check/pull anymore.

              • local:  Tells Podman to compare the image a container is using to the image with its raw name in
                local storage. If an image is updated locally, Podman simply restarts the systemd unit executing
                the Kubernetes Quadlet.

              • name/(local|registry): Tells Podman to perform the local or registry autoupdate on the specified
                container name.

   ConfigMap=
       Pass the Kubernetes ConfigMap YAML path to podman kube play via the  --configmap  argument.   Unlike  the
       configmap  argument,  the  value  may  contain  only  one  path but it may be absolute or relative to the
       location of the unit file.

       This key may be used multiple times

   ContainersConfModule=
       Load the specified containers.conf(5) module. Equivalent to the Podman --module option.

       This key can be listed multiple times.

   ExitCodePropagation=
       Control how the main PID of the systemd service should exit. The following values are supported:  -  all:
       exit non-zero if all containers have failed (i.e., exited non-zero) - any: exit non-zero if any container
       has failed - none: exit zero and ignore failed containers

       The current default value is none.

   GlobalArgs=
       This  key  contains a list of arguments passed directly between podman and kube in the generated file. It
       can be used to access Podman features otherwise unsupported by the  generator.  Since  the  generator  is
       unaware  of  what  unexpected interactions can be caused by these arguments, it is not recommended to use
       this option.

       The format of this is a space separated list of arguments, which can optionally be  individually  escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   KubeDownForce=
       Remove all resources, including volumes, when calling podman kube down.  Equivalent to the Podman --force
       option.

   LogDriver=
       Set the log-driver Podman uses when running the container.  Equivalent to the Podman --log-driver option.

   Network=
       Specify  a  custom  network for the container. This has the same format as the --network option to podman
       kube play. For example, use host to use the host network  in  the  container,  or  none  to  not  set  up
       networking in the container.

       As  a  special case, if the name of the network ends with .network, a Podman network called systemd-$name
       is used, and the generated systemd service contains a dependency on  the  $name-network.service.  Such  a
       network can be automatically created by using a $name.network Quadlet file.

       This key can be listed multiple times.

   PodmanArgs=
       This  key  contains a list of arguments passed directly to the end of the podman kube play command in the
       generated file (right before the path to the yaml file in the command line). It can  be  used  to  access
       Podman features otherwise unsupported by the generator. Since the generator is unaware of what unexpected
       interactions can be caused by these arguments, is not recommended to use this option.

       The  format  of this is a space separated list of arguments, which can optionally be individually escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   PublishPort=
       Exposes a port, or a range of ports (e.g. 50-59), from the container  to  the  host.  Equivalent  to  the
       podman  kube  play's  --publish option. The format is similar to the Podman options, which is of the form
       ip:hostPort:containerPort, ip::containerPort, hostPort:containerPort or containerPort, where  the  number
       of host and container ports must be the same (in the case of a range).

       If  the  IP is set to 0.0.0.0 or not set at all, the port is bound on all IPv4 addresses on the host; use
       [::] for IPv6.

       The list of published ports specified in the unit file is merged with the list of ports specified in  the
       Kubernetes  YAML  file.  If the same container port and protocol is specified in both, the entry from the
       unit file takes precedence

       This key can be listed multiple times.

   SetWorkingDirectory=
       Set the WorkingDirectory field of the Service group of the Systemd service  unit  file.   Used  to  allow
       podman  kube  play  to  correctly  resolve relative paths.  Supported values are yaml and unit to set the
       working directory to that of the YAML or Quadlet Unit file respectively.

       Alternatively, users can explicitly set the WorkingDirectory field of the  Service  group  in  the  .kube
       file.   Please  note that if the WorkingDirectory field of the Service group is set, Quadlet will not set
       it even if SetWorkingDirectory is set

   UserNS=
       Set the user namespace mode for the container. This is equivalent  to  the  Podman  --userns  option  and
       generally has the form MODE[:OPTIONS,...].

   Yaml=
       The path, absolute or relative to the location of the unit file, to the Kubernetes YAML file to use.

Network units [Network]

       Network  files  are  named with a .network extension and contain a section [Network] describing the named
       Podman network. The generated service is a one-time command that ensures that the network exists  on  the
       host, creating it if needed.

       By  default,  the  Podman  network  has the same name as the unit, but with a systemd- prefix, i.e. for a
       network file named $NAME.network, the generated Podman network is called systemd-$NAME, and the generated
       service file is $NAME-network.service. The NetworkName option allows for  overriding  this  default  name
       with a user-provided one.

       Please  note  that  stopping  the corresponding service will not remove the podman network.  In addition,
       updating an existing network is not supported.  In order to update the network parameters you will  first
       need to manually remove the podman network and then restart the service.

       Using  network  units  allows  containers  to depend on networks being automatically pre-created. This is
       particularly interesting when using special options to control  network  creation,  as  Podman  otherwise
       creates networks with the default options.

       Valid options for [Network] are listed below:

       ┌────────────────────────────────────┬──────────────────────────────────┐
       │ [Network] optionspodman network create equivalent │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ ContainersConfModule=/etc/nvd.conf--module=/etc/nvd.conf           │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ DisableDNS=true--disable-dns                    │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ DNS=192.168.55.1--dns=192.168.55.1               │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ Driver=bridge--driver bridge                  │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ Gateway=192.168.55.3--gateway 192.168.55.3           │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ GlobalArgs=--log-level=debug--log-level=debug                │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ Internal=true--internal                       │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ IPAMDriver=dhcp--ipam-driver dhcp               │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ IPRange=192.168.55.128/25--ip-range 192.168.55.128/25     │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ IPv6=true--ipv6                           │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ Label="XYZ"--label "XYZ"                    │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ NetworkName=foopodman network create foo        │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ Options=isolate=true--opt isolate=true               │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ PodmanArgs=--dns=192.168.55.1--dns=192.168.55.1               │
       ├────────────────────────────────────┼──────────────────────────────────┤
       │ Subnet=192.5.0.0/16--subnet 192.5.0.0/16            │
       └────────────────────────────────────┴──────────────────────────────────┘

       Supported keys in [Network] section are:

   ContainersConfModule=
       Load the specified containers.conf(5) module. Equivalent to the Podman --module option.

       This key can be listed multiple times.

   DisableDNS= (defaults to no)
       If enabled, disables the DNS plugin for this network.

       This is equivalent to the Podman --disable-dns option

   DNS=
       Set network-scoped DNS resolver/nameserver for containers in this network.

       This key can be listed multiple times.

   Driver= (defaults to bridge)
       Driver to manage the network. Currently bridge, macvlan and ipvlan are supported.

       This is equivalent to the Podman --driver option

   Gateway=
       Define a gateway for the subnet. If you want to provide a gateway address, you must also provide a subnet
       option.

       This is equivalent to the Podman --gateway option

       This key can be listed multiple times.

   GlobalArgs=
       This  key  contains a list of arguments passed directly between podman and network in the generated file.
       It can be used to access Podman features otherwise unsupported by the generator. Since the  generator  is
       unaware  of  what  unexpected interactions can be caused by these arguments, it is not recommended to use
       this option.

       The format of this is a space separated list of arguments, which can optionally be  individually  escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   Internal= (defaults to no)
       Restrict external access of this network.

       This is equivalent to the Podman --internal option

   IPAMDriver=
       Set  the  ipam driver (IP Address Management Driver) for the network. Currently host-local, dhcp and none
       are supported.

       This is equivalent to the Podman --ipam-driver option

   IPRange=
       Allocate container IP from a range. The range must be a either a complete subnet in CIDR notation  or  be
       in  the <startIP>-<endIP> syntax which allows for a more flexible range compared to the CIDR subnet.  The
       ip-range option must be used with a subnet option.

       This is equivalent to the Podman --ip-range option

       This key can be listed multiple times.

   IPv6=
       Enable IPv6 (Dual Stack) networking.

       This is equivalent to the Podman --ipv6 option

   Label=
       Set one or more OCI labels on the  network.  The  format  is  a  list  of  key=value  items,  similar  to
       Environment.

       This key can be listed multiple times.

   NetworkName=
       The  (optional)  name of the Podman network. If this is not specified, the default value of systemd-%N is
       used, which is the same as the unit name but with a systemd- prefix to avoid conflicts with  user-managed
       networks.

   Options=
       Set driver specific options.

       This is equivalent to the Podman --opt option

   PodmanArgs=
       This  key contains a list of arguments passed directly to the end of the podman network create command in
       the generated file (right before the name of the network in the command line). It can be used  to  access
       Podman features otherwise unsupported by the generator. Since the generator is unaware of what unexpected
       interactions can be caused by these arguments, is not recommended to use this option.

       The  format  of this is a space separated list of arguments, which can optionally be individually escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   Subnet=
       The subnet in CIDR notation.

       This is equivalent to the Podman --subnet option

       This key can be listed multiple times.

Volume units [Volume]

       Volume files are named with a .volume extension and contain  a  section  [Volume]  describing  the  named
       Podman  volume.  The  generated  service is a one-time command that ensures that the volume exists on the
       host, creating it if needed.

       By default, the Podman volume has the same name as the unit, but with  a  systemd-  prefix,  i.e.  for  a
       volume  file  named  $NAME.volume, the generated Podman volume is called systemd-$NAME, and the generated
       service file is $NAME-volume.service. The VolumeName option allows for overriding this default name  with
       a user-provided one.

       Using  volume  units  allows  containers  to  depend  on volumes being automatically pre-created. This is
       particularly interesting when using special options to  control  volume  creation,  as  Podman  otherwise
       creates volumes with the default options.

       Valid options for [Volume] are listed below:

       ┌────────────────────────────────────┬────────────────────────────────────┐
       │ [Volume] optionspodman volume create equivalent    │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ ContainersConfModule=/etc/nvd.conf--module=/etc/nvd.conf             │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ Copy=true--opt copy                         │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ Device=tmpfs--opt device=tmpfs                 │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ Driver=image--driver=image                     │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ GlobalArgs=--log-level=debug--log-level=debug                  │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ Group=192--opt group=192                    │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ Image=quay.io/centos/centos:latest │ --opt                              │
       │                                    │ image=quay.io/centos/centos:latest │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ Label="foo=bar"--label "foo=bar"                  │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ Options=XYZ--opt XYZ                          │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ PodmanArgs=--driver=image--driver=image                     │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ Type=typeFilesystem type of Device          │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ User=123--opt uid=123                      │
       ├────────────────────────────────────┼────────────────────────────────────┤
       │ VolumeName=foopodman volume create foo           │
       └────────────────────────────────────┴────────────────────────────────────┘

       Supported keys in [Volume] section are:

   ContainersConfModule=
       Load the specified containers.conf(5) module. Equivalent to the Podman --module option.

       This key can be listed multiple times.

   Copy= (default to yes)
       If enabled, the content of the image located at the mountpoint of the volume is copied into the volume on
       the first run.

   Device=
       The path of a device which is mounted for the volume.

   Driver=
       Specify the volume driver name. When set to image, the Image key must also be set.

       This is equivalent to the Podman --driver option.

   GlobalArgs=
       This key contains a list of arguments passed directly between podman and volume in the generated file. It
       can  be  used  to  access  Podman features otherwise unsupported by the generator. Since the generator is
       unaware of what unexpected interactions can be caused by these arguments, it is not  recommended  to  use
       this option.

       The  format  of this is a space separated list of arguments, which can optionally be individually escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   Group=
       The host (numeric) GID, or group name to use as the group for the volume

   Image=
       Specifies the image the volume is based on when Driver is set to the image.  It is recommended to  use  a
       fully qualified image name rather than a short name, both for performance and robustness reasons.

       The  format  of the name is the same as when passed to podman pull. So, it supports using :tag or digests
       to guarantee the specific image version.

       As a special case, if the name of the image ends with .image, Quadlet will use the image  pulled  by  the
       corresponding  .image  file,  and  the  generated  systemd  service  contains  a dependency on the $name-
       image.service.  Note that the corresponding .image file must exist.

   Label=
       Set one or more OCI labels on  the  volume.  The  format  is  a  list  of  key=value  items,  similar  to
       Environment.

       This key can be listed multiple times.

   Options=
       The mount options to use for a filesystem as used by the mount(8) command -o option.

   PodmanArgs=
       This  key  contains a list of arguments passed directly to the end of the podman volume create command in
       the generated file (right before the name of the volume in the command line). It can be  used  to  access
       Podman features otherwise unsupported by the generator. Since the generator is unaware of what unexpected
       interactions can be caused by these arguments, is not recommended to use this option.

       The  format  of this is a space separated list of arguments, which can optionally be individually escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   Type=
       The filesystem type of Device as used by the mount(8) commands -t option.

   User=
       The host (numeric) UID, or user name to use as the owner for the volume

   VolumeName=
       The (optional) name of the Podman volume. If this is not specified, the default value  of  systemd-%N  is
       used,  which is the same as the unit name but with a systemd- prefix to avoid conflicts with user-managed
       volumes.

Image units [Image]

       Image files are named with a .image extension and contain a  section  [Image]  describing  the  container
       image pull command. The generated service is a one-time command that ensures that the image exists on the
       host, pulling it if needed.

       Using  image  units allows containers and volumes to depend on images being automatically pulled. This is
       particularly interesting when using special options to control image pulls.

       Valid options for [Image] are listed below:

       ┌───────────────────────────────────────┬────────────────────────────────────────────────┐
       │ [Image] optionspodman image pull equivalent                   │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ AllTags=true--all-tags                                     │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ Arch=aarch64--arch=aarch64                                 │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ AuthFile=/etc/registry/auth.json--authfile=/etc/registry/auth.json             │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ CertDir=/etc/registry/certs--cert-dir=/etc/registry/certs                 │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ ContainersConfModule=/etc/nvd.conf--module=/etc/nvd.conf                         │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ Creds=myname:mypassword--creds=myname:mypassword                      │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ DecryptionKey=/etc/registry.key--decryption-key=/etc/registry.key             │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ GlobalArgs=--log-level=debug--log-level=debug                              │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ Image=quay.io/centos/centos:latest    │ podman image pull quay.io/centos/centos:latest │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ ImageTag=quay.io/centos/centos:latestUse this name when resolving .image references │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ OS=windows                            │ --os=windows                                   │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ PodmanArgs=--os=linux                 │ --os=linux                                     │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ TLSVerify=false                       │ --tls-verify=false                             │
       ├───────────────────────────────────────┼────────────────────────────────────────────────┤
       │ Variant=arm/v7                        │ --variant=arm/v7                               │
       └───────────────────────────────────────┴────────────────────────────────────────────────┘

   AllTags=
       All tagged images in the repository are pulled.

       This is equivalent to the Podman --all-tags option.

   Arch=
       Override the architecture, defaults to hosts, of the image to be pulled.

       This is equivalent to the Podman --arch option.

   AuthFile=
       Path of the authentication file.

       This is equivalent to the Podman --authfile option.

   CertDir=
       Use certificates at path (*.crt, *.cert, *.key) to connect to the registry.

       This is equivalent to the Podman --cert-dir option.

   ContainersConfModule=
       Load the specified containers.conf(5) module. Equivalent to the Podman --module option.

       This key can be listed multiple times.

   Creds=
       The [username[:password]] to use to authenticate with the registry, if required.

       This is equivalent to the Podman --creds option.

   DecryptionKey=
       The [key[:passphrase]] to be used for decryption of images.

       This is equivalent to the Podman --decryption-key option.

   GlobalArgs=
       This key contains a list of arguments passed directly between podman and image in the generated file.  It
       can  be  used  to  access  Podman features otherwise unsupported by the generator. Since the generator is
       unaware of what unexpected interactions can be caused by these arguments, it is not  recommended  to  use
       this option.

       The  format  of this is a space separated list of arguments, which can optionally be individually escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   Image=
       The image to pull.  It is recommended to use a fully qualified image name rather than a short name,  both
       for performance and robustness reasons.

       The  format  of the name is the same as when passed to podman pull. So, it supports using :tag or digests
       to guarantee the specific image version.

   ImageTag=
       Actual FQIN of the referenced Image.  Only meaningful when source is a file or directory archive.

       For example, an image saved into a docker-archive with the following Podman command:

       podman image save --format docker-archive --output /tmp/archive-file.tar quay.io/podman/stable:latest

       requires setting - Image=docker-archive:/tmp/archive-file.tar - ImageTag=quay.io/podman/stable:latest

   OS=
       Override the OS, defaults to hosts, of the image to be pulled.

       This is equivalent to the Podman --os option.

   PodmanArgs=
       This key contains a list of arguments passed directly to the end of the podman image pull command in  the
       generated  file  (right  before  the  image  name  in  the command line). It can be used to access Podman
       features otherwise unsupported by the generator. Since  the  generator  is  unaware  of  what  unexpected
       interactions can be caused by these arguments, it is not recommended to use this option.

       The  format  of this is a space separated list of arguments, which can optionally be individually escaped
       to allow inclusion of whitespace and other control characters.

       This key can be listed multiple times.

   TLSVerify=
       Require HTTPS and verification of certificates when contacting registries.

       This is equivalent to the Podman --tls-verify option.

   Variant=
       Override the default architecture variant of the container image.

       This is equivalent to the Podman --variant option.

EXAMPLES

       Example test.container:

       [Unit]
       Description=A minimal container

       [Container]
       # Use the centos image
       Image=quay.io/centos/centos:latest

       # Use volume and network defined below
       Volume=test.volume:/data
       Network=test.network

       # In the container we just run sleep
       Exec=sleep 60

       [Service]
       # Restart service when sleep finishes
       Restart=always
       # Extend Timeout to allow time to pull the image
       TimeoutStartSec=900
       # ExecStartPre flag and other systemd commands can go here, see systemd.unit(5) man page.
       ExecStartPre=/usr/share/mincontainer/setup.sh

       [Install]
       # Start by default on boot
       WantedBy=multi-user.target default.target

       Example test.kube:

       [Unit]
       Description=A kubernetes yaml based service
       Before=local-fs.target

       [Kube]
       Yaml=/opt/k8s/deployment.yml

       [Install]
       # Start by default on boot
       WantedBy=multi-user.target default.target

       Example test.volume:

       [Volume]
       User=root
       Group=root
       Label=org.test.Key=value

       Example test.network:

       [Network]
       Subnet=172.16.0.0/24
       Gateway=172.16.0.1
       IPRange=172.16.0.0/28
       Label=org.test.Key=value

       Example for Container in a Pod:

       test.pod

       [Pod]
       PodName=test

       centos.container

       [Container]
       Image=quay.io/centos/centos:latest
       Exec=sh -c "sleep inf"
       Pod=test.pod

SEE ALSO

       systemd.unit(5),  systemd.service(5),  podman-run(1),   podman-network-create(1),   podman-auto-update(1)
       [systemd.unit(5)]

                                                                                          podman-systemd.unit(5)