diff --git a/docs/reference/run.md b/docs/reference/run.md index 64725e8f26..909e58e2f9 100644 --- a/docs/reference/run.md +++ b/docs/reference/run.md @@ -345,13 +345,13 @@ Supported networks : container:<name|id> Use the network stack of another container, specified via - its *name* or *id*. + its name or id. NETWORK - Connects the container to a user created network (using `docker network create` command) + Connects the container to a user created network (using docker network create command) @@ -624,15 +624,15 @@ but the volume for `/bar` will not. Volumes inherited via `--volumes-from` will with the same logic -- if the original volume was specified with a name it will **not** be removed. ## Security configuration - --security-opt="label=user:USER" : Set the label user for the container - --security-opt="label=role:ROLE" : Set the label role for the container - --security-opt="label=type:TYPE" : Set the label type for the container - --security-opt="label=level:LEVEL" : Set the label level for the container - --security-opt="label=disable" : Turn off label confinement for the container - --security-opt="apparmor=PROFILE" : Set the apparmor profile to be applied to the container - --security-opt="no-new-privileges" : Disable container processes from gaining new privileges - --security-opt="seccomp=unconfined": Turn off seccomp confinement for the container - --security-opt="seccomp=profile.json: White listed syscalls seccomp Json file to be used as a seccomp filter + --security-opt="label=user:USER" : Set the label user for the container + --security-opt="label=role:ROLE" : Set the label role for the container + --security-opt="label=type:TYPE" : Set the label type for the container + --security-opt="label=level:LEVEL" : Set the label level for the container + --security-opt="label=disable" : Turn off label confinement for the container + --security-opt="apparmor=PROFILE" : Set the apparmor profile to be applied to the container + --security-opt="no-new-privileges" : Disable container processes from gaining new privileges + --security-opt="seccomp=unconfined" : Turn off seccomp confinement for the container + --security-opt="seccomp=profile.json": White listed syscalls seccomp Json file to be used as a seccomp filter You can override the default labeling scheme for each container by specifying @@ -737,7 +737,7 @@ We have four ways to set user memory usage: memory=L<inf, memory-swap=2*L (specify memory without memory-swap) The container is not allowed to - use more than L bytes of memory, swap *plus* memory usage is double + use more than L bytes of memory, swap plus memory usage is double of that. @@ -747,7 +747,7 @@ We have four ways to set user memory usage: (specify both memory and memory-swap) The container is not allowed to - use more than L bytes of memory, swap *plus* memory usage is limited + use more than L bytes of memory, swap plus memory usage is limited by S.