Skip to content

Latest commit

 

History

History
73 lines (48 loc) · 9.22 KB

setup.md

File metadata and controls

73 lines (48 loc) · 9.22 KB

Setup

{% hint style="info" %} The Host Setup section is only available to Docker Standalone environments. {% endhint %}

Under Setup, you can make changes to your environment, enabling and disabling features and security settings.

Host and Filesystem

For environments running the Portainer Agent, this section is where you configure how Portainer interacts with elements of the host.

{% hint style="danger" %} For security, these features are disabled by default. Be sure that you understand their impact before enabling them. {% endhint %}

Enable host management features

Enabling host management features allows you to see the available devices and storage on the physical node as well as browse the node's filesystem. The environment must be running the Portainer Agent to use this functionality, and the root of the host must be bind-mounted to/host in the agent deployment:

-v /:/host

For example, starting the Portainer Agent on Linux with the host filesystem mounted at /host:

docker run -d -p 9001:9001 --name portainer_agent --restart=always -v /var/run/docker.sock:/var/run/docker.sock -v /var/lib/docker/volumes:/var/lib/docker/volumes -v /:/host portainer/agent:latest

Enable volume management for non-administrators

Enabling this feature allows non-administrator users to manage volumes on an environment. If this is disabled, users below administrator level have read-only access to volumes.

Change Window Settings

This setting allows you to specify a window within which GitOps updates to your applications can be applied.

{% hint style="warning" %} If this setting is enabled and an update is made to an application outside of this window, it will not be applied. {% endhint %}

Docker Security Settings

This section allows you to toggle assorted Docker-related security settings for the environment.

Option Overview
Disable bind mounts for non-administrators Prevents non-admin users within Portainer from using bind mounts when creating containers and/or services/stacks. When toggled on, the option to attach to a host file system path is removed.
Disable privileged mode for non-administrators Prevents non-admin users from elevating the privilege of a container to bypass SELinux/AppArmor. When toggled on, the option to select Privileged mode when adding a container is removed.
Disable the use of host PID 1 for non-administrators Prevents non-admin users from requesting that a deployed container operates as the host PID. This is a security risk if used by a non-trustworthy authorized user because when they operate as PID1, they are in effect able to run any command in the container console as root on the host.
Disable the use of Stacks for non-administrators This is a 'sledgehammer' approach to removing any possibility for non-admin users within Portainer to find and use weaknesses in the Docker architecture. Whilst Portainer has the ability to disable some of the more common exploits, we cannot possibly block them all because there are any number of capabilities that could be added to a container to attempt to gain access to the host. This feature simply allows an admin to disable all possible entry points.
Disable device mappings for non-administrators Blocks users from mapping host devices into containers. Whilst the ability to map devices is generally used for good (e.g. mapping a GPU into a container), it can equally be used by non-trustworthy authorized users to map a physical storage device into a container. It is possible to mount /dev/sda1 into a container, and then from a console of that container, the user would have complete access to the sda1 device without restriction. By toggling this on, Portainer blocks the ability for non-admins to map ANY devices into containers.
Disable container capabilities for non-administrators Toggle on to hide the Container capabilities tab for non-administrators when they are adding a container.
Disable sysctl settings for non-administrators Toggle on to stop non-admin users from using sysctl options, preventing them from recreating, duplicating or editing containers.

Other

This section contains other assorted environment-specific settings.

Option Overview
Show GPU in the UI Toggle on to enable GPU assignments in the Portainer UI. This adds additional processing to the container and stack listing pages, so if you are not using GPUs on your environment we recommend toggling this off.
Add GPU

When Show GPU in the UI is toggled on, click Add GPU to add GPUs to your environment for use by your containers.
To add a GPU, provide a name for the GPU and an index or UUID to reference the GPU.

Show an image(s) up to date indicator for Stacks, Services and Containers

Toggle on to enable the new image indicator feature for this environment. Toggle off to disable the feature.

This feature is only available in Portainer Business Edition.