@@ -9,8 +9,8 @@ a site manager must enable CVMs. To do so:
9
9
1 . Go to ** Manage > Admin > Infrastructure** .
10
10
1 . Toggle the ** Enable Container-Based Virtual Machines** option to ** Enable** .
11
11
12
- This section describes the customization features that Coder offers for CVMs as
13
- well :
12
+ This section also describes the customization features that Coder offers for
13
+ CVMs :
14
14
15
15
![ CVM Settings] ( ../../../assets/admin/cvm-settings.png )
16
16
@@ -25,7 +25,7 @@ To improve the startup time for CVM-based workspaces, you can enable caching.
25
25
Cached CVMs require the ` shiftfs ` kernel to be present on the node. Some
26
26
distributions (such as Ubuntu) include ` shiftfs ` . If you're unsure if ` shiftfs `
27
27
is present on your nodes, you can check by running ` modinfo shiftfs ` . If no
28
- output is returned, then you do not have ` shiftfs ` installed.
28
+ output is returned, you do not have ` shiftfs ` installed.
29
29
30
30
If you don't want to install ` shiftfs ` yourself, you can have Coder install the
31
31
module automatically for you. ** It is important that you do not have secure boot
@@ -39,10 +39,10 @@ install `shiftfs` on your behalf.**
39
39
> Self-contained workspace builds are currently an ** alpha** feature.
40
40
41
41
By default, Coder initializes workspaces by running commands inside the
42
- container. When you enable [ self-contained workspace builds ] , workspaces control
43
- the initialization sequence instead . This enables operation on clusters that
44
- restrict command execution inside containers using the Kubernetes API, such as
45
- with the ` kubectl exec ` command.
42
+ container. Workspaces, however, control the initialization sequence instead when
43
+ you enable [ self-contained workspace builds ] . This enables cluster operations
44
+ that restrict command execution inside containers using the Kubernetes API, such
45
+ as the ` kubectl exec ` command.
46
46
47
47
[ self-contained workspace builds ] : ../self-contained-builds.md
48
48
@@ -61,39 +61,39 @@ workspace container.
61
61
62
62
Coder allows the creation of custom network interfaces using the Linux TUN
63
63
device. When using the ** Enable TUN device** setting, Coder workspaces will have
64
- a ` /dev/net/tun ` device mounted into the workspace at build time. A TUN device
65
- is often required for VPN usage .
64
+ a ` /dev/net/tun ` device mounted into the workspace at build time. VPN usage
65
+ often requires a TUN device .
66
66
67
- Users may need root (or ` sudo ` ) access within their workspace to be able to use
68
- the TUN device and start a VPN client.
67
+ Users may need root (or ` sudo ` ) access within their workspace to use the TUN
68
+ device and start a VPN client.
69
69
70
- > At this time, Coder does not support TUN devices for other workspace types
71
- > ( such as EC2 or Docker) .
70
+ > At this time, Coder does not support TUN devices for non-Kubernetes workspace
71
+ > types, such as EC2 or Docker.
72
72
>
73
73
> If you're working with EC2 workspaces, we recommend enabling privileged mode
74
74
> in the workspace provider settings, which will allow users to create their own
75
75
> TUN device.
76
76
77
77
We've tested this feature using the [ Tailscale] ( https://tailscale.com/ ) VPN
78
- within Coder. Keep in mind that you may have to change your VPN settings to keep
79
- any persistent files (such as configuration/identity) files in your home volume,
80
- as any data outside the home volume is cleared when the workspace is rebuilt.
78
+ within Coder. Remember that you may have to change your VPN settings to keep any
79
+ persistent files (such as configuration/identity) files in your home volume, as
80
+ any data outside the home volume is cleared when the workspace is rebuilt.
81
81
82
82
## FUSE device
83
83
84
- > FUSE devices currently an ** alpha** feature.
84
+ > FUSE devices are currently an ** alpha** feature.
85
85
86
86
Coder allows the creation of custom filesystems using the Linux FUSE userspace
87
- filesystem device. When using the ** Enable FUSE device** setting, Coder
87
+ filesystem device. By enabling the ** Enable FUSE device** setting, Coder
88
88
workspaces will have a ` /dev/fuse ` device mounted into the workspace at build
89
89
time. These devices are often used to mount specialized filesystems, such as
90
90
Google Cloud Storage buckets, to your workspace.
91
91
92
- Users may need root (or ` sudo ` ) access within their workspace to be able to use
93
- the FUSE device and start a FUSE filesystem.
92
+ Users may need root (or ` sudo ` ) access within their workspace to use the FUSE
93
+ device and start a FUSE filesystem.
94
94
95
- > At this time, Coder does not support FUSE devices for other workspace types
96
- > ( such as EC2 or Docker) .
95
+ > At this time, Coder does not support FUSE devices for non-Kubernetes workspace
96
+ > types, such as EC2 or Docker.
97
97
>
98
98
> If you're working with EC2 workspaces, we recommend enabling privileged mode
99
99
> in the workspace provider settings, which will allow users to create their own
@@ -106,6 +106,6 @@ mkdir /tmp/mnt
106
106
sshfs user@host:/ /tmp/mnt
107
107
```
108
108
109
- Then in a second terminal run ` ls /tmp/mnt ` to list the files from the remote
109
+ Then, in a second terminal, run ` ls /tmp/mnt ` to list the files from the remote
110
110
host. You should also be able to see a ` fuse.sshfs ` entry in the output from the
111
111
` mount ` command.
0 commit comments