Skip to content

Commit bf2e84a

Browse files
author
preminger
committed
updated heading style
1 parent fa325b5 commit bf2e84a

22 files changed

+363
-363
lines changed

appendix.rst

+10-10
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
.. _appendix:
22

3-
##########
4-
Appendix
5-
##########
3+
########
4+
Appendix
5+
########
66

77
..
88
TODO oci & oci-archive along with http & https
99
1010
.. _singularity-environment-variables:
1111

12-
***************************************
13-
{Singularity}'s environment variables
14-
***************************************
12+
*************************************
13+
{Singularity}'s environment variables
14+
*************************************
1515

1616
{Singularity} 3.0 comes with some environment variables you can set or
1717
modify depending on your needs. You can see them listed alphabetically
@@ -400,9 +400,9 @@ below with their respective functionality.
400400

401401
.. _buildmodules:
402402

403-
***************
404-
Build Modules
405-
***************
403+
*************
404+
Build Modules
405+
*************
406406

407407
.. _build-library-module:
408408

@@ -989,7 +989,7 @@ The ``SINGULARITY_DOCKER_HOST`` or ``DOCKER_HOST`` environment variables may be
989989
set to instruct {{Singularity}} to pull images from a Docker daemon that is not
990990
running at the default location. For example, when using a virtualized Docker you may be instructed to set ``DOCKER_HOST`` e.g.
991991

992-
.. code::
992+
.. code::
993993
994994
To connect the Docker client to the Docker daemon, please set
995995
export DOCKER_HOST=tcp://192.168.59.103:2375

bind_paths_and_mounts.rst

+18-18
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
.. _bind-paths-and-mounts:
22

3-
#######################
4-
Bind Paths and Mounts
5-
#######################
3+
#####################
4+
Bind Paths and Mounts
5+
#####################
66

77
.. _sec:bindpaths:
88

@@ -12,9 +12,9 @@ Unless `disabled by the system administrator
1212
directories within your container using bind mounts. This allows you to
1313
read and write data on the host system with ease.
1414

15-
**********
16-
Overview
17-
**********
15+
********
16+
Overview
17+
********
1818

1919
When {Singularity} ‘swaps’ the host operating system for the one inside
2020
your container, the host file systems becomes inaccessible. However, you
@@ -23,9 +23,9 @@ container. To enable this functionality, {Singularity} will bind
2323
directories back into the container via two primary methods:
2424
system-defined bind paths and user-defined bind paths.
2525

26-
***************************
27-
System-defined bind paths
28-
***************************
26+
*************************
27+
System-defined bind paths
28+
*************************
2929

3030
The system administrator has the ability to define what bind paths will
3131
be included automatically inside each container. Some bind paths are
@@ -82,9 +82,9 @@ To disable all ``bind path`` entries set in ``singularity.conf``, use
8282
8383
.. _user-defined-bind-paths:
8484

85-
*************************
86-
User-defined bind paths
87-
*************************
85+
***********************
86+
User-defined bind paths
87+
***********************
8888

8989
Unless the system administrator has `disabled user control of binds
9090
<https://singularity-admindoc.readthedocs.io/en/latest/the_singularity_config_file.html#user-bind-control-boolean-default-yes>`_,
@@ -266,9 +266,9 @@ host ``$HOME`` directory with the ``--no-home`` flag.
266266
267267
$ singularity shell --containall my_container.sif
268268
269-
*************
270-
FUSE mounts
271-
*************
269+
***********
270+
FUSE mounts
271+
***********
272272

273273
Filesystem in Userspace (FUSE) is an interface to allow filesystems to
274274
be mounted using code that runs in userspace, rather than in the Linux
@@ -373,9 +373,9 @@ added to your container, you can use the ``container`` mount type:
373373
Singularity> cat /server/etc/hostname
374374
server
375375
376-
**************
377-
Image Mounts
378-
**************
376+
************
377+
Image Mounts
378+
************
379379

380380
In {Singularity} 3.6 and above you can mount a directory contained in an
381381
image file into a container. This may be useful if you want to

build_env.rst

+21-21
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
.. _build-environment:
22

3-
###################
4-
Build Environment
5-
###################
3+
#################
4+
Build Environment
5+
#################
66

77
.. _sec:buildenv:
88

9-
**********
10-
Overview
11-
**********
9+
********
10+
Overview
11+
********
1212

1313
You may wish to customize your build environment by doing things such as
1414
specifying a custom cache directory for images or sending your Docker
@@ -17,9 +17,9 @@ other topics related to the build environment.
1717

1818
.. _sec:cache:
1919

20-
***************
21-
Cache Folders
22-
***************
20+
*************
21+
Cache Folders
22+
*************
2323

2424
{Singularity} will cache SIF container images generated from remote
2525
sources, and any OCI/docker layers used to create them. The cache is
@@ -102,9 +102,9 @@ file:
102102
103103
rm ~/.local/share/containers/cache/blob-info-cache-v1.boltdb
104104
105-
****************
106-
Cache commands
107-
****************
105+
**************
106+
Cache commands
107+
**************
108108

109109
The ``cache`` command for {Singularity} allows you to view and clean up
110110
your cache, without manually inspecting the cache directories.
@@ -212,9 +212,9 @@ use the ``type`` / ``-T`` option:
212212
213213
.. _sec:temporaryfolders:
214214

215-
*******************
216-
Temporary Folders
217-
*******************
215+
*****************
216+
Temporary Folders
217+
*****************
218218

219219
When building a container, or pulling/running a {Singularity} container
220220
from a Docker/OCI source, a temporary working space is required. The
@@ -250,19 +250,19 @@ Remember to use ``-E`` option to pass the value of
250250
Set ``SINGULARITY_TMPDIR`` to a disk location, or disable the
251251
``tmpfs`` ``/tmp`` mount on your system if you experience problems.
252252

253-
**********************
254-
Encrypted Containers
255-
**********************
253+
********************
254+
Encrypted Containers
255+
********************
256256

257257
Beginning in {Singularity} 3.4.0 it is possible to build and run
258258
encrypted containers. The containers are decrypted at runtime entirely
259259
in kernel space, meaning that no intermediate decrypted data is ever
260260
present on disk or in memory. See :ref:`encrypted containers
261261
<encryption>` for more details.
262262

263-
***********************
264-
Environment Variables
265-
***********************
263+
*********************
264+
Environment Variables
265+
*********************
266266

267267
#. If a flag is represented by both a CLI option and an environment
268268
variable, and both are set, the CLI option will always take

cgroups.rst

+26-26
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
.. _cgroups:
22

3-
##############################
4-
Limiting Container Resources
5-
##############################
3+
############################
4+
Limiting Container Resources
5+
############################
66

77
It's often useful to limit the resources that are consumed by a container, e.g.
88
to allow the container to only use 1 CPU, or 50% of the RAM on the system.
@@ -23,16 +23,16 @@ There are three ways to apply limits to a container that is run with
2323
{Singularity}:
2424

2525
* Using the command line flags introduced in v3.10.
26-
26+
2727
* Using the ``--apply-cgroups`` flag to apply a ``cgroups.toml`` file that
2828
defines the resource limits.
2929

3030
* Using external tools such as ``systemd-run`` tool to apply limits, and then
3131
call ``singularity``.
3232

33-
******************************
34-
Requirements - Linux Cgroups
35-
******************************
33+
****************************
34+
Requirements - Linux Cgroups
35+
****************************
3636

3737
Resource limits are applied to containers using functionality in the Linux
3838
kernel known as *control groups* or *cgroups*. There are two versions of
@@ -63,9 +63,9 @@ about this.
6363

6464
.. _cgroup_flags:
6565

66-
***************************
67-
Command Line Limit Flags
68-
***************************
66+
*************************
67+
Command Line Limit Flags
68+
*************************
6969

7070
{Singularity} 3.10 introduced a number of simple command line flags that you can
7171
use with `shell/run/exec` and the `instance` commands to directly apply resource
@@ -88,7 +88,7 @@ use. The minimum is ``0.01`` or one tenth of a physical CPU. The maximum is the
8888
number of CPU cores on your system.
8989

9090
.. code::
91-
91+
9292
# Limit container to 3.5 CPUs
9393
$ singularity run --cpus 3.5 myfirstapp.sif
9494
@@ -100,7 +100,7 @@ there is contention for CPUs*, i.e. the containers are able to consume more CPU
100100
time than is available.
101101

102102
.. code::
103-
103+
104104
# Container A - twice as much CPU priority as container B
105105
$ singularity run --cpu-shares 1024 myfirstapp.sif
106106
@@ -115,7 +115,7 @@ run. For example, on a dual CPU system you might pin one container to the first
115115
should generally be set to the same value as ``--cpu-set-cpus``.
116116

117117
.. code::
118-
118+
119119
# Container A - first CPU
120120
$ singularity run --cpu-set-cpus 0-11 --cpu-set-mems 0-11 myfirstapp.sif
121121
@@ -130,7 +130,7 @@ You can use suffixes such as ``M`` or ``G`` to specify megabytes or gigabytes.
130130
If the container tries to use more memory than its limit, the system will kill
131131
it.
132132

133-
.. code::
133+
.. code::
134134
135135
# Run a program that will use 10GB of RAM, with a 100MB limit
136136
$ singularity exec --memory 100M memhog.sif memhog 10G
@@ -140,7 +140,7 @@ it.
140140
limit set with ``--memory``. When there is contention for memory, the system
141141
will attempt to make sure the container doesn't exceed the soft limit.
142142

143-
.. code::
143+
.. code::
144144
145145
# Kill my program if it exceeds 10G, but aim for 8G if there is contention
146146
$ singularity exec --memory 10G --memory-reservation 8G myfirstapp.sif
@@ -169,7 +169,7 @@ value of ``-1`` means *unlimited swap*. If ``--memory-swap`` is not set or is
169169
IO Limits
170170
=========
171171

172-
.. note::
172+
.. note::
173173

174174
Requires the ``cfq`` or ``bfq`` IO scheduler to be configured for block IO on
175175
the system. This is common on modern distributions, but not universal. Ask
@@ -182,7 +182,7 @@ is contention for I/O with other containers. It may be useful to give high
182182
priority to a container that needs infrequent but time sensitive data access,
183183
running alongside an application that is continuously performing bulk reads.
184184

185-
.. code::
185+
.. code::
186186
187187
# Container A - ten times as much block IO priority as container B
188188
$ singularity run --blkio-weight 1000 myfirstapp.sif
@@ -193,17 +193,17 @@ running alongside an application that is continuously performing bulk reads.
193193
``--blkio-weight-device`` sets a relative weight for the container when performing
194194
block I/O on a specific device. Specify the device and weight as ``<device path>:weight``:
195195

196-
.. code::
196+
.. code::
197197
198198
# Container A - ten times as much block IO priority as container B on disk /dev/sda
199199
$ singularity run --blkio-weight-device /dev/sda:1000 myfirstapp.sif
200200
201201
# Container A - ten times less block IO priority as container A on disk /dev/sda
202202
$ singularity run --blkio-weight-device /dev/sda:100 mysecondapp.sif
203203
204-
********************************************
205-
Applying Resource Limits From a TOML file
206-
********************************************
204+
******************************************
205+
Applying Resource Limits From a TOML file
206+
******************************************
207207

208208
{Singularity} 3.9 and above can directly apply resource limitations to systems
209209
configured for both cgroups v1 and the v2 unified hierarchy, using the
@@ -227,7 +227,7 @@ configuration to be applied:
227227
228228
$ singularity shell --apply-cgroups /path/to/cgroups.toml my_container.sif
229229
230-
.. note::
230+
.. note::
231231

232232
Using ``--apply-cgroups`` as a non-root user requires a cgroups v2 system,
233233
configured to use the ``systemd cgroups`` manager in ``singularity.conf``.
@@ -379,7 +379,7 @@ is specified in bytes per second.
379379
Device Limits
380380
=============
381381

382-
.. note::
382+
.. note::
383383

384384
Device limits can only be applied when running as the root user, and will be
385385
ignored as a non-root user.
@@ -417,9 +417,9 @@ https://github.com/opencontainers/runtime-spec/blob/master/config-linux.md#contr
417417
for information about the available limits. Note that {Singularity} uses
418418
TOML format for the configuration file, rather than JSON.
419419

420-
**********************************************
421-
Applying Resource Limits With External Tools
422-
**********************************************
420+
********************************************
421+
Applying Resource Limits With External Tools
422+
********************************************
423423

424424
Because {Singularity} starts a container as a simple process, rather
425425
than using a daemon, you can limit resource usage by running the

cli.rst

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
.. _cli:
22

3-
########################
4-
Command Line Interface
5-
########################
3+
######################
4+
Command Line Interface
5+
######################
66

77
Below are links to the automatically generated CLI docs
88

0 commit comments

Comments
 (0)