Provided by: podman_3.4.4+ds1-1ubuntu1.22.04.3_amd64 bug

NAME

       podman-pod-create - Create a new pod

SYNOPSIS

       podman pod create [options]

DESCRIPTION

       Creates  an  empty pod, or unit of multiple containers, and prepares it to have containers
       added to it. The pod id is printed to  STDOUT.  You  can  then  use  podman  create  --pod
       <pod_id|pod_name> ... to add containers to the pod, and podman pod start <pod_id|pod_name>
       to start the pod.

OPTIONS

   --add-host=host:ip
       Add a host to the /etc/hosts file shared between all containers in the pod.

   --cgroup-parent=path
       Path to cgroups under which the cgroup for the pod will be created. If  the  path  is  not
       absolute,  the  path is considered to be relative to the cgroups path of the init process.
       Cgroups will be created if they do not already exist.

   --dns=ipaddr
       Set custom DNS servers in the /etc/resolv.conf  file  that  will  be  shared  between  all
       containers  in  the  pod.  A  special option, "none" is allowed which disables creation of
       /etc/resolv.conf for the pod.

   --dns-opt=option
       Set custom DNS options in the /etc/resolv.conf  file  that  will  be  shared  between  all
       containers in the pod.

   --dns-search=domain
       Set custom DNS search domains in the /etc/resolv.conf file that will be shared between all
       containers in the pod.

   --gidmap=container_gid:host_gid:amount
       GID map for the user namespace. Using this flag will run the container with user namespace
       enabled. It conflicts with the --userns and --subgidname flags.

   --uidmap=container_uid:from_uid:amount
       Run  the  container  in  a  new  user  namespace  using  the supplied mapping. This option
       conflicts with the --userns and --subuidname options. This option provides a  way  to  map
       host UIDs to container UIDs. It can be passed several times to map different ranges.

   --subgidname=name
       Name  for  GID  map from the /etc/subgid file. Using this flag will run the container with
       user namespace enabled. This flag conflicts with --userns and --gidmap.

   --subuidname=name
       Name for UID map from the /etc/subuid file. Using this flag will run  the  container  with
       user namespace enabled. This flag conflicts with --userns and --uidmap.

   --help, -h
       Print usage statement.

   --hostname=name
       Set a hostname to the pod

   --infra=true|false
       Create  an  infra  container  and  associate  it  with  the  pod.  An infra container is a
       lightweight container used to coordinate the shared kernel namespace of  a  pod.  Default:
       true.

   --infra-conmon-pidfile=file
       Write  the  pid  of  the  infra  container's conmon process to a file. As conmon runs in a
       separate process than Podman, this is  necessary  when  using  systemd  to  manage  Podman
       containers and pods.

   --infra-command=command
       The command that will be run to start the infra container. Default: "/pause".

   --infra-image=image
       The image that will be created for the infra container. Default: "k8s.gcr.io/pause:3.1".

   --infra-name=name
       The name that will be used for the pod's infra container.

   --ip=ipaddr
       Set a static IP for the pod's shared network.

   --label=label, -l
       Add metadata to a pod (e.g., --label com.example.key=value).

   --label-file=label
       Read in a line delimited file of labels.

   --mac-address=address
       Set a static MAC address for the pod's shared network.

   --name=name, -n
       Assign a name to the pod.

   --network=mode, --net
       Set  network  mode  for the pod. Supported values are: - bridge: Create a network stack on
       the default bridge. This is the default for rootfull containers.  - none: Create a network
       namespace  for  the  container  but  do  not configure network interfaces for it, thus the
       container has no network connectivity.  - host: Do not create  a  network  namespace,  all
       containers in the pod will use the host's network. Note: the host mode gives the container
       full access to local system services such as D-bus and is therefore  considered  insecure.
       - network: Connect to a user-defined network, multiple networks should be comma-separated.
       - private: Create a new namespace for the container. This will use  the  bridge  mode  for
       rootfull  containers  and slirp4netns for rootless ones.  - slirp4netns[:OPTIONS,...]: use
       slirp4netns(1) to  create  a  user  network  stack.  This  is  the  default  for  rootless
       containers. It is possible to specify these additional options:
         -  allow_host_loopback=true|false:  Allow  the slirp4netns to reach the host loopback IP
       (10.0.2.2, which is added to /etc/hosts as host.containers.internal for your convenience).
       Default is false.
         - mtu=MTU: Specify the MTU to use for this network. (Default is 65520).
         - cidr=CIDR: Specify ip range to use for this network. (Default is 10.0.2.0/24).
         - enable_ipv6=true|false: Enable IPv6. Default is false. (Required for outbound_addr6).
         -  outbound_addr=INTERFACE:  Specify  the  outbound interface slirp should bind to (ipv4
       traffic only).
         - outbound_addr=IPv4: Specify the outbound ipv4 address slirp should bind to.
         - outbound_addr6=INTERFACE: Specify the outbound interface slirp should  bind  to  (ipv6
       traffic only).
         - outbound_addr6=IPv6: Specify the outbound ipv6 address slirp should bind to.
         - port_handler=rootlesskit: Use rootlesskit for port forwarding. Default.
         Note:  Rootlesskit  changes the source IP address of incoming packets to a IP address in
       the container network namespace, usually 10.0.2.100. If your application requires the real
       source IP address, e.g. web server logs, use the slirp4netns port handler. The rootlesskit
       port handler is also used for rootless containers when connected to user-defined networks.
         - port_handler=slirp4netns: Use the slirp4netns  port  forwarding,  it  is  slower  than
       rootlesskit  but preserves the correct source IP address. This port handler cannot be used
       for user-defined networks.

   --network-alias=strings
       Add a DNS alias for the pod. When the pod is joined to a CNI network with support for  the
       dnsname  plugin,  the  containers inside the pod will be accessible through this name from
       other containers in the network.

   --no-hosts=true|false
       Disable creation of /etc/hosts for the pod.

   --pid=pid
       Set the PID mode for the pod. The default is to create a private  PID  namespace  for  the
       pod. Requires the PID namespace to be shared via --share.

              host: use the host’s PID namespace for the pod
              ns: join the specified PID namespace
              private: create a new namespace for the pod (default)

   --pod-id-file=path
       Write the pod ID to the file.

   --publish=port, -p
       Publish a port or range of ports from the pod to the host.

       Format:   ip:hostPort:containerPort   |   ip::containerPort   |  hostPort:containerPort  |
       containerPort Both hostPort and containerPort can be specified as a range of ports.   When
       specifying  ranges  for  both,  the  number of container ports in the range must match the
       number of host ports in the range.  Use podman port to see the actual mapping: podman port
       CONTAINER $CONTAINERPORT.

       NOTE: This cannot be modified once the pod is created.

   --replace=true|false
       If  another  pod with the same name already exists, replace and remove it.  The default is
       false.

   --share=namespace
       A comma-separated list of kernel namespaces to share. If  none  or  ""  is  specified,  no
       namespaces will be shared. The namespaces to choose from are ipc, net, pid, uts.

       The    operator   can   identify   a   pod   in   three   ways:   UUID   long   identifier
       (“f78375b1c487e03c9438c729345e54db9d20cfa2ac1fc3494b6eb60872e74778”) UUID short identifier
       (“f78375b1c487”) Name (“jonah”)

       podman  generates a UUID for each pod, and if a name is not assigned to the container with
       --name then a random string name will be generated for it. The name is  useful  any  place
       you need to identify a pod.

   --userns=mode
       Set  the  user  namespace  mode  for  all  the  containers  in  a  pod. It defaults to the
       PODMAN_USERNS environment  variable.  An  empty  value  ("")  means  user  namespaces  are
       disabled.

       Valid mode values are:

              • auto[:OPTIONS,...]:  automatically  create a namespace. It is possible to specify
                these options to auto:

                • gidmapping=_CONTAINER_GID:HOSTGID:SIZE to force a GID mapping to be present  in
                  the user namespace.

                • size=SIZE:  to  specify an explicit size for the automatic user namespace. e.g.
                  --userns=auto:size=8192. If size is not specified, auto will  estimate  a  size
                  for the user namespace.

                • uidmapping=_CONTAINER_UID:HOSTUID:SIZE  to force a UID mapping to be present in
                  the user namespace.

              • host: run in the user namespace of the  caller.  The  processes  running  in  the
                container will have the same privileges on the host as any other process launched
                by the calling user (default).

              • keep-id: creates a user namespace where the current rootless user's  UID:GID  are
                mapped to the same values in the container. This option is ignored for containers
                created by the root user.

EXAMPLES

              $ podman pod create --name test

              $ podman pod create --infra=false

              $ podman pod create --infra-command /top

              $ podman pod create --publish 8443:443

              $ podman pod create --network slirp4netns:outbound_addr=127.0.0.1,allow_host_loopback=true

              $ podman pod create --network slirp4netns:cidr=192.168.0.0/24

SEE ALSO

       podman-pod(1)

HISTORY

       July 2018, Originally compiled by Peter Hunt pehunt@redhat.commailto:pehunt@redhat.compodman-pod-create(1)()