Skip to content

Commit 3ab13a6

Browse files
author
Ruth Fuchss
committed
doc/config options: link to config options where possible
Signed-off-by: Ruth Fuchss <ruth.fuchss@canonical.com>
1 parent dd6e393 commit 3ab13a6

16 files changed

+42
-42
lines changed

doc/dev-lxd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ This never returns. Each notification is sent as a separate JSON object:
214214

215215
* Description: Download a public/cached image from the host
216216
* Return: raw image or error
217-
* Access: Requires `security.devlxd.images` set to `true`
217+
* Access: Requires {config:option}`instance-security:security.devlxd.images` set to `true`
218218

219219
Return value:
220220

doc/explanation/clustering.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ def instance_placement(request, candidate_members):
197197
return # Return empty to allow instance placement to proceed.
198198
```
199199

200-
The scriptlet must be applied to LXD by storing it in the `instances.placement.scriptlet` global configuration setting.
200+
The scriptlet must be applied to LXD by storing it in the {config:option}`server-miscellaneous:instances.placement.scriptlet` global configuration setting.
201201

202202
For example, if the scriptlet is saved inside a file called `instance_placement.star`, then it can be applied to LXD with the following command:
203203

doc/explanation/security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,14 +55,14 @@ The root user and all members of the `lxd` group can interact with the local dae
5555
### Access to the remote API
5656

5757
By default, access to the daemon is only possible locally.
58-
By setting the `core.https_address` configuration option, you can expose the same API over the network on a {abbr}`TLS (Transport Layer Security)` socket.
58+
By setting the {config:option}`server-core:core.https_address` configuration option, you can expose the same API over the network on a {abbr}`TLS (Transport Layer Security)` socket.
5959
See {ref}`server-expose` for instructions.
6060
Remote clients can then connect to LXD and access any image that is marked for public use.
6161

6262
There are several ways to authenticate remote clients as trusted clients to allow them to access the API.
6363
See {ref}`authentication` for details.
6464

65-
In a production setup, you should set `core.https_address` to the single address where the server should be available (rather than any address on the host).
65+
In a production setup, you should set {config:option}`server-core:core.https_address` to the single address where the server should be available (rather than any address on the host).
6666
In addition, you should set firewall rules to allow access to the LXD port only from authorized hosts/subnets.
6767

6868
(container-security)=

doc/howto/cluster_config_networks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
# How to configure networks for a cluster
33

44
All members of a cluster must have identical networks defined.
5-
The only configuration keys that may differ between networks on different members are [`bridge.external_interfaces`](network-bridge-options), [`parent`](ref-networks), [`bgp.ipv4.nexthop`](network-bridge-options) and [`bgp.ipv6.nexthop`](network-bridge-options).
5+
The only configuration keys that may differ between networks on different members are {config:option}`network-bridge-network-conf:bridge.external_interfaces`, {config:option}`network-physical-network-conf:parent`, {config:option}`network-bridge-network-conf:bgp.ipv4.nexthop`, and {config:option}`network-bridge-network-conf:bgp.ipv6.nexthop`.
66
See {ref}`clustering-member-config` for more information.
77

88
Creating additional networks is a two-step process:

doc/howto/cluster_manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ This command migrates all instances on the given server, moving them to other cl
7575
The evacuated cluster member is then transitioned to an "evacuated" state, which prevents the creation of any instances on it.
7676

7777
You can control how each instance is moved through the {config:option}`instance-miscellaneous:cluster.evacuate` instance configuration key.
78-
Instances are shut down cleanly, respecting the `boot.host_shutdown_timeout` configuration key.
78+
Instances are shut down cleanly, respecting the {config:option}`instance-boot:boot.host_shutdown_timeout` configuration key.
7979

8080
When the evacuated server is available again, use the [`lxc cluster restore`](lxc_cluster_restore.md) command to move the server back into a normal running state.
8181
This command also moves the evacuated instances back from the servers that were temporarily holding them.

doc/howto/instances_create.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -302,7 +302,7 @@ Lastly, attach the custom ISO volume to the VM using the following command:
302302
```
303303
````
304304

305-
The `boot.priority` configuration key ensures that the VM will boot from the ISO first.
305+
The {config:option}`device-disk-device-conf:boot.priority` configuration key ensures that the VM will boot from the ISO first.
306306
Start the VM and {ref}`connect to the console <instances-console>` as there might be a menu you need to interact with:
307307

308308
````{tabs}

doc/howto/instances_troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ The {doc}`container requirements <../container-environment>` specify that every
7171
If those directories don't exist, LXD cannot mount them, and `systemd` will then try to do so.
7272
As this is an unprivileged container, `systemd` does not have the ability to do this, and it then freezes.
7373
74-
So you can see the environment before anything is changed, and you can explicitly change the init system in a container using the `raw.lxc` configuration parameter.
74+
So you can see the environment before anything is changed, and you can explicitly change the init system in a container using the {config:option}`instance-raw:raw.lxc` configuration parameter.
7575
This is equivalent to setting `init=/bin/bash` on the Linux kernel command line.
7676
7777
lxc config set systemd raw.lxc 'lxc.init.cmd = /bin/bash'

doc/howto/network_bridge_resolved.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ If the system that runs LXD uses `systemd-resolved` to perform DNS lookups, you
1111
To do so, add the DNS servers and domains provided by a LXD network bridge to the `resolved` configuration.
1212

1313
```{note}
14-
The `dns.mode` option (see {ref}`network-bridge-options`) must be set to `managed` or `dynamic` if you want to use this feature.
14+
The {config:option}`network-bridge-network-conf:dns.mode` option must be set to `managed` or `dynamic` if you want to use this feature.
1515
16-
Depending on the configured `dns.domain`, you might need to disable DNSSEC in `resolved` to allow for DNS resolution.
16+
Depending on the configured {config:option}`network-bridge-network-conf:dns.domain`, you might need to disable DNSSEC in `resolved` to allow for DNS resolution.
1717
This can be done through the `DNSSEC` option in `resolved.conf`.
1818
```
1919

doc/howto/network_zones.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ For example: `lxc network zone set lxd.example.net peers.whatever.address=192.0.
6363
```{note}
6464
It is not enough for the address to be of the same machine that `dig` is calling from; it needs to
6565
match as a string with what the DNS server in `lxd` thinks is the exact remote address. `dig` binds to
66-
`0.0.0.0`, therefore the address you need is most likely the same that you provided to `core.dns_address`.
66+
`0.0.0.0`, therefore the address you need is most likely the same that you provided to {config:option}`server-core:core.dns_address`.
6767
```
6868

6969
For example, running `dig @<DNS_server_IP> -p <DNS_server_PORT> axfr lxd.example.net` might give the following output:

doc/howto/projects_work.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ For example, to move the instance `my-instance` from the `default` project to `m
7474

7575
### Copy a profile to another project
7676

77-
If you create a project with the default settings, profiles are isolated in the project ([`features.profiles`](project-features) is set to `true`).
77+
If you create a project with the default settings, profiles are isolated in the project ({config:option}`project-features:features.profiles` is set to `true`).
7878
Therefore, the project does not have access to the default profile (which is part of the `default` project), and you will see an error similar to the following when trying to create an instance:
7979

8080
```{terminal}

0 commit comments

Comments
 (0)