1singularity(1)                                                  singularity(1)
2
3
4

NAME

6       singularity-instance-start  -  Start a named instance of the given con‐
7       tainer image
8
9
10

SYNOPSIS

12       singularity instance start [start options...]   [startscript args...]
13
14
15

DESCRIPTION

17       The instance start command allows you to create a  new  named  instance
18       from an
19         existing  container  image that will begin running in the background.
20       If a
21         startscript is defined in the container metadata the commands in that
22       script
23         will be executed with the instance start command as well. You can op‐
24       tionally
25         pass arguments to startscript
26
27
28       singularity instance start accepts the following container formats
29
30
31       *.sif               Singularity Image Format (SIF). Native to Singular‐
32       ity 3.0+
33
34
35       *.sqsh              SquashFS format.  Native to Singularity 2.4+
36
37
38       *.img               ext3 format. Native to Singularity versions < 2.4.
39
40
41       directory/           sandbox  format. Directory containing a valid root
42       file
43                             system and optionally Singularity meta-data.
44
45
46       instance://*        A local running instance of a container.  (See  the
47       instance
48                             command group.)
49
50
51       library://*         A SIF container hosted on a Library
52                             (default https://cloud.sylabs.io/library)
53
54
55       docker://*           A Docker/OCI container hosted on Docker Hub or an‐
56       other
57                             OCI registry.
58
59
60       shub://*            A container hosted on Singularity Hub.
61
62
63       oras://*            A SIF container hosted on an OCI registry that sup‐
64       ports
65                             the OCI Registry As Storage (ORAS) specification.
66
67
68

OPTIONS

70       --add-caps=""      a comma separated capability list to add
71
72
73       --allow-setuid[=false]       allow  setuid  binaries in container (root
74       only)
75
76
77       --apply-cgroups=""      apply cgroups from file for container processes
78       (root only)
79
80
81       -B, --bind=[]      a user-bind path specification.  spec has the format
82       src[:dest[:opts]], where src and dest are outside and inside paths.  If
83       dest  is not given, it is set equal to src.  Mount options ('opts') may
84       be specified as 'ro' (read-only) or 'rw' (read/write, which is the  de‐
85       fault). Multiple bind paths can be given by a comma separated list.
86
87
88       --blkio-weight=0       Block  IO relative weight in range 10-1000, 0 to
89       disable
90
91
92       --blkio-weight-device=[]      Device specific block IO relative weight
93
94
95       --boot[=false]      execute /sbin/init to boot container (root only)
96
97
98       -e, --cleanenv[=false]      clean environment before running container
99
100
101       --compat[=false]      apply settings for increased OCI/Docker  compati‐
102       bility.   Infers   --containall,   --no-init,   --no-umask,  --no-eval,
103       --writable-tmpfs.
104
105
106       -c, --contain[=false]      use minimal /dev and empty other directories
107       (e.g. /tmp and $HOME) instead of sharing filesystems from your host
108
109
110       -C,  --containall[=false]       contain not only file systems, but also
111       PID, IPC, and environment
112
113
114       --cpu-shares=-1      CPU shares for container
115
116
117       --cpus=""      Number of CPUs available to container
118
119
120       --cpuset-cpus=""      List of host CPUs available to container
121
122
123       --cpuset-mems=""      List of host memory nodes available to container
124
125
126       --disable-cache[=false]      dont use cache, and dont create cache
127
128
129       --dns=""      list of DNS server separated by  commas  to  add  in  re‐
130       solv.conf
131
132
133       --docker-host=""      specify a custom Docker daemon host
134
135
136       --docker-login[=false]      login to a Docker Repository interactively
137
138
139       --drop-caps=""      a comma separated capability list to drop
140
141
142       --env=[]      pass environment variable to contained process
143
144
145       --env-file=""       pass  environment  variables from file to contained
146       process
147
148
149       -f, --fakeroot[=false]      run container in new user namespace as  uid
150       0
151
152
153       --fusemount=[]       A  FUSE filesystem mount specification of the form
154       ': ' - where  is 'container' or 'host', specifying where the mount will
155       be  performed  ('container-daemon'  or  'host-daemon' will run the FUSE
156       process detached).  is the path to the FUSE  executable,  plus  options
157       for  the  mount.   is  the  location in the container to which the FUSE
158       mount will be attached. E.g. 'container:sshfs 10.0.0.1:/  /sshfs'.  Im‐
159       plies --pid.
160
161
162       -h, --help[=false]      help for start
163
164
165       -H,  --home="/builddir"       a home directory specification.  spec can
166       either be a src path or src:dest pair.  src is the source path  of  the
167       home directory outside the container and dest overrides the home direc‐
168       tory within the container.
169
170
171       --hostname=""      set container hostname. Infers --uts.
172
173
174       -i, --ipc[=false]      run container in a new IPC namespace
175
176
177       --keep-privs[=false]      let root user keep  privileges  in  container
178       (root only)
179
180
181       --memory=""      Memory limit in bytes
182
183
184       --memory-reservation=""      Memory soft limit in bytes
185
186
187       --memory-swap=""      Swap limit, use -1 for unlimited swap
188
189
190       --mount=[]       a mount specification e.g. 'type=bind,source=/opt,des‐
191       tination=/hostopt'.
192
193
194       -n, --net[=false]      run container in a new network  namespace  (sets
195       up a bridge network interface by default)
196
197
198       --network="bridge"       specify desired network type separated by com‐
199       mas, each network will bring up a dedicated interface inside container
200
201
202       --network-args=[]      specify network arguments to pass to CNI plugins
203
204
205       --no-eval[=false]      do not shell evaluate env vars or OCI  container
206       CMD/ENTRYPOINT/ARGS
207
208
209       --no-home[=false]       do  NOT  mount users home directory if /home is
210       not the current working directory
211
212
213       --no-https[=false]      use http instead of https for docker:// oras://
214       and library:///... URIs
215
216
217       --no-init[=false]      do NOT start shim process with --pid
218
219
220       --no-mount=[]       disable one or more 'mount xxx' options set in sin‐
221       gularity.conf, specify absolute destination path to disable a bind path
222       entry, or 'bind-paths' to disable all bind path entries.
223
224
225       --no-privs[=false]       drop  all  privileges  from  root user in con‐
226       tainer)
227
228
229       --no-setgroups[=false]      disable setgroups when entering  --fakeroot
230       user namespace
231
232
233       --no-umask[=false]       do  not  propagate umask to the container, set
234       default 0022 umask
235
236
237       --nv[=false]      enable Nvidia support
238
239
240       --nvccli[=false]      use nvidia-container-cli for GPU  setup  (experi‐
241       mental)
242
243
244       --oom-kill-disable[=false]      Disable OOM killer
245
246
247       -o,  --overlay=[]      use an overlayFS image for persistent data stor‐
248       age or as read-only layer of container
249
250
251       --passphrase[=false]      prompt for an encryption passphrase
252
253
254       --pem-path=""      enter an path to a PEM formatted RSA key for an  en‐
255       crypted container
256
257
258       --pid-file=""      write instance PID to the file with the given name
259
260
261       --pids-limit=0       Limit  number of container PIDs, use -1 for unlim‐
262       ited
263
264
265       --rocm[=false]      enable experimental Rocm support
266
267
268       -S, --scratch=[]      include a scratch directory within the  container
269       that is linked to a temporary dir (use -W to force location)
270
271
272       --security=[]       enable  security  features (SELinux, Apparmor, Sec‐
273       comp)
274
275
276       -u, --userns[=false]      run container in a new user namespace, allow‐
277       ing  Singularity to run completely unprivileged on recent kernels. This
278       disables some features of Singularity, for example it only  works  with
279       sandbox images.
280
281
282       --uts[=false]      run container in a new UTS namespace
283
284
285       -W,  --workdir=""       working directory to be used for /tmp, /var/tmp
286       and $HOME (if -c/--contain was also used)
287
288
289       -w, --writable[=false]      by default all Singularity  containers  are
290       available as read only. This option makes the file system accessible as
291       read/write.
292
293
294       --writable-tmpfs[=false]      makes the file system accessible as read-
295       write with non persistent data (with overlay support only)
296
297
298

EXAMPLE

300                $ singularity instance start /tmp/my-sql.sif mysql
301
302                $ singularity shell instance://mysql
303                Singularity my-sql.sif> pwd
304                /home/mibauer/mysql
305                Singularity my-sql.sif> ps
306                PID TTY          TIME CMD
307                  1 pts/0    00:00:00 sinit
308                  2 pts/0    00:00:00 bash
309                  3 pts/0    00:00:00 ps
310                Singularity my-sql.sif>
311
312                $ singularity instance stop /tmp/my-sql.sif mysql
313                Stopping /tmp/my-sql.sif mysql
314
315
316
317

SEE ALSO

319       singularity-instance(1)
320
321
322

HISTORY

324       18-Sep-2023 Auto generated by spf13/cobra
325
326
327
328Auto generated by spf13/cobra      Sep 2023                     singularity(1)
Impressum