@@ -9,8 +9,8 @@ a site manager must enable CVMs. To do so:
991 . Go to ** Manage > Admin > Infrastructure** .
10101 . Toggle the ** Enable Container-Based Virtual Machines** option to ** Enable** .
1111
12- This section describes the customization features that Coder offers for CVMs as
13- well :
12+ This section also describes the customization features that Coder offers for
13+ CVMs :
1414
1515![ CVM Settings] ( ../../../assets/admin/cvm-settings.png )
1616
@@ -25,7 +25,7 @@ To improve the startup time for CVM-based workspaces, you can enable caching.
2525Cached CVMs require the ` shiftfs ` kernel to be present on the node. Some
2626distributions (such as Ubuntu) include ` shiftfs ` . If you're unsure if ` shiftfs `
2727is present on your nodes, you can check by running ` modinfo shiftfs ` . If no
28- output is returned, then you do not have ` shiftfs ` installed.
28+ output is returned, you do not have ` shiftfs ` installed.
2929
3030If you don't want to install ` shiftfs ` yourself, you can have Coder install the
3131module automatically for you. ** It is important that you do not have secure boot
@@ -39,10 +39,10 @@ install `shiftfs` on your behalf.**
3939> Self-contained workspace builds are currently an ** alpha** feature.
4040
4141By default, Coder initializes workspaces by running commands inside the
42- container. When you enable [ self-contained workspace builds ] , workspaces control
43- the initialization sequence instead . This enables operation on clusters that
44- restrict command execution inside containers using the Kubernetes API, such as
45- with the ` kubectl exec ` command.
42+ container. Workspaces, however, control the initialization sequence instead when
43+ you enable [ self-contained workspace builds ] . This enables cluster operations
44+ that restrict command execution inside containers using the Kubernetes API, such
45+ as the ` kubectl exec ` command.
4646
4747[ self-contained workspace builds ] : ../self-contained-builds.md
4848
@@ -61,39 +61,39 @@ workspace container.
6161
6262Coder allows the creation of custom network interfaces using the Linux TUN
6363device. When using the ** Enable TUN device** setting, Coder workspaces will have
64- a ` /dev/net/tun ` device mounted into the workspace at build time. A TUN device
65- is often required for VPN usage .
64+ a ` /dev/net/tun ` device mounted into the workspace at build time. VPN usage
65+ often requires a TUN device .
6666
67- Users may need root (or ` sudo ` ) access within their workspace to be able to use
68- the TUN device and start a VPN client.
67+ Users may need root (or ` sudo ` ) access within their workspace to use the TUN
68+ device and start a VPN client.
6969
70- > At this time, Coder does not support TUN devices for other workspace types
71- > ( such as EC2 or Docker) .
70+ > At this time, Coder does not support TUN devices for non-Kubernetes workspace
71+ > types, such as EC2 or Docker.
7272>
7373> If you're working with EC2 workspaces, we recommend enabling privileged mode
7474> in the workspace provider settings, which will allow users to create their own
7575> TUN device.
7676
7777We've tested this feature using the [ Tailscale] ( https://tailscale.com/ ) VPN
78- within Coder. Keep in mind that you may have to change your VPN settings to keep
79- any persistent files (such as configuration/identity) files in your home volume,
80- as any data outside the home volume is cleared when the workspace is rebuilt.
78+ within Coder. Remember that you may have to change your VPN settings to keep any
79+ persistent files (such as configuration/identity) files in your home volume, as
80+ any data outside the home volume is cleared when the workspace is rebuilt.
8181
8282## FUSE device
8383
84- > FUSE devices currently an ** alpha** feature.
84+ > FUSE devices are currently an ** alpha** feature.
8585
8686Coder allows the creation of custom filesystems using the Linux FUSE userspace
87- filesystem device. When using the ** Enable FUSE device** setting, Coder
87+ filesystem device. By enabling the ** Enable FUSE device** setting, Coder
8888workspaces will have a ` /dev/fuse ` device mounted into the workspace at build
8989time. These devices are often used to mount specialized filesystems, such as
9090Google Cloud Storage buckets, to your workspace.
9191
92- Users may need root (or ` sudo ` ) access within their workspace to be able to use
93- the FUSE device and start a FUSE filesystem.
92+ Users may need root (or ` sudo ` ) access within their workspace to use the FUSE
93+ device and start a FUSE filesystem.
9494
95- > At this time, Coder does not support FUSE devices for other workspace types
96- > ( such as EC2 or Docker) .
95+ > At this time, Coder does not support FUSE devices for non-Kubernetes workspace
96+ > types, such as EC2 or Docker.
9797>
9898> If you're working with EC2 workspaces, we recommend enabling privileged mode
9999> in the workspace provider settings, which will allow users to create their own
@@ -106,6 +106,6 @@ mkdir /tmp/mnt
106106sshfs user@host:/ /tmp/mnt
107107```
108108
109- Then in a second terminal run ` ls /tmp/mnt ` to list the files from the remote
109+ Then, in a second terminal, run ` ls /tmp/mnt ` to list the files from the remote
110110host. You should also be able to see a ` fuse.sshfs ` entry in the output from the
111111` mount ` command.
0 commit comments