.\" Man page generated from reStructuredText. . . .nr rst2man-indent-level 0 . .de1 rstReportMargin \\$1 \\n[an-margin] level \\n[rst2man-indent-level] level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] - \\n[rst2man-indent0] \\n[rst2man-indent1] \\n[rst2man-indent2] .. .de1 INDENT .\" .rstReportMargin pre: . RS \\$1 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] . nr rst2man-indent-level +1 .\" .rstReportMargin post: .. .de UNINDENT . RE .\" indent \\n[an-margin] .\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] .nr rst2man-indent-level -1 .\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] .in \\n[rst2man-indent\\n[rst2man-indent-level]]u .. .TH "MOUNT.CEPH" "8" "Feb 16, 2023" "dev" "Ceph" .SH NAME mount.ceph \- mount a Ceph file system .SH SYNOPSIS .nf \fBmount.ceph\fP [\fImon1_socket\fP,\fImon2_socket\fP,...]:/[\fIsubdir\fP] \fIdir\fP [ \-o \fIoptions\fP ] .fi .sp .SH DESCRIPTION .sp \fBmount.ceph\fP is a helper for mounting the Ceph file system on a Linux host. It serves to resolve monitor hostname(s) into IP addresses and read authentication keys from disk; the Linux kernel client component does most of the real work. In fact, it is possible to mount a non\-authenticated Ceph file system without mount.ceph by specifying monitor address(es) by IP: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount \-t ceph 1.2.3.4:/ /mnt/mycephfs .ft P .fi .UNINDENT .UNINDENT .sp The first argument is the device part of the mount command. It includes host\(aqs socket and path within CephFS that will be mounted at the mount point. The socket, obviously, takes the form ip_address[:port]. If the port is not specified, the Ceph default of 6789 is assumed. Multiple monitor addresses can be passed by separating them by commas. Only one monitor is needed to mount successfully; the client will learn about all monitors from any responsive monitor. However, it is a good idea to specify more than one in case the one happens to be down at the time of mount. .sp If the host portion of the device is left blank, then \fBmount.ceph\fP will attempt to determine monitor addresses using local configuration files and/or DNS SRV records. In similar way, if authentication is enabled on Ceph cluster (which is done using CephX) and options \fBsecret\fP and \fBsecretfile\fP are not specified in the command, the mount helper will spawn a child process that will use the standard Ceph library routines to find a keyring and fetch the secret from it. .sp A sub\-directory of the file system can be mounted by specifying the (absolute) path to the sub\-directory right after \(dq:\(dq after the socket in the device part of the mount command. .sp Mount helper application conventions dictate that the first two options are device to be mounted and the mountpoint for that device. Options must be passed only after these fixed arguments. .SH OPTIONS .SS Basic .INDENT 0.0 .TP \fBconf\fP Path to a ceph.conf file. This is used to initialize the Ceph context for autodiscovery of monitor addresses and auth secrets. The default is to use the standard search path for ceph.conf files. .UNINDENT .INDENT 0.0 .TP .B command \fIfs=\fP Specify the non\-default file system to be mounted. Not passing this option mounts the default file system. .TP .B command \fImds_namespace=\fP A synonym of \(dqfs=\(dq and its use is deprecated. .UNINDENT .INDENT 0.0 .TP \fBmount_timeout\fP int (seconds), Default: 60 .TP \fBms_mode=\fP Set the connection mode that the client uses for transport. The available modes are: .INDENT 7.0 .IP \(bu 2 \fBlegacy\fP: use messenger v1 protocol to talk to the cluster .IP \(bu 2 \fBcrc\fP: use messenger v2, without on\-the\-wire encryption .IP \(bu 2 \fBsecure\fP: use messenger v2, with on\-the\-wire encryption .IP \(bu 2 \fBprefer\-crc\fP: crc mode, if denied agree to secure mode .IP \(bu 2 \fBprefer\-secure\fP: secure mode, if denied agree to crc mode .UNINDENT .TP \fBname\fP RADOS user to authenticate as when using CephX. Default: guest .TP \fBsecret\fP secret key for use with CephX. This option is insecure because it exposes the secret on the command line. To avoid this, use the secretfile option. .TP \fBsecretfile\fP path to file containing the secret key to use with CephX .TP \fBrecover_session=\fP Set auto reconnect mode in the case where the client is blocklisted. The available modes are \fBno\fP and \fBclean\fP\&. The default is \fBno\fP\&. .INDENT 7.0 .IP \(bu 2 .INDENT 2.0 .TP .B \fBno\fP: never attempt to reconnect when client detects that it has been blocklisted. Blocklisted clients will not attempt to reconnect and their operations will fail too. .UNINDENT .IP \(bu 2 \fBclean\fP: client reconnects to the Ceph cluster automatically when it detects that it has been blocklisted. During reconnect, client drops dirty data/metadata, invalidates page caches and writable file handles. After reconnect, file locks become stale because the MDS loses track of them. If an inode contains any stale file locks, read/write on the inode is not allowed until applications release all stale file locks. .UNINDENT .UNINDENT .SS Advanced .INDENT 0.0 .TP \fBcap_release_safety\fP int, Default: calculated .TP \fBcaps_wanted_delay_max\fP int, cap release delay, Default: 60 .TP \fBcaps_wanted_delay_min\fP int, cap release delay, Default: 5 .TP \fBdirstat\fP funky \fIcat dirname\fP for stats, Default: off .TP \fBnodirstat\fP no funky \fIcat dirname\fP for stats .TP \fBip\fP my ip .TP \fBnoasyncreaddir\fP no dcache readdir .TP \fBnocrc\fP no data crc on writes .TP \fBnoshare\fP create a new client instance, instead of sharing an existing instance of a client mounting the same cluster .TP \fBosdkeepalive\fP int, Default: 5 .TP \fBosd_idle_ttl\fP int (seconds), Default: 60 .TP \fBrasize\fP int (bytes), max readahead. Default: 8388608 (8192*1024) .TP \fBrbytes\fP Report the recursive size of the directory contents for st_size on directories. Default: off .TP \fBnorbytes\fP Do not report the recursive size of the directory contents for st_size on directories. .TP \fBreaddir_max_bytes\fP int, Default: 524288 (512*1024) .TP \fBreaddir_max_entries\fP int, Default: 1024 .TP \fBrsize\fP int (bytes), max read size. Default: 16777216 (16*1024*1024) .TP \fBsnapdirname\fP string, set the name of the hidden snapdir. Default: .snap .TP \fBwrite_congestion_kb\fP int (kb), max writeback in flight. scale with available memory. Default: calculated from available memory .TP \fBwsize\fP int (bytes), max write size. Default: 16777216 (16*1024*1024) (writeback uses smaller of wsize and stripe unit) .TP \fBwsync\fP Execute all namespace operations synchronously. This ensures that the namespace operation will only complete after receiving a reply from the MDS. This is the default. .TP \fBnowsync\fP Allow the client to do namespace operations asynchronously. When this option is enabled, a namespace operation may complete before the MDS replies, if it has sufficient capabilities to do so. .UNINDENT .SH EXAMPLES .sp Mount the full file system: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph :/ /mnt/mycephfs .ft P .fi .UNINDENT .UNINDENT .sp Assuming mount.ceph is installed properly, it should be automatically invoked by mount(8): .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount \-t ceph :/ /mnt/mycephfs .ft P .fi .UNINDENT .UNINDENT .sp Mount only part of the namespace/file system: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph :/some/directory/in/cephfs /mnt/mycephfs .ft P .fi .UNINDENT .UNINDENT .INDENT 0.0 .TP .B Mount non\-default FS, in case cluster has multiple FSs:: mount \-t ceph :/ /mnt/mycephfs2 \-o fs=mycephfs2 .sp or .sp mount \-t ceph :/ /mnt/mycephfs2 \-o mds_namespace=mycephfs2 # This option name is deprecated. .UNINDENT .sp Pass the monitor host\(aqs IP address, optionally: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph 192.168.0.1:/ /mnt/mycephfs .ft P .fi .UNINDENT .UNINDENT .sp Pass the port along with IP address if it\(aqs running on a non\-standard port: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph 192.168.0.1:7000:/ /mnt/mycephfs .ft P .fi .UNINDENT .UNINDENT .sp If there are multiple monitors, passes addresses separated by a comma: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph 192.168.0.1,192.168.0.2,192.168.0.3:/ /mnt/mycephfs .ft P .fi .UNINDENT .UNINDENT .sp If authentication is enabled on Ceph cluster: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph :/ /mnt/mycephfs \-o name=fs_username .ft P .fi .UNINDENT .UNINDENT .sp Pass secret key for CephX user optionally: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph :/ /mnt/mycephfs \-o name=fs_username,secret=AQATSKdNGBnwLhAAnNDKnH65FmVKpXZJVasUeQ== .ft P .fi .UNINDENT .UNINDENT .sp Pass file containing secret key to avoid leaving secret key in shell\(aqs command history: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph :/ /mnt/mycephfs \-o name=fs_username,secretfile=/etc/ceph/fs_username.secret .ft P .fi .UNINDENT .UNINDENT .SH AVAILABILITY .sp \fBmount.ceph\fP is part of Ceph, a massively scalable, open\-source, distributed storage system. Please refer to the Ceph documentation at \fI\%http://ceph.com/docs\fP for more information. .SH FEATURE AVAILABILITY .sp The \fBrecover_session=\fP option was added to mainline Linux kernels in v5.4. \fBwsync\fP and \fBnowsync\fP were added in v5.7. .SH SEE ALSO .sp \fI\%ceph\-fuse\fP(8), \fI\%ceph\fP(8) .SH COPYRIGHT 2010-2023, Inktank Storage, Inc. and contributors. Licensed under Creative Commons Attribution Share Alike 3.0 (CC-BY-SA-3.0) .\" Generated by docutils manpage writer. .