.\" Man page generated from reStructuredText. . .TH "MOUNT.CEPH" "8" "Jun 11, 2021" "dev" "Ceph" .SH NAME mount.ceph \- mount a ceph file system . .nr rst2man-indent-level 0 . .de1 rstReportMargin \\$1 \\n[an-margin] level \\n[rst2man-indent-level] level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] - \\n[rst2man-indent0] \\n[rst2man-indent1] \\n[rst2man-indent2] .. .de1 INDENT .\" .rstReportMargin pre: . RS \\$1 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] . nr rst2man-indent-level +1 .\" .rstReportMargin post: .. .de UNINDENT . RE .\" indent \\n[an-margin] .\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] .nr rst2man-indent-level -1 .\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] .in \\n[rst2man-indent\\n[rst2man-indent-level]]u .. .SH SYNOPSIS .nf \fBmount.ceph\fP [\fImonaddr1\fP,\fImonaddr2\fP,...]:/[\fIsubdir\fP] \fIdir\fP [ \-o \fIoptions\fP ] .fi .sp .SH DESCRIPTION .sp \fBmount.ceph\fP is a helper for mounting the Ceph file system on a Linux host. It serves to resolve monitor hostname(s) into IP addresses and read authentication keys from disk; the Linux kernel client component does most of the real work. In fact, it is possible to mount a non\-authenticated Ceph file system without mount.ceph by specifying monitor address(es) by IP: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount \-t ceph 1.2.3.4:/ mountpoint .ft P .fi .UNINDENT .UNINDENT .sp Each monitor address monaddr takes the form host[:port]. If the port is not specified, the Ceph default of 6789 is assumed. .sp Multiple monitor addresses can be separated by commas. Only one responsible monitor is needed to successfully mount; the client will learn about all monitors from any responsive monitor. However, it is a good idea to specify more than one in case one happens to be down at the time of mount. .sp If the host portion of the device is left blank, then \fBmount.ceph\fP will attempt to determine monitor addresses using local configuration files and/or DNS SRV records. .sp A subdirectory subdir may be specified if a subset of the file system is to be mounted. .sp Mount helper application conventions dictate that the first two options are device to be mounted and destination path. Options must be passed only after these fixed arguments. .SH OPTIONS .INDENT 0.0 .TP \fBwsize\fP int (bytes), max write size. Default: 16777216 (16*1024*1024) (writeback uses smaller of wsize and stripe unit) .TP \fBrsize\fP int (bytes), max read size. Default: 16777216 (16*1024*1024) .TP \fBrasize\fP int (bytes), max readahead. Default: 8388608 (8192*1024) .TP \fBosdtimeout\fP int (seconds), Default: 60 .TP \fBosdkeepalive\fP int, Default: 5 .TP \fBmount_timeout\fP int (seconds), Default: 60 .TP \fBosd_idle_ttl\fP int (seconds), Default: 60 .TP \fBcaps_wanted_delay_min\fP int, cap release delay, Default: 5 .TP \fBcaps_wanted_delay_max\fP int, cap release delay, Default: 60 .TP \fBcap_release_safety\fP int, Default: calculated .TP \fBreaddir_max_entries\fP int, Default: 1024 .TP \fBreaddir_max_bytes\fP int, Default: 524288 (512*1024) .TP \fBwrite_congestion_kb\fP int (kb), max writeback in flight. scale with available memory. Default: calculated from available memory .TP \fBsnapdirname\fP string, set the name of the hidden snapdir. Default: .snap .TP \fBname\fP RADOS user to authenticate as when using cephx. Default: guest .TP \fBsecret\fP secret key for use with cephx. This option is insecure because it exposes the secret on the command line. To avoid this, use the secretfile option. .TP \fBsecretfile\fP path to file containing the secret key to use with cephx .TP \fBip\fP my ip .TP \fBnoshare\fP create a new client instance, instead of sharing an existing instance of a client mounting the same cluster .TP \fBdirstat\fP funky \fIcat dirname\fP for stats, Default: off .TP \fBnodirstat\fP no funky \fIcat dirname\fP for stats .TP \fBrbytes\fP Report the recursive size of the directory contents for st_size on directories. Default: off .TP \fBnorbytes\fP Do not report the recursive size of the directory contents for st_size on directories. .TP \fBnocrc\fP no data crc on writes .TP \fBnoasyncreaddir\fP no dcache readdir .TP \fBconf\fP Path to a ceph.conf file. This is used to initialize the ceph context for autodiscovery of monitor addresses and auth secrets. The default is to use the standard search path for ceph.conf files. .UNINDENT .SH MOUNT SECRETS .sp If the \fIsecret\fP and \fIsecretfile\fP options are not specified on the command\-line then the mount helper will spawn a child process that will use the standard ceph library routines to find a keyring and fetch the secret from it. .SH EXAMPLES .sp Mount the full file system: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph monhost:/ /mnt/foo .ft P .fi .UNINDENT .UNINDENT .sp If there are multiple monitors: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph monhost1,monhost2,monhost3:/ /mnt/foo .ft P .fi .UNINDENT .UNINDENT .sp If ceph\-mon(8) is running on a non\-standard port: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph monhost1:7000,monhost2:7000,monhost3:7000:/ /mnt/foo .ft P .fi .UNINDENT .UNINDENT .sp To automatically determine the monitor addresses from local configuration: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph :/ /mnt/foo .ft P .fi .UNINDENT .UNINDENT .sp To mount only part of the namespace: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount.ceph monhost1:/some/small/thing /mnt/thing .ft P .fi .UNINDENT .UNINDENT .sp Assuming mount.ceph(8) is installed properly, it should be automatically invoked by mount(8) like so: .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C mount \-t ceph monhost:/ /mnt/foo .ft P .fi .UNINDENT .UNINDENT .SH AVAILABILITY .sp \fBmount.ceph\fP is part of Ceph, a massively scalable, open\-source, distributed storage system. Please refer to the Ceph documentation at \fI\%http://ceph.com/docs\fP for more information. .SH SEE ALSO .sp ceph\-fuse(8), ceph(8) .SH COPYRIGHT 2010-2021, Inktank Storage, Inc. and contributors. Licensed under Creative Commons Attribution Share Alike 3.0 (CC-BY-SA-3.0) .\" Generated by docutils manpage writer. .