pct: restructure mount point section

This commit is contained in:
Fabian Grünbichler 2016-09-21 10:33:10 +02:00 committed by Dietmar Maurer
parent 25663707b9
commit 016399943d

View File

@ -354,10 +354,17 @@ also provide an easy way to share data between different containers.
Mount Points Mount Points
~~~~~~~~~~~~ ~~~~~~~~~~~~
Beside the root directory the container can also have additional mount points. The root mount point is configured with the `rootfs` property, and you can
configure up to 10 additional mount points. The corresponding options
are called `mp0` to `mp9`, and they can contain the following setting:
include::pct-mountpoint-opts.adoc[]
Currently there are basically three types of mount points: storage backed Currently there are basically three types of mount points: storage backed
mount points, bind mounts and device mounts. mount points, bind mounts and device mounts.
.Storage backed mount points
Storage backed mount points are managed by the {pve} storage subsystem and come Storage backed mount points are managed by the {pve} storage subsystem and come
in three different flavors: in three different flavors:
@ -368,39 +375,41 @@ in three different flavors:
- Directories: passing `size=0` triggers a special case where instead of a raw - Directories: passing `size=0` triggers a special case where instead of a raw
image a directory is created. image a directory is created.
.Bind mount points
Bind mounts are considered to not be managed by the storage subsystem, so you Bind mounts are considered to not be managed by the storage subsystem, so you
cannot make snapshots or deal with quotas from inside the container, and with cannot make snapshots or deal with quotas from inside the container, and with
unprivileged containers you might run into permission problems caused by the unprivileged containers you might run into permission problems caused by the
user mapping, and cannot use ACLs from inside an unprivileged container. user mapping, and cannot use ACLs from inside an unprivileged container.
Similarly device mounts are not managed by the storage, but for these the
`quota` and `acl` options will be honored.
WARNING: Because of existing issues in the Linux kernel's freezer
subsystem the usage of FUSE mounts inside a container is strongly
advised against, as containers need to be frozen for suspend or
snapshot mode backups. If FUSE mounts cannot be replaced by other
mounting mechanisms or storage technologies, it is possible to
establish the FUSE mount on the Proxmox host and use a bind
mount point to make it accessible inside the container.
WARNING: For security reasons, bind mounts should only be established WARNING: For security reasons, bind mounts should only be established
using source directories especially reserved for this purpose, e.g., a using source directories especially reserved for this purpose, e.g., a
directory hierarchy under `/mnt/bindmounts`. Never bind mount system directory hierarchy under `/mnt/bindmounts`. Never bind mount system
directories like `/`, `/var` or `/etc` into a container - this poses a directories like `/`, `/var` or `/etc` into a container - this poses a
great security risk. The bind mount source path must not contain any symlinks. great security risk. The bind mount source path must not contain any symlinks.
The root mount point is configured with the 'rootfs' property, and you can .Device mount points
configure up to 10 additional mount points. The corresponding options
are called 'mp0' to 'mp9', and they can contain the following setting:
include::pct-mountpoint-opts.adoc[] Similar to bind mounts, device mounts are not managed by the storage, but for
these the `quota` and `acl` options will be honored.
.Typical Container 'rootfs' configuration .FUSE mounts
WARNING: Because of existing issues in the Linux kernel's freezer
subsystem the usage of FUSE mounts inside a container is strongly
advised against, as containers need to be frozen for suspend or
snapshot mode backups.
If FUSE mounts cannot be replaced by other mounting mechanisms or storage
technologies, it is possible to establish the FUSE mount on the Proxmox host
and use a bind mount point to make it accessible inside the container.
.Typical Container `rootfs` configuration
---- ----
rootfs: thin1:base-100-disk-1,size=8G rootfs: thin1:base-100-disk-1,size=8G
---- ----
Using quotas inside containers Using quotas inside containers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~