mirror of
https://git.proxmox.com/git/pve-docs
synced 2025-05-30 01:43:51 +00:00
pct: restructure mount point section
This commit is contained in:
parent
25663707b9
commit
016399943d
43
pct.adoc
43
pct.adoc
@ -354,10 +354,17 @@ also provide an easy way to share data between different containers.
|
|||||||
Mount Points
|
Mount Points
|
||||||
~~~~~~~~~~~~
|
~~~~~~~~~~~~
|
||||||
|
|
||||||
Beside the root directory the container can also have additional mount points.
|
The root mount point is configured with the `rootfs` property, and you can
|
||||||
|
configure up to 10 additional mount points. The corresponding options
|
||||||
|
are called `mp0` to `mp9`, and they can contain the following setting:
|
||||||
|
|
||||||
|
include::pct-mountpoint-opts.adoc[]
|
||||||
|
|
||||||
Currently there are basically three types of mount points: storage backed
|
Currently there are basically three types of mount points: storage backed
|
||||||
mount points, bind mounts and device mounts.
|
mount points, bind mounts and device mounts.
|
||||||
|
|
||||||
|
.Storage backed mount points
|
||||||
|
|
||||||
Storage backed mount points are managed by the {pve} storage subsystem and come
|
Storage backed mount points are managed by the {pve} storage subsystem and come
|
||||||
in three different flavors:
|
in three different flavors:
|
||||||
|
|
||||||
@ -368,39 +375,41 @@ in three different flavors:
|
|||||||
- Directories: passing `size=0` triggers a special case where instead of a raw
|
- Directories: passing `size=0` triggers a special case where instead of a raw
|
||||||
image a directory is created.
|
image a directory is created.
|
||||||
|
|
||||||
|
.Bind mount points
|
||||||
|
|
||||||
Bind mounts are considered to not be managed by the storage subsystem, so you
|
Bind mounts are considered to not be managed by the storage subsystem, so you
|
||||||
cannot make snapshots or deal with quotas from inside the container, and with
|
cannot make snapshots or deal with quotas from inside the container, and with
|
||||||
unprivileged containers you might run into permission problems caused by the
|
unprivileged containers you might run into permission problems caused by the
|
||||||
user mapping, and cannot use ACLs from inside an unprivileged container.
|
user mapping, and cannot use ACLs from inside an unprivileged container.
|
||||||
|
|
||||||
Similarly device mounts are not managed by the storage, but for these the
|
|
||||||
`quota` and `acl` options will be honored.
|
|
||||||
|
|
||||||
WARNING: Because of existing issues in the Linux kernel's freezer
|
|
||||||
subsystem the usage of FUSE mounts inside a container is strongly
|
|
||||||
advised against, as containers need to be frozen for suspend or
|
|
||||||
snapshot mode backups. If FUSE mounts cannot be replaced by other
|
|
||||||
mounting mechanisms or storage technologies, it is possible to
|
|
||||||
establish the FUSE mount on the Proxmox host and use a bind
|
|
||||||
mount point to make it accessible inside the container.
|
|
||||||
|
|
||||||
WARNING: For security reasons, bind mounts should only be established
|
WARNING: For security reasons, bind mounts should only be established
|
||||||
using source directories especially reserved for this purpose, e.g., a
|
using source directories especially reserved for this purpose, e.g., a
|
||||||
directory hierarchy under `/mnt/bindmounts`. Never bind mount system
|
directory hierarchy under `/mnt/bindmounts`. Never bind mount system
|
||||||
directories like `/`, `/var` or `/etc` into a container - this poses a
|
directories like `/`, `/var` or `/etc` into a container - this poses a
|
||||||
great security risk. The bind mount source path must not contain any symlinks.
|
great security risk. The bind mount source path must not contain any symlinks.
|
||||||
|
|
||||||
The root mount point is configured with the 'rootfs' property, and you can
|
.Device mount points
|
||||||
configure up to 10 additional mount points. The corresponding options
|
|
||||||
are called 'mp0' to 'mp9', and they can contain the following setting:
|
|
||||||
|
|
||||||
include::pct-mountpoint-opts.adoc[]
|
Similar to bind mounts, device mounts are not managed by the storage, but for
|
||||||
|
these the `quota` and `acl` options will be honored.
|
||||||
|
|
||||||
.Typical Container 'rootfs' configuration
|
.FUSE mounts
|
||||||
|
|
||||||
|
WARNING: Because of existing issues in the Linux kernel's freezer
|
||||||
|
subsystem the usage of FUSE mounts inside a container is strongly
|
||||||
|
advised against, as containers need to be frozen for suspend or
|
||||||
|
snapshot mode backups.
|
||||||
|
|
||||||
|
If FUSE mounts cannot be replaced by other mounting mechanisms or storage
|
||||||
|
technologies, it is possible to establish the FUSE mount on the Proxmox host
|
||||||
|
and use a bind mount point to make it accessible inside the container.
|
||||||
|
|
||||||
|
.Typical Container `rootfs` configuration
|
||||||
----
|
----
|
||||||
rootfs: thin1:base-100-disk-1,size=8G
|
rootfs: thin1:base-100-disk-1,size=8G
|
||||||
----
|
----
|
||||||
|
|
||||||
|
|
||||||
Using quotas inside containers
|
Using quotas inside containers
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user