2019-04-14 07:11:51 +00:00
# s3fs
2015-08-15 03:41:49 +00:00
2018-10-14 20:40:17 +00:00
s3fs allows Linux and macOS to mount an S3 bucket via FUSE.
2019-01-22 01:32:57 +00:00
s3fs preserves the native object format for files, allowing use of other
tools like [AWS CLI ](https://github.com/aws/aws-cli ).
2016-05-29 02:40:58 +00:00
[![Build Status ](https://travis-ci.org/s3fs-fuse/s3fs-fuse.svg?branch=master )](https://travis-ci.org/s3fs-fuse/s3fs-fuse)
2020-02-07 00:01:50 +00:00
[![Twitter Follow ](https://img.shields.io/twitter/follow/s3fsfuse.svg?style=social&label=Follow )](https://twitter.com/s3fsfuse)
2015-08-15 03:41:49 +00:00
2019-04-14 07:11:51 +00:00
## Features
2015-08-15 03:41:49 +00:00
* large subset of POSIX including reading/writing files, directories, symlinks, mode, uid/gid, and extended attributes
* compatible with Amazon S3, Google Cloud Storage, and other S3-based object stores
2020-02-24 09:20:50 +00:00
* allows random writes and appends
2015-08-15 03:41:49 +00:00
* large files via multi-part upload
* renames via server-side copy
* optional server-side encryption
* data integrity via MD5 hashes
* in-memory metadata caching
* local disk data caching
* user-specified regions, including Amazon GovCloud
* authenticate via v2 or v4 signatures
2019-04-14 07:11:51 +00:00
## Installation
2015-08-15 03:41:49 +00:00
2019-04-06 23:52:21 +00:00
Many systems provide pre-built packages:
2018-05-16 23:29:17 +00:00
2019-04-08 22:51:29 +00:00
* Amazon Linux via EPEL:
2018-05-16 23:29:17 +00:00
2018-07-04 23:25:37 +00:00
```
2019-04-08 22:51:29 +00:00
sudo amazon-linux-extras install epel
sudo yum install s3fs-fuse
2018-07-04 23:25:37 +00:00
```
2020-04-18 10:17:41 +00:00
* Arch Linux:
```
sudo pacman -S s3fs-fuse
```
2019-04-08 22:51:29 +00:00
* Debian 9 and Ubuntu 16.04 or newer:
2018-07-04 23:25:37 +00:00
```
2019-11-22 19:46:21 +00:00
sudo apt install s3fs
2018-07-04 23:25:37 +00:00
```
2018-05-16 23:29:17 +00:00
2019-04-08 22:51:29 +00:00
* Fedora 27 or newer:
2018-10-06 20:20:44 +00:00
```
2019-11-22 19:46:21 +00:00
sudo dnf install s3fs-fuse
2018-10-06 20:20:44 +00:00
```
2019-11-04 16:08:57 +00:00
* Gentoo:
```
sudo emerge net-fs/s3fs
```
2019-04-08 22:51:29 +00:00
* RHEL and CentOS 7 or newer through via EPEL:
2018-10-06 20:20:44 +00:00
```
sudo yum install epel-release
sudo yum install s3fs-fuse
```
2019-04-08 22:51:29 +00:00
* SUSE 12 and openSUSE 42.1 or newer:
2019-03-09 13:24:27 +00:00
```
2019-04-08 22:51:29 +00:00
sudo zypper install s3fs
2019-03-09 13:24:27 +00:00
```
2019-04-08 22:51:29 +00:00
* macOS via [Homebrew ](https://brew.sh/ ):
2018-05-16 23:29:17 +00:00
2019-03-11 05:36:36 +00:00
```
brew cask install osxfuse
brew install s3fs
2018-07-04 23:25:37 +00:00
```
2018-05-16 23:29:17 +00:00
2019-11-18 00:35:15 +00:00
Otherwise consult the [compilation instructions ](COMPILATION.md ).
2015-08-15 03:41:49 +00:00
2019-04-14 07:11:51 +00:00
## Examples
2015-08-15 03:41:49 +00:00
2018-11-04 19:41:49 +00:00
s3fs supports the standard
[AWS credentials file ](https://docs.aws.amazon.com/cli/latest/userguide/cli-config-files.html )
stored in `${HOME}/.aws/credentials` . Alternatively, s3fs supports a custom passwd file.
2017-12-22 09:20:02 +00:00
The default location for the s3fs password file can be created:
2018-11-05 01:45:16 +00:00
* using a .passwd-s3fs file in the users home directory (i.e. ${HOME}/.passwd-s3fs)
2017-12-22 09:20:02 +00:00
* using the system-wide /etc/passwd-s3fs file
2018-11-05 01:45:16 +00:00
Enter your credentials in a file `${HOME}/.passwd-s3fs` and set
2017-09-13 01:44:17 +00:00
owner-only permissions:
2015-08-15 03:41:49 +00:00
```
2018-11-05 01:45:16 +00:00
echo ACCESS_KEY_ID:SECRET_ACCESS_KEY > ${HOME}/.passwd-s3fs
chmod 600 ${HOME}/.passwd-s3fs
2015-09-05 07:08:07 +00:00
```
2015-08-15 03:41:49 +00:00
Run s3fs with an existing bucket `mybucket` and directory `/path/to/mountpoint` :
```
2018-11-05 01:45:16 +00:00
s3fs mybucket /path/to/mountpoint -o passwd_file=${HOME}/.passwd-s3fs
2015-08-15 03:41:49 +00:00
```
If you encounter any errors, enable debug output:
```
2018-11-05 01:45:16 +00:00
s3fs mybucket /path/to/mountpoint -o passwd_file=${HOME}/.passwd-s3fs -o dbglevel=info -f -o curldbg
2015-08-15 03:41:49 +00:00
```
2015-09-07 15:05:02 +00:00
You can also mount on boot by entering the following line to `/etc/fstab` :
2015-08-15 03:41:49 +00:00
```
2020-07-07 15:06:00 +00:00
mybucket /path/to/mountpoint fuse.s3fs _netdev,allow_other 0 0
2017-09-13 01:44:17 +00:00
```
2016-01-24 05:34:28 +00:00
or
2017-09-13 01:44:17 +00:00
```
2016-01-24 05:34:28 +00:00
mybucket /path/to/mountpoint fuse.s3fs _netdev,allow_other 0 0
2015-08-15 03:41:49 +00:00
```
2017-11-19 07:03:39 +00:00
If you use s3fs with a non-Amazon S3 implementation, specify the URL and path-style requests:
```
2019-01-18 19:00:38 +00:00
s3fs mybucket /path/to/mountpoint -o passwd_file=${HOME}/.passwd-s3fs -o url=https://url.to.s3/ -o use_path_request_style
2017-11-19 07:03:39 +00:00
```
or(fstab)
2019-04-14 07:11:51 +00:00
2017-11-19 07:03:39 +00:00
```
2020-07-07 15:06:00 +00:00
mybucket /path/to/mountpoint fuse.s3fs _netdev,allow_other,use_path_request_style,url=https://url.to.s3/ 0 0
2017-11-19 07:03:39 +00:00
```
2017-11-23 08:46:24 +00:00
To use IBM IAM Authentication, use the `-o ibm_iam_auth` option, and specify the Service Instance ID and API Key in your credentials file:
2019-04-14 07:11:51 +00:00
2017-11-23 08:46:24 +00:00
```
echo SERVICEINSTANCEID:APIKEY > /path/to/passwd
```
2019-04-14 07:11:51 +00:00
2017-11-23 08:46:24 +00:00
The Service Instance ID is only required when using the `-o create_bucket` option.
2016-01-19 04:22:55 +00:00
Note: You may also want to create the global credential file first
```
2018-09-10 03:27:51 +00:00
echo ACCESS_KEY_ID:SECRET_ACCESS_KEY > /etc/passwd-s3fs
2016-07-14 15:55:03 +00:00
chmod 600 /etc/passwd-s3fs
2016-01-19 04:22:55 +00:00
```
2016-01-19 05:06:10 +00:00
Note2: You may also need to make sure `netfs` service is start on boot
2019-04-14 07:11:51 +00:00
## Limitations
2015-08-15 03:41:49 +00:00
Generally S3 cannot offer the same performance or semantics as a local file system. More specifically:
2020-05-04 23:12:04 +00:00
* random writes or appends to files require rewriting the entire object, optimized with multi-part upload copy
2015-08-15 03:41:49 +00:00
* metadata operations such as listing directories have poor performance due to network latency
2019-01-18 19:00:38 +00:00
* [eventual consistency ](https://en.wikipedia.org/wiki/Eventual_consistency ) can temporarily yield stale data([Amazon S3 Data Consistency Model](https://docs.aws.amazon.com/AmazonS3/latest/dev/Introduction.html#ConsistencyModel))
2015-09-01 20:09:44 +00:00
* no atomic renames of files or directories
2015-08-15 03:41:49 +00:00
* no coordination between multiple clients mounting the same bucket
* no hard links
2019-02-13 02:37:24 +00:00
* inotify detects only local modifications, not external ones by other clients or tools
2015-08-15 03:41:49 +00:00
2019-04-14 07:11:51 +00:00
## References
2015-08-15 03:41:49 +00:00
2016-01-08 00:13:59 +00:00
* [goofys ](https://github.com/kahing/goofys ) - similar to s3fs but has better performance and less POSIX compatibility
2015-08-15 03:41:49 +00:00
* [s3backer ](https://github.com/archiecobbs/s3backer ) - mount an S3 bucket as a single file
2018-07-17 11:49:31 +00:00
* [S3Proxy ](https://github.com/gaul/s3proxy ) - combine with s3fs to mount Backblaze B2, EMC Atmos, Microsoft Azure, and OpenStack Swift buckets
2019-02-05 05:03:46 +00:00
* [s3ql ](https://github.com/s3ql/s3ql/ ) - similar to s3fs but uses its own object format
2015-08-15 03:41:49 +00:00
* [YAS3FS ](https://github.com/danilop/yas3fs ) - similar to s3fs but uses SNS to allow multiple clients to mount a bucket
2019-04-14 07:11:51 +00:00
## Frequently Asked Questions
2016-01-19 04:22:55 +00:00
* [FAQ wiki page ](https://github.com/s3fs-fuse/s3fs-fuse/wiki/FAQ )
2019-01-10 19:17:32 +00:00
* [s3fs on Stack Overflow ](https://stackoverflow.com/questions/tagged/s3fs )
* [s3fs on Server Fault ](https://serverfault.com/questions/tagged/s3fs )
2015-11-26 12:31:03 +00:00
2019-04-14 07:11:51 +00:00
## License
2015-08-15 03:41:49 +00:00
Copyright (C) 2010 Randy Rizun < rrizun @ gmail . com >
Licensed under the GNU GPL version 2
2017-11-19 07:03:39 +00:00