1
2
3
| # nfs-utils 包含客户端和服务端实现
sudo pacman -S nfs-utils
|
nfs 依赖时钟, 需要ntp服务
https://blog.wiloon.com/?p=10869
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
| mkdir -p /data/nfs/tmp /mnt/nfs/tmp
mount --bind /mnt/nfs/tmp /data/nfs/tmp
vim /etc/fstab
/mnt/nfs/tmp /data/nfs/tmp none bind 0 0
vim /etc/exports
/data/nfs 192.168.100.0/24(rw,async,crossmnt,fsid=0)
/data/nfs/tmp 192.168.100.0/24(rw,sync)
# 使export 生效
exportfs -rav
# 查看 export dir
exportfs -v
sudo systemctl restart nfs-server
sudo systemctl enable nfs-server
|
client
linux client
1
2
| showmount -e servername
mount server:/ /mountpoint/on/client
|
windows client
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
| # 挂载之前先改注册表
需要读写权限的需要修改注册表
通过修改注册表将windows访问NFS时的UID和GID改成0即可,步骤如下
1、在运行中输入regedit,打开注册表编辑器;
2、进入HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ClientForNFS\CurrentVersion\Default条目;
3、Create two DWORD values namely AnonymousUid and AnonymousGid,十进制值跟nfs服务端文件 所属用户 的用户 id一致。
# 重启windows的NFS client service
C:\Windows\system32>hostname
DESKTOP-AE0D2H0
C:\Windows\System32>nfsadmin client DESKTOP-AE0D2H0 config casesensitive=yes
The settings were successfully updated.
C:\Windows\system32>nfsadmin client DESKTOP-AE0D2H0 stop
The service was stopped successfully.
C:\Windows\system32>nfsadmin client DESKTOP-AE0D2H0 start
The service was started successfully.
C:\Windows\system32>
#win10 mount nfs
打开控制面板 > 程序 > 启用或关闭 Windows 功能,找到NFS服务打开子目录勾选NFS客户端与管理工具。
showmount -e [server] 显示 NFS 服务器导出的所有共享。
showmount -a [server] 列出客户端主机名或 IP 地址,以及使用"主机:目录"格式显示的安装目录。
showmount -d [server] 显示 NFS 服务器上当前由某些 NFS 客户端安装的目录。
# 挂载nfs
mount -o anon \\192.168.50.220\data\nfs\data Z:\
#卸载
umount z:
|
https://wiki.archlinux.org/index.php/NFS#Installation
https://blogs.msdn.microsoft.com/sfu/2009/03/27/can-i-set-up-user-name-mapping-in-windows-vista/
<a href="https://dovidenko.com/2017/505/nfs-centos-7-windows-10-network-shares.html">NFS on CentOS 7 & Windows 10 NFS Client Configuration</a>
https://dovidenko.com/2017/505/nfs-centos-7-windows-10-network-shares.html/embed#?secret=DYEnZkJ5i8