Docsright arrowTelepresenceright arrow1.0right arrowVolume access

5 min • read

Volume access

Volume support requires a small amount of work on your part. The root directory where all the volumes can be found will be set to the TELEPRESENCE_ROOT environment variable in the shell run by telepresence. You will then need to use that env variable as the root for volume paths you are opening.

Telepresence will attempt to gather the mount points that exist in the remote pod and list them in the TELEPRESENCE_MOUNTS environment variable, separated by : characters. This allows automated discovery of remote volumes.

For example, all Kubernetes containers have a volume mounted at /var/run/secrets with the service account details. Those files are accessible from Telepresence:

The files are available at a different path than they are on the actual Kubernetes environment.

One way to deal with that is to change your application's code slightly. For example, let's say you have a volume that mounts a file called /app/secrets. Normally you would just open it in your code like so:

To support volume proxying by Telepresence, you will need to change your code, for example:

By falling back to / when the environment variable is not set your code will continue to work in its normal Kubernetes setting.

This approach is unavailable if you do not control the code that accesses the mounted filesystem, such as if you use a third-party library. However, many such libraries offer configuration to work around this. For example, the Java Kubernetes client library allows configuration via environment variables.

To simplify this process, Telepresence optionally lets you set the value of TELEPRESENCE_ROOT to a known path using the --mount option. Using a known value as the mount point (e.g., --mount=/tmp/tel_root) can you let you configure your tools and libraries once and rely on that configuration continuing to work across multiple Telepresence sessions. When using the container method, the --mount option allows bind-mounting portions of the remote filesystem directly onto the usual paths.

For example, the kubectl command expects to find Kubernetes API service account credentials in /var/run/secrets. This example shows kubectl successfully talking to the cluster while running in a local container:

Another way you can do this is by using the proot utility on Linux, which allows you to do fake bind mounts without being root. For example, presuming you've installed proot (apt install proot on Ubuntu), in the following example we bind $TELEPRESENCE_ROOT/var/run/secrets to /var/run/secrets. That means code doesn't need to be modified as the paths are in the expected location:

Using the TELEPRESENCE_MOUNTS environment variable allows for automatic discovery and handling of mount points. For example, the following Python code will create symlinks so that any mounted volumes appear in their normal locations:

Volume access via Docker volume for the container method

It is possible to use the vieux/sshfs volume driver to access remote volumes if you are using the container method. This makes it possible to use volumes even if you don't have mount privileges or capabilities on your main system, e.g. on Windows. Use the --docker-mount option to specify an absolute path for volume mounts inside your container. Note that --docker-mount is mutually exclusive with --mount and is available only with the container method.

When --docker-mount is specified, instead of using sshfs to mount the remote filesystem on your host, a randomly named docker volume is created using the vieux/sshfs volume driver. The volume is mounted in the user container at the mount point specified by --docker-mount. As a side benefit, sudo is no longer required for the container method (unless you need sudo to run Docker).

One downside is that it is not possible to mount a subdirectory of the remote volumes at another location in your container. This means that the /var/run/secrets workaround described above cannot be done with --docker-mount. Using $TELEPRESENCE_ROOT is required.

Ensuring write permissions

If you are experiencing errors such as Operation not permitted or permission denied your processes might lack write permissions. This happens because the volume mounted by Telepresence is owner by the privileged user (root, admin, etc), whereas the image might not have the same privileges.

Since Telepresence doesn't allow to you specify using a privileged image explicitly, as a workaround, you can expose a low port, i.e. less than 1024: --expose 9999:81 This works because a low port requires privileged network access, Telepresence detects this and chooses the privileged image, causing all the proxy pod processes to run as root.