List of either an IPv4 addresses in the format {octet1}.{octet2}.{octet3}.{octet4} or CIDR ranges in the format {octet1}.{octet2}.{octet3}.{octet4}/{mask size} which may mount the file share. Overlapping IP ranges are not allowed, both within and across NfsExportOptions. An error will be returned. The limit is 64 IP ranges/addresses for each FileShareConfig among all NfsExportOptions.
Either READ_ONLY, for allowing only read requests on the exported directory, or READ_WRITE, for allowing both read and write requests. The default is READ_WRITE.
Either NO_ROOT_SQUASH, for allowing root access on the exported directory, or ROOT_SQUASH, for not allowing root access. The default is NO_ROOT_SQUASH.
An integer representing the anonymous user id with a default value of 65534. Anon_uid may only be set with squashMode of ROOT_SQUASH. An error will be returned if this field is specified for other squashMode settings.
An integer representing the anonymous group id with a default value of 65534. Anon_gid may only be set with squashMode of ROOT_SQUASH. An error will be returned if this field is specified for other squashMode settings.
The security flavors allowed for mount operations. The default is AUTH_SYS.
AccessMode
The access mode.
Enums
ACCESS_MODE_UNSPECIFIED
AccessMode not set.
READ_ONLY
The client can only read the file share.
READ_WRITE
The client can read and write the file share (default).
SquashMode
The squash mode.
Enums
SQUASH_MODE_UNSPECIFIED
SquashMode not set.
NO_ROOT_SQUASH
The Root user has root access to the file share (default).
ROOT_SQUASH
The Root user has squashed access to the anonymous uid/gid.
SecurityFlavor
The security flavor. In general, a "flavor" represents a designed process or system. A "security flavor" is a system designed for the purpose of authenticating a data originator (client), recipient (server), and the data they transmit between one another.
Enums
SECURITY_FLAVOR_UNSPECIFIED
SecurityFlavor not set.
AUTH_SYS
The user's UNIX user-id and group-ids are transferred "in the clear" (not encrypted) on the network, unauthenticated by the NFS server (default).
KRB5
End-user authentication through Kerberos V5.
KRB5I
krb5 plus integrity protection (data packets are tamper proof).
KRB5P
krb5i plus privacy protection (data packets are tamper proof and encrypted).
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-06-17 UTC."],[[["\u003cp\u003eThis document outlines the specifications for NFS export options, including JSON representation and field details for configuring file share access.\u003c/p\u003e\n"],["\u003cp\u003e\u003ccode\u003eipRanges\u003c/code\u003e defines the list of IPv4 addresses or CIDR ranges allowed to mount the file share, with a limit of 64 IP ranges/addresses per FileShareConfig.\u003c/p\u003e\n"],["\u003cp\u003e\u003ccode\u003eaccessMode\u003c/code\u003e determines whether clients have read-only or read-write access to the exported directory, defaulting to \u003ccode\u003eREAD_WRITE\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003e\u003ccode\u003esquashMode\u003c/code\u003e controls whether root access is allowed on the exported directory, with \u003ccode\u003eNO_ROOT_SQUASH\u003c/code\u003e as the default, and when \u003ccode\u003eROOT_SQUASH\u003c/code\u003e is enabled, \u003ccode\u003eanonUid\u003c/code\u003e and \u003ccode\u003eanonGid\u003c/code\u003e can be configured.\u003c/p\u003e\n"],["\u003cp\u003e\u003ccode\u003esecurityFlavors\u003c/code\u003e specifies the allowed security protocols for mount operations, with \u003ccode\u003eAUTH_SYS\u003c/code\u003e as the default, and other options like \u003ccode\u003eKRB5\u003c/code\u003e, \u003ccode\u003eKRB5I\u003c/code\u003e, and \u003ccode\u003eKRB5P\u003c/code\u003e are available.\u003c/p\u003e\n"]]],[],null,["# NfsExportOptions\n\n- [JSON representation](#SCHEMA_REPRESENTATION)\n- [AccessMode](#AccessMode)\n- [SquashMode](#SquashMode)\n- [SecurityFlavor](#SecurityFlavor)\n\nNFS export options specifications.\n\nAccessMode\n----------\n\nThe access mode.\n\nSquashMode\n----------\n\nThe squash mode.\n\nSecurityFlavor\n--------------\n\nThe security flavor. In general, a \"flavor\" represents a designed process or system. A \"security flavor\" is a system designed for the purpose of authenticating a data originator (client), recipient (server), and the data they transmit between one another."]]