Paths are specified as remote:
You may put subdirectories in too,
e.g. remote:path/to/dir
.
Here is an example of making a Microsoft Azure Files Storage
configuration. For a remote called remote
. First run:
rclone config
This will guide you through an interactive setup process:
No remotes found, make a new one?
n) New remote
s) Set configuration password
q) Quit config
n/s/q> n
name> remote
Type of storage to configure.
Choose a number from below, or type in your own value
[snip]
XX / Microsoft Azure Files Storage
\ "azurefiles"
[snip]
Option account.
Azure Storage Account Name.
Set this to the Azure Storage Account Name in use.
Leave blank to use SAS URL or connection string, otherwise it needs to be set.
If this is blank and if env_auth is set it will be read from the
environment variable `AZURE_STORAGE_ACCOUNT_NAME` if possible.
Enter a value. Press Enter to leave empty.
account> account_name
Option share_name.
Azure Files Share Name.
This is required and is the name of the share to access.
Enter a value. Press Enter to leave empty.
share_name> share_name
Option env_auth.
Read credentials from runtime (environment variables, CLI or MSI).
See the [authentication docs](/azurefiles#authentication) for full info.
Enter a boolean value (true or false). Press Enter for the default (false).
env_auth>
Option key.
Storage Account Shared Key.
Leave blank to use SAS URL or connection string.
Enter a value. Press Enter to leave empty.
key> base64encodedkey==
Option sas_url.
SAS URL.
Leave blank if using account/key or connection string.
Enter a value. Press Enter to leave empty.
sas_url>
Option connection_string.
Azure Files Connection String.
Enter a value. Press Enter to leave empty.
connection_string>
[snip]
Configuration complete.
Options:
- type: azurefiles
- account: account_name
- share_name: share_name
- key: base64encodedkey==
Keep this "remote" remote?
y) Yes this is OK (default)
e) Edit this remote
d) Delete this remote
y/e/d>
Once configured you can use rclone.
See all files in the top level:
rclone lsf remote:
Make a new directory in the root:
rclone mkdir remote:dir
Recursively List the contents:
rclone ls remote:
Sync /home/local/directory
to the remote directory, deleting any
excess files in the directory.
rclone sync --interactive /home/local/directory remote:dir
The modified time is stored as Azure standard LastModified
time on
files
When uploading large files, increasing the value of
--azurefiles-upload-concurrency
will increase performance at the cost
of using more memory. The default of 16 is set quite conservatively to
use less memory. It maybe be necessary raise it to 64 or higher to
fully utilize a 1 GBit/s link with a single file transfer.
In addition to the default restricted characters set the following characters are also replaced:
Character | Value | Replacement |
---|---|---|
" | 0x22 | " |
* | 0x2A | * |
: | 0x3A | : |
< | 0x3C | < |
> | 0x3E | > |
? | 0x3F | ? |
\ | 0x5C | \ |
| | 0x7C | | |
File names can also not end with the following characters. These only get replaced if they are the last character in the name:
Character | Value | Replacement |
---|---|---|
. | 0x2E | . |
Invalid UTF-8 bytes will also be replaced, as they can't be used in JSON strings.
MD5 hashes are stored with files. Not all files will have MD5 hashes as these have to be uploaded with the file.
There are a number of ways of supplying credentials for Azure Files Storage. Rclone tries them in the order of the sections below.
If the env_auth
config parameter is true
then rclone will pull
credentials from the environment or runtime.
It tries these authentication methods in this order:
These are described in the following sections
If env_auth
is set and environment variables are present rclone
authenticates a service principal with a secret or certificate, or a
user with a password, depending on which environment variable are set.
It reads configuration from these variables, in the following order:
AZURE_TENANT_ID
: ID of the service principal's tenant. Also called its "directory" ID.AZURE_CLIENT_ID
: the service principal's client IDAZURE_CLIENT_SECRET
: one of the service principal's client secretsAZURE_TENANT_ID
: ID of the service principal's tenant. Also called its "directory" ID.AZURE_CLIENT_ID
: the service principal's client IDAZURE_CLIENT_CERTIFICATE_PATH
: path to a PEM or PKCS12 certificate file including the private key.AZURE_CLIENT_CERTIFICATE_PASSWORD
: (optional) password for the certificate file.AZURE_CLIENT_SEND_CERTIFICATE_CHAIN
: (optional) Specifies whether an authentication request will include an x5c header to support subject name / issuer based authentication. When set to "true" or "1", authentication requests include the x5c header.AZURE_TENANT_ID
: (optional) tenant to authenticate in. Defaults to "organizations".AZURE_CLIENT_ID
: client ID of the application the user will authenticate toAZURE_USERNAME
: a username (usually an email address)AZURE_PASSWORD
: the user's passwordAZURE_TENANT_ID
: Tenant to authenticate in.AZURE_CLIENT_ID
: Client ID of the application the user will authenticate to.AZURE_FEDERATED_TOKEN_FILE
: Path to projected service account token file.AZURE_AUTHORITY_HOST
: Authority of an Azure Active Directory endpoint (default: login.microsoftonline.com).When using Managed Service Identity if the VM(SS) on which this program is running has a system-assigned identity, it will be used by default. If the resource has no system-assigned but exactly one user-assigned identity, the user-assigned identity will be used by default.
If the resource has multiple user-assigned identities you will need to
unset env_auth
and set use_msi
instead. See the use_msi
section.
Credentials created with the az
tool can be picked up using env_auth
.
For example if you were to login with a service principal like this:
az login --service-principal -u XXX -p XXX --tenant XXX
Then you could access rclone resources like this:
rclone lsf :azurefiles,env_auth,account=ACCOUNT:
Or
rclone lsf --azurefiles-env-auth --azurefiles-account=ACCOUNT :azurefiles:
This is the most straight forward and least flexible way. Just fill
in the account
and key
lines and leave the rest blank.
To use it leave account
, key
and connection_string
blank and fill in sas_url
.
To use it leave account
, key
and "sas_url" blank and fill in connection_string
.
If these variables are set, rclone will authenticate with a service principal with a client secret.
tenant
: ID of the service principal's tenant. Also called its "directory" ID.client_id
: the service principal's client IDclient_secret
: one of the service principal's client secretsThe credentials can also be placed in a file using the
service_principal_file
configuration option.
If these variables are set, rclone will authenticate with a service principal with certificate.
tenant
: ID of the service principal's tenant. Also called its "directory" ID.client_id
: the service principal's client IDclient_certificate_path
: path to a PEM or PKCS12 certificate file including the private key.client_certificate_password
: (optional) password for the certificate file.client_send_certificate_chain
: (optional) Specifies whether an authentication request will include an x5c header to support subject name / issuer based authentication. When set to "true" or "1", authentication requests include the x5c header.NB client_certificate_password
must be obscured - see rclone obscure.
If these variables are set, rclone will authenticate with username and password.
tenant
: (optional) tenant to authenticate in. Defaults to "organizations".client_id
: client ID of the application the user will authenticate tousername
: a username (usually an email address)password
: the user's passwordMicrosoft doesn't recommend this kind of authentication, because it's less secure than other authentication flows. This method is not interactive, so it isn't compatible with any form of multi-factor authentication, and the application must already have user or admin consent. This credential can only authenticate work and school accounts; it can't authenticate Microsoft accounts.
NB password
must be obscured - see rclone obscure.
If use_msi
is set then managed service identity credentials are
used. This authentication only works when running in an Azure service.
env_auth
needs to be unset to use this.
However if you have multiple user identities to choose from these must
be explicitly specified using exactly one of the msi_object_id
,
msi_client_id
, or msi_mi_res_id
parameters.
If none of msi_object_id
, msi_client_id
, or msi_mi_res_id
is
set, this is is equivalent to using env_auth
.
Here are the Standard options specific to azurefiles (Microsoft Azure Files).
Azure Storage Account Name.
Set this to the Azure Storage Account Name in use.
Leave blank to use SAS URL or connection string, otherwise it needs to be set.
If this is blank and if env_auth is set it will be read from the
environment variable AZURE_STORAGE_ACCOUNT_NAME
if possible.
Properties:
Azure Files Share Name.
This is required and is the name of the share to access.
Properties:
Read credentials from runtime (environment variables, CLI or MSI).
See the authentication docs for full info.
Properties:
Storage Account Shared Key.
Leave blank to use SAS URL or connection string.
Properties:
SAS URL.
Leave blank if using account/key or connection string.
Properties:
Azure Files Connection String.
Properties:
ID of the service principal's tenant. Also called its directory ID.
Set this if using
Properties:
The ID of the client in use.
Set this if using
Properties:
One of the service principal's client secrets
Set this if using
Properties:
Path to a PEM or PKCS12 certificate file including the private key.
Set this if using
Properties:
Password for the certificate file (optional).
Optionally set this if using
And the certificate has a password.
NB Input to this must be obscured - see rclone obscure.
Properties:
Here are the Advanced options specific to azurefiles (Microsoft Azure Files).
Send the certificate chain when using certificate auth.
Specifies whether an authentication request will include an x5c header to support subject name / issuer based authentication. When set to true, authentication requests include the x5c header.
Optionally set this if using
Properties:
User name (usually an email address)
Set this if using
Properties:
The user's password
Set this if using
NB Input to this must be obscured - see rclone obscure.
Properties:
Path to file containing credentials for use with a service principal.
Leave blank normally. Needed only if you want to use a service principal instead of interactive login.
$ az ad sp create-for-rbac --name "<name>" \
--role "Storage Files Data Owner" \
--scopes "/subscriptions/<subscription>/resourceGroups/<resource-group>/providers/Microsoft.Storage/storageAccounts/<storage-account>/blobServices/default/containers/<container>" \
> azure-principal.json
See "Create an Azure service principal" and "Assign an Azure role for access to files data" pages for more details.
NB this section needs updating for Azure Files - pull requests appreciated!
It may be more convenient to put the credentials directly into the
rclone config file under the client_id
, tenant
and client_secret
keys instead of setting service_principal_file
.
Properties:
Use a managed service identity to authenticate (only works in Azure).
When true, use a managed service identity to authenticate to Azure Storage instead of a SAS token or account key.
If the VM(SS) on which this program is running has a system-assigned identity, it will be used by default. If the resource has no system-assigned but exactly one user-assigned identity, the user-assigned identity will be used by default. If the resource has multiple user-assigned identities, the identity to use must be explicitly specified using exactly one of the msi_object_id, msi_client_id, or msi_mi_res_id parameters.
Properties:
Object ID of the user-assigned MSI to use, if any.
Leave blank if msi_client_id or msi_mi_res_id specified.
Properties:
Object ID of the user-assigned MSI to use, if any.
Leave blank if msi_object_id or msi_mi_res_id specified.
Properties:
Azure resource ID of the user-assigned MSI to use, if any.
Leave blank if msi_client_id or msi_object_id specified.
Properties:
Endpoint for the service.
Leave blank normally.
Properties:
Upload chunk size.
Note that this is stored in memory and there may be up to "--transfers" * "--azurefile-upload-concurrency" chunks stored at once in memory.
Properties:
Concurrency for multipart uploads.
This is the number of chunks of the same file that are uploaded concurrently.
If you are uploading small numbers of large files over high-speed links and these uploads do not fully utilize your bandwidth, then increasing this may help to speed up the transfers.
Note that chunks are stored in memory and there may be up to "--transfers" * "--azurefile-upload-concurrency" chunks stored at once in memory.
Properties:
Max size for streamed files.
Azure files needs to know in advance how big the file will be. When rclone doesn't know it uses this value instead.
This will be used when rclone is streaming data, the most common uses are:
--vfs-cache-mode off
with rclone mount
rclone rcat
You will need this much free space in the share as the file will be this size temporarily.
Properties:
The encoding for the backend.
See the encoding section in the overview for more info.
Properties:
Description of the remote.
Properties:
You can set custom upload headers with the --header-upload
flag.
Eg --header-upload "Content-Type: text/potato"
MD5 sums are only uploaded with chunked files if the source has an MD5 sum. This will always be the case for a local to azure copy.