| Runtime | Recommended |
|---|---|
| Docker / Podman / OCI containers sharing the host kernel | Bind mount from the host — simpler, no privileged containers, and avoids the seccomp pitfalls of FUSE-inside-the-container. |
| MicroVMs (Firecracker, Cloud Hypervisor, Kata, gVisor) with isolated kernels | FUSE inside the microVM — there’s no host FUSE mount to bind from, so the VM mounts Archil itself. |
| Kubernetes | Use the Archil CSI driver. It manages Archil mounts as native persistent volumes without privileged pods. |
Bind mount from the host
First, install thearchil CLI and mount a disk on the host:
/data as a normal filesystem. Archil handles caching on fast local SSD and synchronizing to S3 in the background.
Docker Compose
FUSE inside the container
Some runtimes don’t share the host’s kernel — most commonly microVMs like Firecracker, Cloud Hypervisor, Kata Containers, or gVisor. In principle you could share the host’s FUSE mount into the guest over virtio-fs, but virtio-fs support across microVM runtimes is spotty — some implementations don’t support it at all, others lag on features like extended attributes, locking, or large-file I/O, and performance varies widely. It’s simpler and more portable to have the guest mount Archil itself. Install the Archil client in the guest image and runarchil mount during boot or as part of your workload’s entrypoint:
--privileged (or SYS_ADMIN) plus /dev/fuse:
Kubernetes
For production Kubernetes deployments, use the Archil CSI driver. It manages Archil mounts as native Kubernetes persistent volumes, so pods get Archil storage without privileged containers or host mounts.Command reference
For every flagarchil mount, archil unmount, and the rest of the archil CLI accept, see the archil CLI reference.