检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Storage Class Description Enumeration Value in OBS iOS SDK OBS Standard Features low access latency and high throughput and is applicable to storing frequently-accessed (multiple times per month) hotspot or small objects (< 1 MB) requiring quick response.
For more information about permission control, see the permission control in the OBS Permission Configuration Guide. Request Syntax (SSE-KMS AES256) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 PUT /?
For details, see Introduction to OBS Access Control, IAM Custom Policies, and Creating a Custom Bucket Policy. The mapping between OBS regions and endpoints must comply with what is listed in Regions and Endpoints.
Using OBS to Decouple Storage from Compute in Big Data Scenarios OBSA-HDFS Other OBS tools You can use tools provided by OBS, such as obsutil and OBS Browser+, to use parallel file systems. Parallel file systems do not support s3fs.
Follow-up Procedure To successfully delete buckets on OBS Console or OBS Browser+, you need to allow the obs:bucket:ListAllMyBuckets permission in the IAM policy. Log in to Huawei Cloud and click Console in the upper right corner.
Configuring Object Metadata You can use OBS Console, APIs, SDKs, or obsutil to configure object metadata. Using OBS Console In the navigation pane of OBS Console, choose Object Storage. In the bucket list, click the bucket you want to operate. The Objects page is displayed.
policyStatus HTTP/1.1 User-Agent: curl/7.29.0 Host: examplebucket.obs.region.myhuaweicloud.com Accept: */* Date: Sat, 16 Nov 2024 08:59:07 GMT Authorization: OBS H4IPJX0TQTHTHEBQQCEC:75/Y4Ng1izvzc1nTGxpMXTE6ynw= Sample Response HTTP/1.1 200 OK Server: OBS x-obs-request-id: BF260000016435CE298386946AE4C482
You can create an image style in either of the following ways: Using OBS Console Making an API call Parent topic: FAQ
Configuring Public Access Block for a Bucket Functions This API creates or modifies the public access block configuration of an OBS bucket by enabling or disabling the feature. To perform this operation, you must have the PutBucketPublicAccessBlock permission.
You can create an image style in either of the following ways: Using OBS Console Making an API call Parent topic: Image Processing
For details about how to query the bucket version, see Checking OBS Version (OBS 2.0 or OBS 3.0). Archive objects in a folder must be restored in the bucket before they can be downloaded.
If OBS is accessed from a public network, traffic of elastic IP address (EIP) bound to the ECS is also generated. Traffic of the ECS elastic network interface is free. For details about OBS billing, see OBS Billing Overview.
return new Blob([u8arr], { type: mime }); }; // obsClient indicates an instance of the OBS client. const uploadBase64Img = function uploadBase64Img(obsClient) { // Specify the content in Base64 format.
Signing Browser-Based Upload Requests Function OBS supports browser-based uploads using POST requests. Authenticating such a request uses the signature carried in the form. Before calculating the signature for a POST request, you need to first create a security policy.
The network delay between the client and the OBS server is too long. Check the health status of the network between the client and the OBS server. Parent topic: Troubleshooting
Online decompression requires that you create an IAM agency to delegate OBS to access data in the bucket. The permissions the agency should assign to OBS include obs:object:PutObject, obs:object:GetObject, and obs:object:AbortMultipartUpload.
(Java SDK) To be compatible with AWS S3, the source code of OBS SDK for Go contains the acs.amazonaws.com keyword. The SDK only takes this keyword as a constant and does not process or access it. You can ignore this keyword. The figure below gives an example.
(SDK for Node.js) To be compatible with AWS S3, the source code of OBS SDK for Go contains the acs.amazonaws.com keyword. The SDK only takes this keyword as a constant and does not process or access it. You can ignore this keyword. The figure below gives an example.
For details, see Introduction to OBS Access Control, IAM Custom Policies, and Creating a Custom Bucket Policy. The mapping between OBS regions and endpoints must comply with what is listed in Regions and Endpoints.
OBS only supports redirection for objects in the root directory of a bucket.