Object Storage Service

Products

Object Storage Service

Function Overview

Before using OSS, it is recommended that you shall understand basic concepts of bucket, object, region, access domain and others, for better understanding functions provided by OSS.

For meanings of OSS basic concepts, please refer to Core Concepts.

OSS provides the following functions:

Application Scenarios Function Description Reference
Object Upload Before uploading files to OSS, be sure to create one bucket in another region of JD Cloud. After creating the bucket, you can upload any object to this bucket. Cerate Bucket
Create Folder
Simple Upload
Multipart Upload
Search Object Search objects with same name prefix in a bucket or a folder. Search Object
Create Folder You can manage OSS folder with the method as the same as that used for managing Windows folder. Create Folder
View or Download Object Share and download objects through obtaining external link access address of uploaded objects. You can view or download objects by betting URL of uploaded objects and share the objects with others. Get Object URL
Delete objects or folders You may delete a single or several objects/folders and delete parts produced by multipart upload, to save your capacity consumption. Delete a Single Object
Delete Objects (Folder)
Shard Management
Control OSS Resource Access Permission You may control OSS resource access permissions via the method below:
ACL:
OSS provides the Access Control List (ACL) for permission control.
ACL is the access policy granting bucket and object access permission. You can configure ACL in the Console while creating the bucket and modify ACL at any time.
Bucket Policy:
You can conveniently and visually grant other users to access your OSS resources with the Bucket Policy function of the Console, for example, granting access permission to IAM users of other accounts and granting access permission with specific IP condition restrictions to the anonymous users.
IAM Policy:
You can build IAM Policy for access permission control of bucket and folder.
Read and Write Permission ACL-based Permission Control
Bucket Policy-based Permission Control
IAM Policy-based Permission Control
Protect OSS data against hotlinking by others When Anti-Leech is set for your bucket, you can enable or disable access request with the blank Referer field by setting the Referer field whitelist. Use of Bucket Policy-Setting of Referer White List
Access OSS resources by using a customized domain You can associate the customized domain (the domain of yourself) to the OSS bucket and then access data in the bucket by using the customized domain. You can associate the customized domain (i.e. the domain of yourself) access to your own Bucket, i.e. CNAME. After you enable the CNAME function, OSS will automatically process access requests to the domain. Associate Customized Domain
OSS Service Access via HTTPS Supported by Customized Domain
Access bucket via static web page Upon uploading images, videos, static web pages and other resources to OSS Bucket, you can set your bucket in the static website hosting mode and access such static web page via the bucket domain. Set Static Website Hosting
Cross-Origin Resource Sharing OSS provides setting of Cross-Origin Resource Sharing (CORS) in HTML5 protocol. CORS allows interaction between the client Web application program in one domain with resources in another domain. Set Cross-origin Resource Sharing
Automatically delete objects in specified time Manage life cycles of all objects or specific files in the bucket. For example, after a specified number of days have elapsed, delete a specific file. Manage Object Life Cycle
Copy data of one bucket in one region to another bucket in another region Cross-region replication means to automatically and asynchronously replicate objects in buckets in different regions. With the cross-region replication function, object operations, such as creation and update, can be reduplicated to a target bucket in another region. Manage Cross-region Replication
Encrypt saved data You can save your encrypted data to OSS with the default encryption function of bucket. Set Server End Encryption
Back-to-origin of Image Via back-to-origin setting, the back-to-origin reading is applied to the data getting request via the image method, to meet your hot migration demand of data. Image Back-to-origin Setting
Event notification You can make the callback notification in time while specifying relevant operation of some resources. The event notification is performed asynchronously, so that OSS operations will not be affected. Callback Notification
View resource consumption conditions Learn resource consumption conditions of OSS and provide data and consumption monitoring graphs with respect to bucket capacity, traffic, request count and others. Console-Consumption Monitoring
Process Images Saved in OSS Make format conversion, clipping, zooming, rotation, watermark, style encapsulation to images saved in OSS.
Image processing with the sample method is supported and picture access style via customized delimiter is supported at the same time.
If the user intends to protect the original image from being downloaded, the original image protection function shall be used in a cooperatively way.
Image Processing Service
Video transcoding and snapshot are provided Transcoding and snapshot to various video formats are provided and callback notice can be configured for submitted tasks. Video Processing Service
Manage OSS resources with tools Graphing tools, command line tools, file attaching tools and other tools are provided to facilitate OSS resource management. Graphing Tool:
Manage OSS with CloudBerry
Manage OSS with s3browser
Command Line Tool:
Manage OSS with S3cmd
Object Attaching Tool:
Attach Bucket on Linux Instances with S3fs
Manage OSS Resources with API Provides RESTful API operation supported by OSS and relevant examples. API Reference
Manage OSS resources with SDK SDK development packages in various languages are provided to you to facilitate secondary development quickly. SDK Reference
Update Time:2019-05-28 16:47:15