Baidu AI Cloud
中国站

百度智能云

Object Storage

Basic Concept

Overview

This article will introduce you to several basic concepts involved in BOS products so that you can know more about BOS products.

Storage Space (Bucket)

Bucket is a container for data storage, and can be used as a bucket. Bucket has an area attribute that can only be located in one area. As the name and area of the Bucket cannot be changed after the creation of Bucket name, so it is recommended to store it nearby according to the conditions of business to facilitate uploading and downloading to improve the access speed. The Bucket name is globally unique. Each Object must be contained in a certain Bucket . A user can create up to 100 Buckets. However, there is no limit on the total number and size of Objects stored in each Bucket, so users do not need to consider the extensibility of data.

File/Object (Object)

In BOS, the basic unit of data for user operations is Object. Each Object contains Key, Meta and Data. Key is the name of Object . Meta is the user's description of the Object and consists of a series of Name-Value pairs. Data is the data of the Object .

Access Domain Name (Endpoint)

At present, Baidu AI Cloud provides multi-region support. For more information, please refer to Region Selection Instructions. The BOS access domain name supports both HTTP and HTTPS calling methods. HTTPS calling is recommended to improve data security. For more information about the application guaranteeing the HTTPS transmission security, please refer to HTTPS Transmission Encryption Practice. Region refers to the region where the BOS data center is located. EndPoint refers to the access domain name of BOS external services. The correspondence between Region and EndPoint is described below.

Region Access EndPoint Protocol supported
North China - Beijing bj.bcebos.com HTTP, HTTPS
North China - Baoding bd.bcebos.com HTTP, HTTPS
East China -Suzhou su.bcebos.com HTTP, HTTPS
South China - Guangzhou gz.bcebos.com HTTP, HTTPS
Hong Kong, China hkg.bcebos.com HTTP, HTTPS
Singapore sin.bcebos.com HTTP, HTTPS
Huazhong Finance - Wuhan fwh.bcebos.com HTTP, HTTPS
East China Finance-Shanghai fsh.bcebos.com HTTP, HTTPS

Note

  • BOS API supports the request forms of path-style and bucket virtual hosting . In which, bucket virtual hosting, that is, the form of Bucket + EndPoint, is recommended. Taking domain name in Beijing of bos-example as an example, the request form of bucket virtual hosting is bos-example.bj.bcebos.com.

Taking GetObject as an example, the request syntax for the form of path-style and bucket virtual hosting is as follows:

Style Request syntax
bucket virtual hosting( Third-level domain) GET /object HTTP/1.1
Host: bucket.bj.bcebos.com
Path-style GET /bucket/object HTTP/1.1
Host: bj.bcebos.com

BOS supports custom domain name access. The user can call BOS API through a custom URL unless he binds a custom domain name to Bucket. For example, if the user binds the custom domain name abc.com to mybucket, when he is actually visiting abc.com/mypic.jpg, he is actually visiting abc.bj.bcebos.com/mypic.jpg, and the corresponding request syntax of bucket virtual hosting is

GET /mypic.jpg HTTP/1.1 
Host: abc.com 

For how to bind a custom domain name to a Bucket, please refer to Create a Bucket Custom Domain Name.

Access Key (AK/SK)

After the user opens the BOS service, the system will allocate a pair of Access Key ID (AK)/Secret Access Key (SK) automatically, and such pair of key will be used for signature verification when the user makes a request to BOS. Access Key ID is used to identify the user, and Secret Access Key is used by the user to encrypt the signature string, and the BOS service is the key that is used to verify the signature string. Please refer to Get AK/SK.

In addition to the key allocated by the system, the user can apply for multiple pairs of AK/SK, with the maximum of 20 pairs.

BOS Glossary

English Chinese
Bucket Storage space
Object Object
Region Region
AZ(Availability Zone) Available zone
AccessKey Access Key ID / Secret Access Key collectively, access key
ACL(Access Control List) Access control list
Standard Standard storage type
Infrequent Access Low frequency storage type
Cold Cold storage type
Archive Archive access type
key Name of the object, used to uniquely identify the object in the storage space
Metadata Meta information, used to record the length and type of an object
Part Fragmented files generated during the upload of file blocks
Prefix Prefix, used to specify the file storage path
LifeCycle File lifecycle management function
Replication Data synchronization function, used to establish automatic synchronization relationship between two different storage spaces
Previous
Monitoring Service
Next
Data Release