- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 321 - 330 of 480 for host:docs.min.io (0.04 sec)
-
Core Concepts | AIStor Object Store Documentation
This page provides an overview of AIStor Server deployment architectures from a production perspective. A production AIStor Server deployment consists of at least 4 hosts with homogeneous storage and compute resources. Each AIStor Server host in this pool has matching compute, storage, and network configurations These hosts make up a server pool, where the AIStor Server presents the aggregated compute, memory, and storage as a single resource to clients. Each pool consists of one or more erasure setsdocs.min.io/enterprise/aistor-object-store/operations/core-concepts/Registered: Fri Jan 16 05:03:44 UTC 2026 - Last Modified: Wed Jan 14 19:11:18 UTC 2026 - 254.7K bytes - Viewed (0) -
Data Recovery | AIStor Object Store Documentation
Distributed AIStor deployments rely on Erasure Coding to provide built-in tolerance for multiple drive or node failures. Depending on the deployment topology and the selected erasure code parity, AIStor can tolerate the loss of up to half the drives or nodes in the deployment while maintaining read access (“read quorum”) to objects. For Kubernetes deployments, you can further enhance fault tolerance by configuring spread zones to distribute pods across different failure domains, such as racks or availability zones.docs.min.io/enterprise/aistor-object-store/operations/failure-and-recovery/Registered: Fri Jan 16 05:03:50 UTC 2026 - Last Modified: Wed Jan 14 19:11:18 UTC 2026 - 255.4K bytes - Viewed (0) -
Batch Key Rotation | AIStor Object Store Docume...
The AIStor Batch Framework allows you to create, manage, monitor, and execute jobs using a YAML-formatted job definition file (a “batch file”). The batch jobs run directly on the AIStor deployment to take advantage of the server-side processing power without constraints of the local machine where you run the AIStor Client. The keyrotate batch job type cycles the SSE-S3 or SSE-KMS keys for encrypted objects on an AIStor deployment. The YAML configuration supports filters to restrict key rotation to a specific set of objects by creation date, tags, metadata, or kms key. You can also define retry attempts or set a notification endpoint and token.docs.min.io/enterprise/aistor-object-store/operations/security/batch-key-rotation/Registered: Fri Jan 16 05:03:59 UTC 2026 - Last Modified: Wed Jan 14 19:11:19 UTC 2026 - 266.4K bytes - Viewed (0) -
mc admin uncordon | AIStor Object Store Documen...
Syntax The mc admin uncordon command returns a cordoned node to active service after maintenance. This command notifies all other nodes in the cluster that the specified node is returning to service. When you run mc admin uncordon, the command: Removes the node from the cluster’s internal list of cordoned nodes. Notifies all peer nodes that the target node is returning to service. Allows peer nodes to re-establish grid connections to the node. See Node Maintenance for a complete procedure on cordoning and uncordoning nodes.docs.min.io/enterprise/aistor-object-store/reference/cli/admin/mc-admin-uncordon/Registered: Fri Jan 16 05:06:14 UTC 2026 - Last Modified: Wed Jan 14 19:11:19 UTC 2026 - 263.9K bytes - Viewed (0) -
mc admin maintenance hosts | AIStor Object Stor...
Use mc admin maintenance hosts to create lists of maintenance groups. The command generates lists of hosts that do not share erasure sets. Hosts that do not share a erasure sets can go into maintenance at the same time without causing service disruptions. Syntax The mc admin maintenance hosts command DESCRIPTIONdocs.min.io/enterprise/aistor-object-store/reference/cli/admin/mc-admin-maintenance-hosts/Registered: Fri Jan 16 05:06:46 UTC 2026 - Last Modified: Wed Jan 14 19:11:19 UTC 2026 - 255.6K bytes - Viewed (0) -
Publish audit logs to Kafka | AIStor Object Sto...
AIStor supports publishing audit logs to one or more configured Apache Kafka receivers. AIStor send an event for each API operation to the receiver for processing and storage. The receiver is responsible for correctly processing events, including returning 200OK or similar success messages upon receipt of the event. AIStor cannot recover events that were successfully sent but not correctly stored on the receiver. You can configure a new Kafka audit endpoint using either environment variables or runtime configuration settings. If you configure both, AIStor uses the environment variables.docs.min.io/enterprise/aistor-object-store/operations/monitoring/audit-logging/kafka-audit-logging/Registered: Fri Jan 16 05:05:20 UTC 2026 - Last Modified: Wed Jan 14 19:11:19 UTC 2026 - 260.8K bytes - Viewed (0) -
mc admin cluster iam import | AIStor Object Sto...
The mc admin cluster iam import command imports IAM metadata as created by the mc admin cluster iam export command. You can use this command to manually restore IAM metadata settings for an AIStor deployment. The command outputs the results of the import, including the following: count of individual entities imported by entity type list of policies imported by entity type they imported to list of entities that failed to import Syntax Example The following command imports the IAM metadata of the specified file onto the myaistor deployment.docs.min.io/enterprise/aistor-object-store/reference/cli/admin/mc-admin-cluster-iam/mc-admin-clus...Registered: Fri Jan 16 05:08:31 UTC 2026 - Last Modified: Wed Jan 14 19:11:19 UTC 2026 - 259.3K bytes - Viewed (0) -
mc admin scanner status | AIStor Object Store D...
The mc admin scanner status command displays a real-time summary of scanner information for an AIStor Server. This command has an alias of mc admin scanner info. Syntax Example The following example returns information about the current state of the scanner process.docs.min.io/enterprise/aistor-object-store/reference/cli/admin/mc-admin-scanner/mc-admin-scanner-...Registered: Fri Jan 16 05:12:57 UTC 2026 - Last Modified: Wed Jan 14 19:11:19 UTC 2026 - 263.4K bytes - Viewed (0) -
mc anonymous set | AIStor Object Store Document...
The mc anonymous set command sets anonymous (that is, unauthenticated or public) access policies for a bucket. Buckets with anonymous policies allow clients to access the bucket contents and perform actions consistent with the specified policy without authentication. To set anonymous bucket policies using an IAM JSON policy, use the mc anonymous set-json command. Syntax Example The following command sets the anonymous access policy for the mydata bucket on the myaistor AIStor deployment:docs.min.io/enterprise/aistor-object-store/reference/cli/mc-anonymous/mc-anonymous-set/Registered: Fri Jan 16 05:08:53 UTC 2026 - Last Modified: Wed Jan 14 19:11:19 UTC 2026 - 261.3K bytes - Viewed (0) -
mc anonymous | AIStor Object Store Documentation
Description The mc anonymous command supports setting or removing anonymous policies to a bucket and its contents. Buckets with anonymous policies allow public access where clients can perform any action granted by the policy without authentication. Subcommands mc anonymous includes the following subcommands:docs.min.io/enterprise/aistor-object-store/reference/cli/mc-anonymous/Registered: Fri Jan 16 05:11:39 UTC 2026 - Last Modified: Wed Jan 14 19:11:19 UTC 2026 - 253.6K bytes - Viewed (0)