Glossary
- access keys
A MinIO deployment or tenant user account with limited account typically used with API calls. Access Keys were previously referred to as “Service Accounts”
- active-active
A method of replication that provides bidirectional mirroring of data. With active-active configuration, changing the data at at any storage location also changes the data at the other storage location(s).
See also: active-passive.
- active-passive
A method of replication that provides one-way mirroring of data. With the active-passive configuration, changing data at the originating location also changes the data at the destination. However, changing data at the destination does not affect the data on the origin.
See also: active-active.
- alias
A locally defined reference to a MinIO Deployment used in most command line interface operations. See
mc alias set
.- audit logs
Granular descriptions of each operation on a MinIO deployment. Audit logs support security standards and regulations which require detailed tracking of operations.
See also: server logs.
- bit rot
Data corruption that occurs without the user’s knowledge.
MinIO combats bit rot with hashing and erasure coding.
- bit rot healing
Objects corrupted due to bit rot are automatically healed during any
GET
orHEAD
operation. MinIO captures and heals corrupted objects on the fly with its hashing implementation.- bucket
- buckets
A grouping of objects and associated configurations.
- cluster
A group of drives and one or more MinIO server processes pooled into a single storage resource.
See also: tenant.
- cluster registration
Cluster registration links a MinIO deployment to a SUBNET subscription. An organization may have more than one MinIO clusters registered to the same SUBNET subscription.
- Console
- MinIO Console
Graphical User Interface (GUI) for interacting with a MinIO deployment or tenant.
- data
One of the two types of blocks MinIO writes when doing erasure coding. Data blocks contain the contents of a file.
Parity blocks support data reconstruction should data blocks become corrupt or go missing.
- decommission
Process of removing a pool of drives from a distributed deployment. When initiated, the objects on the decommission pool drain by moving to other pools on the deployment.
The process is not reversible.
- deployment
A specific instance of MinIO containing a set of buckets and objects.
- disk encryption
The conversion of all of the contents written to a disk to values that cannot be easily deciphered by an unauthorized entity. Disk encryption can be used in conjunction with other encryption technologies to create a robust data security system.
- enclave
A description of an isolated area within a stateful Key Encryption Service (KES) server. A KES server may have one enclave or multiple enclaves. Each enclave within a KES server holds separate keys, policies, and administration identity. An enclave cannot see or make use of any other enclave on the server.
For example, you might use multiple enclaves to hold completely separate key stores for multiple MinIO tenants within a single stateful KES server.
- encryption at rest
A method of encryption that stores an object in an encrypted state. The object remains encrypted while not moving from one location to another.
Objects can be encrypted by the the server using one of key management methods: SSE-KMS, SSE-S3, or SSE-C.
- encryption in transit
A method of encryption that protects an object when moving it from one location to another, such as during a GET request. The object may or may not be encrypted on the origin or destination storage devices.
- erasure coding
A technology that splits objects into multiple shards and writes the shards to multiple, separate drives.
Depending on the topology used, erasure coding allows for loss of drives or nodes within a MinIO deployment without losing read or write access.
- erasure set
A group of drives within MinIO that support erasure coding. MinIO divides the number of drives in a deployment’s server pool into groups of 4 to 16 drives that make up each erasure set. When writing objects, data and parity blocks write randomly to the drives in the erasure set.
- hashing
The use of an algorithm to create a unique, fixed-length string (a value) to identify a piece of data.
- healing
Restoration of data from partial loss due to bit rot, drive failure, or site failure.
- health diagnostics
A suite of MinIO API endpoints available to check whether a server is
online
available for writing data
available for reading data
available for maintenance without affecting the cluster’s read and write operations
- host bus adapter
- HBA
A circuit board or integrated circuit adapter that connects a host system to a storage device. The HBA handles processing to reduce load on the host system’s processor.
- IAM integration
MinIO only allows access to data for authenticated users. MinIO provides a built-in identity management solution to create authorized credentials. Optionally, MinIO users can authenticate with credentials from a 3rd party identify provider (IDP), including either OpenID or LDAP providers.
- JBOD
Initialism for “Just A Bunch of Drives”. JBOD is a storage device enclosure that holds many hard drives. These drives can combine into one logical drive unit.
See also: RAID
- lifecycle management
- ILM
Rules to determine when objects should move or expire.
- locking
A rule that prevents removal or deletion of an object until an authorized agent removes the rule or it expires.
- monitoring
The act of reviewing the status, activity, and availability of a MinIO cluster, deployment, tenant, or server. MinIO provides the following tools:
Prometheus compatible metrics and alerts
- multi-node multi-drive
- MNMD
- distributed
A system topology that uses more than one server and more than one drive per server to host a MinIO instance. MinIO recommends Kubernetes for distributed deployments.
- multipart upload
Multipart upload is a client-initiated S3 function that splits a single object into multiple parts for moving from one location to another. The client uploads each part independently to MinIO, and MinIO manages reconstructing those received parts into the original object.
Multipart uploads provide benefits such as improved throughput and resiliency to network errors. Use multipart uploads for objects greater than 100MB in actual or estimated size for best results.
See Amazon AWS documentation for more details.
- network encryption
A method of securing data during transit from one location to another, such as server-server or client-server. MinIO supports Transport Layer Security (TLS), version 1.2 and later, for both incoming and outgoing traffic.
- object
- objects
An item of data MinIO interacts with using an S3-compatible API. Objects can be grouped into buckets.
- Operator
- Operator Console
The Graphical User Interface (GUI) to deploy and manage the MinIO tenants in a distributed deployment environment.
- parity
The portion of blocks written for an object by MinIO to support data reconstruction due to missing or corrupt data blocks. The number of parity blocks indicates the number of drives in the erasure set that a deployment can lose while still retaining read and write operations.
- prefix
Prefixes organize the objects in a bucket by assigning the same string of characters to objects that should share a similar hierarchy or structure. Use a delimiter character, typically a / to add layers to the hierarchy. While prefixed objects may resemble a directory structure in some file systems, prefixes are not directories.
MinIO itself does not limit the number of objects that any specific prefix can contain. However, hardware and network conditions may show performance impacts with large prefixes.
Deployments with modest or budget-focused hardware should architect their workloads to target 10,000 objects per prefix as a baseline. Increase this target based on benchmarking and monitoring of real world workloads up to what the hardware can meaningfully handle.
Deployments with high-performance or enterprise-grade hardware can typically handle prefixes with millions of objects or more.
SUBNET| Enterprise accounts can utilize yearly architecture reviews as part of the deployment and maintenance strategy to ensure long-term performance and success of your MinIO-dependent projects.
- RAID
Initialism for “Redundant Array of Independent Disks”. The technology merges multiple separate physical disks into a single storage unit or array. Some RAID levels provide data redundancy or fault tolerance by duplicating data, striping data, or mirroring data across physical disks.
See also: JBOD.
- read quorum
The minimum number of object shards necessary to reconstruct the full object for read operations. See Erasure Coding Basics for more information.
- replication
- mirror
The replication of a bucket or entire site to another location.
- scanner
- MinIO Scanner
One of several low-priority processes MinIO runs to check:
lifecycle management rules requiring object transition
bucket or site replication status
usage data
For more, see Object Scanner.
- self signed certificates
A self-signed certificate is one created by, issued by, and signed by the company or developer responsible for the content the certificate secures. Self-signed certificates are not issued by or signed by a publicly trusted, third-party Certificate Authority (CA). These types of certificates do not expire or require periodic review, and they cannot be revoked.
- server logs
Records the
minio server
operations logged to the system console. Server logs support general monitoring and troubleshooting of operations.For more detailed logging information, see audit logs.
- server pool
- pool
A set of
minio server
nodes which combine their drives and resources to support object storage and retrieval requests.For more information, see How does MinIO manage multiple virtual or physical servers?.
- service account
Renamed to access keys. A MinIO deployment or tenant user account with limited account typically used with API calls.
- shard
- shards
A portion of an object after being erasure coded by MinIO. Each “shard” represents either data or parity for MinIO to use for reconstructing objects on read requests.
Exclusive access to drives
MinIO requires exclusive access to the drives or volumes provided for object storage. No other processes, software, scripts, or persons should perform any actions directly on the drives or volumes provided to MinIO or the objects or files MinIO places on them.
Unless directed by MinIO Engineering, do not use scripts or tools to directly modify, delete, or move any of the data shards, parity shards, or metadata files on the provided drives, including from one drive or node to another. Such operations are very likely to result in widespread corruption and data loss beyond MinIO’s ability to heal.
For more detailed information, see Erasure Coding.
- single-node multi-drive
- SNMD
A system topology that deploys MinIO on one compute resource with more than one attached volume.
- single-node single-drive
- SNSD
- filesystem
A system topology that deploys MinIO on a single compute resource with a single drive. This adds S3-type functionality to an otherwise standard filesystem.
- SSE-C
A method of encryption at rest that encrypts an object at the time of writing with an encryption key included with the write request. To retrieve the object, you must provide the same encryption key provided when originally writing the object. Additionally, you must self-manage the encryption key(s) used.
See also: SSE-KMS, SSE-S3, encryption at rest, network encryption.
- SSE-KMS
A method of encryption at rest that encrypts each object at the time of writing with separate keys managed by a service provider. Use keys at either the bucket level (default) or at the object level. MinIO recommends the SSE-KMS method for key management of encryption.
See also: SSE-S3, SSE-C, encryption at rest, network encryption.
- SSE-S3
A method of encryption at rest that encrypts each object at the time of writing with a single key for all objects on a deployment. A deployment uses a single external key to decrypt any object throughout the deployment.
See also: SSE-KMS, SSE-C, encryption at rest, network encryption.
- standalone deployment
A single-node single-drive (SNSD) MinIO deployment. This term previously referred to the deprecated Gateway or Filesystem Mode deployment types.
- SUBNET
MinIO’s Subscription Network tracks support tickets and provides 24 hour direct-to-engineer access for subscribed accounts.
- tenant
- tenants
In a distributed mode, a specific MinIO deployment. One instance of the MinIO Operator may have multiple tenants.
- topology
The hardware configuration used for a deployment. MinIO works with three topologies:
- versioning
The retention of multiple iterations of an object as it changes over time.
- webhook
A webhook is a method for altering the behavior of a web page or web application with a custom callback. The format is typically JSON sent as an HTTP POST request.
- WORM
Write Once Read Many (WORM) is a data retention methodology that functions as part of object locking. Many requests can retrieve can view a WORM-locked object (
read many
), but no write requests can change the object (write once
).- write quorum
The minimum number of object shards MinIO must successfully write to an erasure set for write operations. See Erasure Coding Basics for more information