Dell DX6000 Application Manual page 5

Dx object storage application guide version 5.0
Table of Contents

Advertisement

13.3. Example: Creating Bucket Owners ......................................................................... 51
13.4. Examples of Creating Buckets and Named Objects ................................................. 51
14. Managing Security for Domain Managers .......................................................................... 54
14.1. What Domain Managers Need to Know .................................................................. 54
14.2. About Domain Manager Tasks and Responsibilities ................................................. 54
14.3.1. Updating the Domain Realm ....................................................................... 55
14.3.2. Updating the Domain Manager Realm ......................................................... 56
14.3.3. Updating a Realm Using PUT ..................................................................... 57
15. Using the Content-MD5 Metadata Header ......................................................................... 59
16. Using Lifepoint Metadata Headers .................................................................................... 60
16.1. About Storage Policies .......................................................................................... 60
16.2. A Simple Lifecycle Example ................................................................................... 60
16.3. Lifepoint/Lifecycle Specification .............................................................................. 61
16.4. Constraint Types ................................................................................................... 61
16.4.1. Replication ................................................................................................. 62
16.4.2. Deletion ..................................................................................................... 62
17. Using the Allow Metadata Header ..................................................................................... 64
17.1. Overview of the Allow Header ................................................................................ 64
17.2. Administrative Override .......................................................................................... 64
18. Using Caching Metadata Headers ..................................................................................... 66
18.1. About Caching Headers ......................................................................................... 66
18.2. Using HTTP/1.0 Caching Headers .......................................................................... 66
18.2.1. Last-Modified .............................................................................................. 66
18.2.2. If-Modified-Since ......................................................................................... 66
18.2.3. If-Unmodified-Since ..................................................................................... 66
18.2.4. Expires ....................................................................................................... 67
18.3. Using HTTP/1.1 Caching Headers .......................................................................... 67
18.3.1. ETag .......................................................................................................... 67
18.3.2. If-Match ...................................................................................................... 67
18.3.3. If-None-Match ............................................................................................. 68
18.3.4. If-Range ..................................................................................................... 68
19. Using Custom Metadata Headers ..................................................................................... 70
20. Basic Content Integrity Assurance ..................................................................................... 71
20.1. Integrity Seals ....................................................................................................... 71
20.2. Validating Reads ................................................................................................... 71
20.3. Application Initiated Hash Upgrading ...................................................................... 72
A. Content Header Metadata .................................................................................................. 73
B. Sample Code and Client Library Behaviors with 100-Continue .............................................. 75
C. Open Source Software ...................................................................................................... 76
Copyright © 2010 Caringo, Inc.
All rights reserved
v
Version 5.0
December 2010

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dx6004sDx6012sDx object storage

Table of Contents