COS offers a variety of best practices suitable for common use cases, such as access control and permission management, performance optimization, data migration, direct data upload and backup, data security, domain name management, big data, and serverless architecture, helping you meet diverse business needs. Below are specific best practices:
|Access control and permission management
||Access control and permission management is one of the most practical features of COS. This directory of best practices include:
Cloud Access Management Practices
Granting Sub-accounts Access to COS
Cases of Permission Setting
COS API Authorization Policy
Generating and Using Temporary Keys
Granting Sub-account Permissions to Pull Tag List
||COS supports performance expansion to improve the request rate. For more information, please see Request Rate and Performance Optimization.
This practice describes how to dynamically adjust the part size during a multipart upload to COS to improve the upload success rate on mobile devices when network connection is poor. For more information, please see Resuming Multipart Upload in Weak Network Environment
||This practice describes the following five migration scenarios, and applicable solutions for these five migration scenarios.
Local Data Migration to COS
Migration of Third-party Cloud Storage Data to COS
Migration of Data With URL as Source Address to COS
Data Migration Between Hadoop File System and COS
|Accessing COS Using the AWS S3 SDK
||COS provides APIs compatible with AWS S3. This practice describes how to access files in COS using the AWS S3 SDK through simple configuration modifications
|Disaster recovery data backup
||This practice describes the following three backup scenarios, and solutions for these three migration scenarios.High-availability Disaster Recovery Architecture Based on Cross-region Replication
|Domain name management practice
||This practice describes how to configure a custom domain name for HTTPS access to COS. For more information, please see Configuring Custom Domain Names to Support HTTPS Access
This practice describes how to configure a cross-region access rule in COS. For more information, please see Setting Cross-Origin Access
This practice describes how to host a static website in COS. For more information, please see Hosting Static Website
|Direct data upload practice
||This practice describes three use cases of direct data upload:
Practice of Direct Upload for Web End
Practice of Direct Upload for Mini Program
Practice of Direct Upload for Mobile Apps
||This practice describes how to configure hotlink protection in COS to manage access sources. For more information, please see Hotlink Protection
||This practice describes how to ensure the integrity of the uploaded data through MD5 verification in COS. For more information, please see MD5 Verification.
This practice introduces how to perform data verification using CRC64 check codes. For more information, please see CRC64 Verification
|Big data practice
||This practice describes how to use COS as deep storage of Druid. For more information, please see Using COS as Deep Storage of Druid
This practice describes how to use Terraform to manage COS. This practice describes how to use Sparkling to analyze the server access logs in COS.
|Serverless architecture practice
||This practice describes two use cases of invoking the SCF function in COS:
Using SCF to Decompress Zip Packages
Using SCF to Automatically Purge COS Resources Cached in CDN
|Using COS in third-party applications
||This practice describes how to save forum attachments to COS by configuring the remote attachment feature.