Overview

Last updated: 2020-03-17 17:08:37

PDF

COS offers a variety of best practices suitable for common use cases, such as access control and permission management, performance optimization, data migration, direct data upload and backup, data security, domain name management, big data, and serverless architecture, helping you meet diverse business needs. Below are specific best practices:

Best Practice Description
Access control and permission management Access control and permission management is one of the most practical features of COS. This directory of best practices include:
  • ACL Practices
  • Cloud Access Management Practices
  • Granting Sub-accounts Access to COS
  • Cases of Permission Setting
  • COS API Authorization Policy
  • Generating and Using Temporary Keys
  • Granting Sub-account Permissions to Pull Tag List
  • Performance optimization
  • COS supports performance expansion to improve the request rate. For more information, please see Request Rate and Performance Optimization.
  • This practice describes how to dynamically adjust the part size during a multipart upload to COS to improve the upload success rate on mobile devices when network connection is poor. For more information, please see Resuming Multipart Upload in Weak Network Environment
  • Data Migration This practice describes the following five migration scenarios, and applicable solutions for these five migration scenarios.
  • Local Data Migration to COS
  • Migration of Third-party Cloud Storage Data to COS
  • Migration of Data With URL as Source Address to COS
  • Data Migration Between Hadoop File System and COS
  • Accessing COS Using the AWS S3 SDK COS provides APIs compatible with AWS S3. This practice describes how to access files in COS using the AWS S3 SDK through simple configuration modifications
    Disaster recovery data backup This practice describes the following three backup scenarios, and solutions for these three migration scenarios.
  • High-availability Disaster Recovery Architecture Based on Cross-region Replication
  • Domain name management practice
  • This practice describes how to configure a custom domain name for HTTPS access to COS. For more information, please see Configuring Custom Domain Names to Support HTTPS Access
  • This practice describes how to configure a cross-region access rule in COS. For more information, please see Setting Cross-Origin Access
  • This practice describes how to host a static website in COS. For more information, please see Hosting Static Website
  • Direct data upload practice This practice describes three use cases of direct data upload:
  • Practice of Direct Upload for Web End
  • Practice of Direct Upload for Mini Program
  • Practice of Direct Upload for Mobile Apps
  • Data Security
  • This practice describes how to configure hotlink protection in COS to manage access sources. For more information, please see Hotlink Protection
  • Data Verification
  • This practice describes how to ensure the integrity of the uploaded data through MD5 verification in COS. For more information, please see MD5 Verification.
  • This practice introduces how to perform data verification using CRC64 check codes. For more information, please see CRC64 Verification
  • Big data practice
  • This practice describes how to use COS as deep storage of Druid. For more information, please see Using COS as Deep Storage of Druid
  • This practice describes how to use Terraform to manage COS.
  • This practice describes how to use Sparkling to analyze the server access logs in COS.
  • Serverless architecture practice This practice describes two use cases of invoking the SCF function in COS:
  • Using SCF to Decompress Zip Packages
  • Using SCF to Automatically Purge COS Resources Cached in CDN
  • Using COS in third-party applications This practice describes how to save forum attachments to COS by configuring the remote attachment feature.