Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Within a tenant, a domain is the primary entity for dividing and controlling both access and resources. Domains have these essential features:

...

Info

Unnamed objects

Unnamed objects written directly to the domain are represented by a system-defined Content IDs bucket that is part of each domain.

See the Naming Rules for Swarm for domains.

Domain Usage — The Storage Used chart displays the current current size of the storage footprint used by all domains, inclusive of all versions, replicas, and erasure-coded segments when viewing all domains in a given tenant. The Bandwidth Used chart displays the total bandwidth (both bytes in and bytes out) used by each domain over a rolling 30-day window. See Usage Reports.

...

Info

Delete Domain

The Delete command deletes not only the domain but also and all buckets and uploaded contents and any saved collections for the domain.

Warning: This command cannot be undone, so proceed with caution.

Domain Properties

...

Owner

Every domain must have needs an owner , who has with access to and ultimate authority over. As a root or tenant admin, create Create a domain for another to manage as a root or tenant admin.

Info

Note

Ownership defaults to the specific administrator who created the domain, but the owner does not need to be a root or tenant administrator.

In general, change Change the owner when creating a context for someone else to manage. Typically, when creating a domain for a client, one One does not want to own or be responsible for managing the data in that domainthe domain when creating a domain for a client.

Quotas

Quotas can be set to determine how much storage and/or network bandwidth the domain is permitted to consume.  

...

Storage policies control how this domain's objects are protected (via using replication and/or erasure coding) and whether they are versioned. By default, the versioning is in use. The domain inherits the storage policies in force for the cluster by default.

Specify custom policies if inheriting these policies is disabled, but these custom policies are subject to what is allowed and in force in the cluster. If A warning icon and message alerts to the situation if opting for something being overridden by a higher policy, a warning icon and message alerts to the situation.

See Setting Storage Policies.

...

The IDSYS objects define the identity management systems that control controlling the domain's users, specifically:

  • User and group information

  • The authentication system

...