1
0
mirror of https://github.com/minio/docs.git synced 2025-07-30 07:03:26 +03:00

Minor fixes

This commit is contained in:
Ravind Kumar
2022-10-20 17:57:16 -04:00
parent 0aa9ee7e2b
commit 82c6d38278
4 changed files with 14 additions and 13 deletions

View File

@ -70,7 +70,7 @@ default applies the transition operation to the *current* object version.
To transition noncurrent object versions, specify the To transition noncurrent object versions, specify the
:mc-cmd:`~mc ilm add --noncurrentversion-transition-days` and :mc-cmd:`~mc ilm add --noncurrentversion-transition-days` and
:mc-cmd:`~mc ilm add --noncurrentversion-transition-storage-class` options :mc-cmd:`~mc ilm add --noncurrentversion-tier` options
when creating the transition rule. when creating the transition rule.
.. _minio-lifecycle-management-expiration: .. _minio-lifecycle-management-expiration:

View File

@ -8,10 +8,10 @@ specified number of calendar days:
:class: copyable :class: copyable
mc ilm add ALIAS/BUCKET \ mc ilm add ALIAS/BUCKET \
--storage-class TIERNAME \ --tier TIERNAME \
--transition-days DAYS \ --transition-days DAYS \
--noncurrentversion-transition-days NONCURRENT_DAYS --noncurrentversion-transition-days NONCURRENT_DAYS
--noncurrentversion-transition-storage-class TIERNAME --noncurrentversion-tier TIERNAME
The example above specifies the following arguments: The example above specifies the following arguments:
@ -31,13 +31,13 @@ The example above specifies the following arguments:
- Specify the full path to the bucket for which you are - Specify the full path to the bucket for which you are
creating the lifecycle management rule. creating the lifecycle management rule.
* - :mc-cmd:`TIERNAME <mc ilm add --storage-class>` * - :mc-cmd:`TIERNAME <mc ilm add --tier>`
- The remote storage tier to which MinIO transitions objects. - The remote storage tier to which MinIO transitions objects.
Specify the remote storage tier name created in the previous step. Specify the remote storage tier name created in the previous step.
If you want to transition noncurrent object versions to a distinct If you want to transition noncurrent object versions to a distinct
remote tier, specify a different tier name for remote tier, specify a different tier name for
:mc-cmd:`~mc ilm add --noncurrentversion-transition-storage-class`. :mc-cmd:`~mc ilm add --noncurrentversion-tier`.
* - :mc-cmd:`DAYS <mc ilm add --transition-days>` * - :mc-cmd:`DAYS <mc ilm add --transition-days>`
- The number of calendar days after which MinIO marks an object as - The number of calendar days after which MinIO marks an object as

View File

@ -65,24 +65,25 @@ This procedure assumes an existing `Hashicorp Vault <https://www.vaultproject.io
The Vault `Quick Start <https://learn.hashicorp.com/tutorials/vault/getting-started-install>`__ provides a sufficient foundation for the purposes of this procedure. The Vault `Quick Start <https://learn.hashicorp.com/tutorials/vault/getting-started-install>`__ provides a sufficient foundation for the purposes of this procedure.
Defer to the `Vault Documentation <https://learn.hashicorp.com/vault>`__ for guidance on deployment and configuration. Defer to the `Vault Documentation <https://learn.hashicorp.com/vault>`__ for guidance on deployment and configuration.
.. admonition:: KMS Key Creation Requires Unsealed Vault .. admonition:: KES Operations Require Unsealed Vault
:class: important :class: important
KES requires unsealing the Vault instance for creating new External Keys (EK) for supporting SSE operations. You must unseal the Vault instance to allow any cryptographic operations, including key creation and retrieval.
A sealed Vault blocks key creation operations and results in errors on both KES and the KES client (MinIO). KES returns an error if the configured Vault service is sealed.
If you restart or otherwise seal the Vault instance, KES cannot perform any cryptographic operations against the Vault.
You must unseal the Vault to ensure normal operations.
You can safely seal the Vault after KES completes any key creation operations.
See the Vault documentation on `Seal/Unseal <https://www.vaultproject.io/docs/concepts/seal>`__ for more information. See the Vault documentation on `Seal/Unseal <https://www.vaultproject.io/docs/concepts/seal>`__ for more information.
.. end-kes-prereq-hashicorp-vault-desc .. end-kes-prereq-hashicorp-vault-desc
.. start-kes-vault-seal-unseal-desc .. start-kes-vault-seal-unseal-desc
.. admonition:: KMS Key Creation Requires Unsealed Vault .. admonition:: KES Operations Requires Unsealed Vault
:class: important :class: important
You must unseal the backing Vault instance to allow KES to create new External Keys (EK) for supporting SSE operations. You must unseal the Vault instance to allow normal cryptographic operations, including key creation or retrieval.
This step requires an unsealed Vault to complete successfully.
See the Vault documentation on `Seal/Unseal <https://www.vaultproject.io/docs/concepts/seal>`__ for more information. See the Vault documentation on `Seal/Unseal <https://www.vaultproject.io/docs/concepts/seal>`__ for more information.
.. end-kes-vault-seal-unseal-desc .. end-kes-vault-seal-unseal-desc

View File

@ -67,7 +67,7 @@ Parameters
.. mc-cmd:: --airgap .. mc-cmd:: --airgap
:optional: :optional:
Use in environments where the client machine running the :ref:`minio client <minio client>` does not have network access to SUBNET (for example, airgapped, firewalled, or similar configuration) to display instructions for how to register the deployment with SUBNET. Use in environments where the client machine running the :ref:`minio client <minio-client>` does not have network access to SUBNET (for example, airgapped, firewalled, or similar configuration) to display instructions for how to register the deployment with SUBNET.
If the deployment is airgapped, but the local device has network access, you do not need to use the ``--airgap`` flag. If the deployment is airgapped, but the local device has network access, you do not need to use the ``--airgap`` flag.