Adding replication overview and site replication overview docs. Distinguising between bucket replication and site replication. Adds mc admin replicate docs. Including tutorials for how to do site replication.
7.6 KiB
MinIO supports replication of objects encrypted using SSE-KMS <minio-encryption-sse-kms>
and SSE-S3 <minio-encryption-sse-s3>
:
- For objects encrypted using SSE-KMS, MinIO requires that the target bucket support SSE-KMS encryption of objects using the same key names used to encrypt objects on the source bucket.
- For objects encrypted using
SSE-S3 <minio-encryption-sse-s3>
, MinIO requires that the target bucket also support SSE-S3 encryption of objects regardless of key name.
As part of the replication process, MinIO decrypts the
object on the source bucket and transmits the unencrypted object over
the network. The destination MinIO deployment then re-encrypts the
object using the encryption settings from the target. MinIO therefore
strongly recommends enabling TLS <minio-TLS>
on both source and
destination deployments to ensure the safety of objects during
transmission.
MinIO does not support replicating client-side encrypted objects (SSE-C).
MinIO server-side replication only works between MinIO deployments. Both the source and destination deployments must run MinIO.
To configure replication between arbitrary S3-compatible services,
use mc mirror
.
MinIO relies on the immutability protections provided by versioning <minio-bucket-versioning>
to support
replication and resynchronization.
Use mc version info
to validate the versioning status
of both the healthy source and unhealthy target buckets. Use the mc version enable
command
to enable versioning as necessary.
MinIO supports replicating objects held under WORM Locking <minio-object-locking>
. Both
replication buckets must have object locking enabled for MinIO
to replicate the locked object. For active-active configuration, MinIO
recommends using the same retention rules on both buckets to
ensure consistent behavior across sites.
You must enable object locking during bucket creation as per S3 behavior. You can then configure object retention rules at any time. Configure the necessary rules on the unhealthy target bucket prior to beginning this procedure.
Bucket replication requires specific permissions on the source and destination deployments to configure and enable replication rules.
Replication Admin
The following policy provides permissions for configuring and enabling replication on a deployment.
/extra/examples/ReplicationAdminPolicy.json
- The
"EnableRemoteBucketConfiguration"
statement grants permission for creating a remote target for supporting replication. - The
"EnableReplicationRuleConfiguration"
statement grants permission for creating replication rules on a bucket. The"arn:aws:s3:::*
resource applies the replication permissions to any bucket on the source deployment. You can restrict the user policy to specific buckets as-needed.
The following code creates a MinIO-managed user <minio-users>
with the
necessary policy. Replace the TARGET
with the alias <alias>
of the
MinIO deployment on which you are configuring replication:
wget -O - https://docs.min.io/minio/baremetal/examples/ReplicationAdminPolicy.json | \
mc admin policy add TARGET ReplicationAdminPolicy /dev/stdin
mc admin user add TARGET ReplicationAdmin LongRandomSecretKey
mc admin policy set TARGET ReplicationAdminPolicy user=ReplicationAdmin
MinIO deployments configured for Active Directory/LDAP <minio-external-identity-management-ad-ldap>
or OpenID Connect <minio-external-identity-management-openid>
user management should instead create a dedicated service account <minio-idp-service-account>
for
bucket replication.
Replication Remote User
The following policy provides permissions for enabling synchronization of replicated data into the deployment.
/extra/examples/ReplicationRemoteUserPolicy.json
- The
"EnableReplicationOnBucket"
statement grants permission for a remote target to retrieve bucket-level configuration for supporting replication operations on all buckets in the MinIO deployment. To restrict the policy to specific buckets, specify those buckets as an element in theResource
array similar to"arn:aws:s3:::bucketName"
. - The
"EnableReplicatingDataIntoBucket"
statement grants permission for a remote target to synchronize data into any bucket in the MinIO deployment. To restrict the policy to specific buckets, specify those buckets as an element in theResource
array similar to"arn:aws:s3:::bucketName/*"
.
The following code creates a MinIO-managed user <minio-users>
with the
necessary policy. Replace the TARGET
with the alias <alias>
of the
MinIO deployment on which you are configuring replication:
wget -O - https://docs.min.io/minio/baremetal/examples/ReplicationRemoteUserPolicy.json | \
mc admin policy add TARGET ReplicationRemoteUserPolicy /dev/stdin
mc admin user add TARGET ReplicationRemoteUser LongRandomSecretKey
mc admin policy set TARGET ReplicationRemoteUserPolicy user=ReplicationRemoteUser
MinIO deployments configured for Active Directory/LDAP <minio-external-identity-management-ad-ldap>
or OpenID Connect <minio-external-identity-management-openid>
user management should instead create a dedicated service account <minio-idp-service-account>
for
bucket replication.
See mc admin user
,
mc admin user svcacct
,
and mc admin policy
for
more complete documentation on adding users, service accounts, and
policies to a MinIO deployment.
Each MinIO deployment ("peer site") synchronizes the following changes across the other peer sites:
- Creation, modification, and deletion of buckets and objects,
including
- Bucket and Object Configurations
Policies <minio-policy>
mc tag set
Locks <minio-object-locking>
, including retention and legal hold configurationsEncryption settings <minio-encryption-overview>
- Creation and deletion of IAM users, groups, policies, and policy mappings to users or groups (for LDAP users or groups)
- Creation of Security Token Service (STS) credentials for session
tokens verifiable from the local
root
credentials - Creation and deletion of
service accounts <minio-mc-admin-user-svcacct>
(except those owned by theroot
user)
Site replication enables bucket versioning <minio-bucket-versioning>
for
all new and existing buckets on all replicated sites.
MinIO deployments in a site replication configuration do not replicate the creation or modification of the following items:
Bucket notifications <minio-bucket-notifications>
Lifecycle management (ILM) configurations <minio-lifecycle-management>
Site configuration settings <minio-mc-admin-config>