Doc updates for the following: - Document alias naming requirements, including new minimum length rules - `mc tag set --exclude-folders` modifies the behavior of `--recursive` Staged: http://192.241.195.202:9000/staging/DOCS-1106/linux/reference/minio-mc/mc-alias-set.html#mc.alias.set.ALIAS http://192.241.195.202:9000/staging/DOCS-1106/linux/reference/minio-mc/mc-tag-set.html#mc.tag.set.-exclude-folders Fixes https://github.com/minio/docs/issues/1106 --------- Co-authored-by: Daryl White <53910321+djwfyi@users.noreply.github.com>
6.3 KiB
mc alias set
minio
Table of Contents
mc alias set
Syntax
The mc alias set
command adds or updates an alias to the local mc
configuration.
EXAMPLE
The following command adds an alias <alias>
for a MinIO deployment
myminio
running at the URL
https://myminio.example.net
. mc
uses the specified username and password for
authenticating to the MinIO deployment:
mc alias set myminio https://myminio.example.net minioadminuser minioadminpassword
If the myminio
alias already exists, the command
overwrites that alias with the new URL, access key, and secret key.
SYNTAX
The mc alias set
command has the following syntax:
mc [GLOBALFLAGS] alias set \
[--api "string"] \
[--path "string"] \
ALIAS \
URL \
ACCESSKEY \
SECRETKEY
Parameters
ALIAS
Required The name to associate to the S3-compatible service. Aliases are case-sensitive and must meet the following requirements:
- Contain only ASCII
lower case letters (
a-z
), upper case letters (A-Z
), numbers ([0-9]
), hyphen (-
), or underscore (_
). - 2 or more characters in length.
- The first character must be a letter.
RELEASE.2024-01-11T05-49-32Z
An alias may also be a single letter (a-z
or
A-Z
).
Examples of some valid alias values include:
myminio
Test-1
A
a
URL
Required The URL to the S3-compatible service endpoint. For example:
https://minio.example.net
ACCESSKEY
Required
The access key for authenticating to the S3 service.
SECRETKEY
Required
The secret key for authenticating to the S3 service.
--api
Optional
Specifies the signature calculation method to use when connecting to the S3-compatible service. Supports the following values:
S3v4
(Default)S3v2
Note
AWS Signature V2 is considered deprecated
by AWS. mc alias set
includes this option only for S3 buckets or services still reliant on
the Signature V2.
Use S3v4
unless explicitly required by the S3-compatible
service. MinIO server does not rely on nor require S3v2
,
nor are all API operations available on S3v2
.
--path
Optional
Specifies the bucket path lookup setting used by the server. Supports the following values:
"auto"
(Default)"on"
"off"
Global Flags
Examples
Add or Update an Alias for a MinIO Deployment
Use mc alias set
to
add an S3-compatible service for use with mc
:
Example
The following command creates a new alias myminio
pointing at a MinIO deployment at
https://minio.example.net
. The alias uses the
miniouser
and miniopassword
credentials for
performing operations against the deployment.
mc alias set myminio https://minio.example.net miniouser miniopassword
If the myminio
alias already exists, the mc alias set
command
overwrites that alias with the specified arguments.
Syntax
mc alias set ALIAS HOSTNAME ACCESSKEY SECRETKEY
- Replace
ALIAS
with the the name to associate to the MinIO service. - Replace
HOSTNAME
with the URL for any node in the MinIO deployment. You can alternatively specify the URL for a load balancer or reverse proxy managing connections to the MinIO deployment. - Replace
ACCESSKEY
andSECRETKEY
with credentials for a user on the MinIO deployment.
Behavior
S3 Compatibility
Required Credentials and Access Control
mc alias set
requires
specifying an access key and corresponding secret key for the
S3-compatible host. mc
functionality is limited based on the policies
associated to the specified credentials. For example, if the specified
credentials do not have read/write access to a specific bucket, mc
cannot perform read or
write operations on that bucket.
For more information on MinIO Access Control, see minio-access-management
.
For more complete documentation on S3 Access Control, see Amazon S3 Security <security.html>
.
For all other S3-compatible services, defer to the documentation for that service.
Certificates
The MinIO Client fetches the peer certificate, computes the public key fingerprint, and asks the user whether to accept the deployment's certificate.
If trusted, the MinIO Client automatically adds the certificate authority to:
~/.mc/certs/CAs/
on Linux and other Unix-like systems.C:\Users\[username]\mc\certs\CAs\
on Windows systems.