16 KiB
Enable One-Way Server-Side Bucket Replication
minio
Table of Contents
The procedure on this page creates a new bucket replication rule for one-way synchronization of objects between MinIO buckets.
- To configure replication between arbitrary S3-compatible services,
use
mc mirror. - To configure two-way "active-active" replication between MinIO
clusters, see
minio-bucket-replication-serverside-twoway.
- Use the
mc replicate editcommand to modify an existing replication rule. - Use the
mc replicate editcommand with the--state "disable" <mc replicate edit state>flag to disable an existing replication rule. - Use the
mc replicate rmcommand to remove an existing replication rule.
Requirements
MinIO Server-Side Replication Requires a MinIO Cluster as the Destination
MinIO server-side replication only works between MinIO clusters. Both the source and destination clusters must run MinIO.
To configure replication between arbitrary S3-compatible services,
use mc mirror.
Enable Versioning on Source and Destination Buckets
MinIO relies on the immutability protections provided by versioning to synchronize objects between the source and replication target.
Use the mc version enable command to enable versioning on
both the source and destination bucket before starting this
procedure:
mc version enable ALIAS/PATH
- Replace
ALIAS <mc version enable TARGET>with thealias <mc alias>of the MinIO cluster. - Replace
PATH <mc version enable TARGET>with the bucket on which to enable versioning.
Install
and Configure mc with Access to Both Clusters.
This procedure uses mc for performing operations on both the source and
destination MinIO cluster. Install mc on a machine with network access to both source and
destination clusters. See the mc Installation Quickstart <mc-install> for
instructions on downloading and installing mc.
Use the mc alias
command to create an alias for both MinIO clusters. Alias creation
requires specifying an access key for a user on the cluster. This user
must have permission to create and manage users and
policies on the cluster. Specifically, ensure the user has at
minimum:
admin:CreateUseradmin:ListUsersadmin:GetUseradmin:CreatePolicyadmin:GetPolicyadmin:AttachUserOrGroupPolicy
Required Permissions
Bucket Replication requires at minimum the following permissions on the source and destination clusters:
Replication Admin
The following policy provides permissions for configuring and enabling replication on a cluster.
/extra/examples/ReplicationAdminPolicy.json
- The
"EnableRemoteBucketConfiguration"statement grants permission for creating a remote target for supporting replication. - The
"EnableReplicationRuleConfiguration"statement grants permission for creating replication rules on a bucket. The"arn:aws:s3:::*resource applies the replication permissions to any bucket on the source cluster. You can restrict the user policy to specific buckets as-needed.
Use the mc admin policy add to add this policy to the
source cluster. Use mc admin user add to create a user on the source
cluster and mc admin policy set to associate the policy to that
new user.
Replication Remote User
The following policy provides permissions for enabling synchronization of replicated data into the cluster.
/extra/examples/ReplicationRemoteUserPolicy.json
- The
"EnableReplicationOnBucket"statement grants permission for a remote target to retrieve bucket-level configuration for supporting replication operations on all buckets in the MinIO cluster. To restrict the policy to specific buckets, specify those buckets as an element in theResourcearray similar to"arn:aws:s3:::bucketName". - The
"EnableReplicatingDataIntoBucket"statement grants permission for a remote target to synchronize data into any bucket in the MinIO cluster. To restrict the policy to specific buckets, specify those buckets as an element in theResourcearray similar to"arn:aws:s3:::bucketName/*".
Use the mc admin policy add to add this policy to the
destination cluster. Use mc admin user add to create a user on the
destination cluster and mc admin policy set to associate the policy to that
new user.
MinIO strongly recommends creating users specifically for supporting
bucket replication operations. See mc admin user and mc admin policy for more complete documentation on
adding users and policies to a MinIO cluster.
Considerations
Replication of Existing Objects
Starting with mc
RELEASE.2021-06-13T17-48-22Z
<mc/releases/tag/RELEASE.2021-06-13T17-48-22Z> and minio RELEASE.2021-06-07T21-40-51Z
<minio/releases/tag/RELEASE.2021-06-07T21-40-51Z>, MinIO
supports automatically replicating existing objects in a bucket.
MinIO requires explicitly enabling replication of existing objects
using the mc replicate add replicate or mc replicate edit replicate and including
the existing-objects replication feature flag. This
procedure includes the required flags for enabling replication of
existing objects.
Replication of Delete Operations
MinIO supports replicating delete operations onto the target bucket.
Specifically, MinIO can replicate versioning Delete Markers <versioning-workflows.html>
and the deletion of specific versioned objects:
- For delete operations on an object, MinIO replication also creates the delete marker on the target bucket.
- For delete operations on versions of an object, MinIO replication also deletes those versions on the target bucket.
MinIO requires explicitly enabling replication of delete operations
using the mc replicate add replicate or mc replicate edit replicate. This procedure
includes the required flags for enabling replication of delete
operations and delete markers.
Replication of Encrypted Objects
MinIO supports replicating objects encrypted with automatic Server-Side Encryption (SSE-S3). Both the source and destination buckets must have automatic SSE-S3 enabled for MinIO to replicate an encrypted object.
As part of the replication process, MinIO decrypts the
object on the source bucket and transmits the unencrypted object. The
destination MinIO cluster then re-encrypts the object using the
destination bucket SSE-S3 configuration. MinIO strongly
recommends enabling TLS <minio-TLS> on both source and
destination clusters to ensure the safety of objects during
transmission.
MinIO does not support replicating client-side encrypted objects (SSE-C).
Replication of Locked Objects
MinIO supports replicating objects held under WORM Locking <minio-object-locking>. Both the
source and destination buckets must have object locking enabled
for MinIO to replicate the locked object.
You must enable object locking during bucket creation as per S3
behavior. You can then configure object retention rules at any time.
Object locking requires versioning <minio-bucket-versioning> and enables
the feature implicitly.
Multi-Site Replication
MinIO supports configuring multiple remote targets per bucket or bucket prefix. For example, you can configure a bucket to replicate data to two or more remote MinIO deployments, where one deployment is a 1:1 copy (replication of all operations including deletions) and another is a full historical record (replication of only non-destructive write operations).
This procedure documents one-way replication to a single remote MinIO deployment. You can repeat this tutorial for multiple remote targets for a single bucket.
MinIO multi-site replication requires MinIO server RELEASE.2021-09-23T04-46-24Z and mc RELEASE.2021-09-23T05-44-03Z and later.
Procedure
1) Configure User Accounts and Policies for Replication
This step creates users and policies on both MinIO clusters for
supporting replication operations. You can skip this step if both
clusters already have users with the necessary permissions <minio-bucket-replication-serverside-oneway-permissions>.
The following examples use Alpha and Baker
as placeholder aliases
<mc alias> for each MinIO cluster. You should replace these
values with the appropriate aliases for the MinIO clusters on which you
are configuring bucket replication. These examples assume that the
specified aliases have the necessary permissions for creating policies
and users on both clusters. See minio-users and MinIO Policy Based Access Control <minio-policy>
for more complete documentation on MinIO users and policies
respectively.
- A) Create Replication Administrator
-
The following code creates a user and policy for supporting configuring replication on the
Alphacluster. Replace the passwordLongRandomSecretKeywith a long, random, and secure secret key as per your organizations best practices for password generation.wget -O - https://docs.min.io/minio/baremetal/examples/ReplicationAdminPolicy.json | \ mc admin policy add Alpha ReplicationAdminPolicy /dev/stdin mc admin user add Alpha alphaReplicationAdmin LongRandomSecretKey mc admin policy set Alpha ReplicationAdminPolicy user=alphaReplicationAdmin - B) Create Remote Replication User
-
The following code creates a user and policy for supporting synchronizing data into the
Bakercluster. Replace the passwordLongRandomSecretKeywith a long, random, and secure secret key as per your organizations best practices for password generation.wget -O - https://docs.min.io/minio/baremetal/examples/ReplicationRemoteUserPolicy.json | \ mc admin policy add Baker ReplicationRemoteUserPolicy /dev/stdin mc admin user add Baker bakerReplicationRemoteUser LongRandomSecretKey mc admin policy set Baker ReplicationRemoteUserPolicy user=bakerReplicationRemoteUser
2)
Configure mc Access to the Source and Destination
Cluster
Use the mc alias set command to add an alias for both
source and destination MinIO clusters.
Use the mc alias set command to add a replication-specific
alias for both remote clusters:
mc alias set AlphaReplication HOSTNAME AlphaReplicationAdmin LongRandomSecretKey
mc alias set BakerReplication HOSTNAME BakerReplicationUser LongRandomSecretKey
3) Create a Replication Target for the Destination Cluster
Use the mc admin bucket remote command to create a
replication target for the destination cluster. MinIO supports
one remote target per destination bucket. You cannot create
multiple remote targets for the same destination bucket.
mc admin bucket remote add AlphaReplication/SOURCEBUCKET \
https://bakerReplicationRemoteUser:LongRandomSecretKey@HOSTNAME/DESTINATIONBUCKET
--service "replication"
[--sync]
- Replace
SOURCEBUCKETwith the name of the source bucket on theAlphacluster. - Replace
HOSTNAMEwith the URL of theBakercluster. - Replace
DESTINATIONBUCKETwith the name of the target bucket on theBakercluster. - Specify the
~mc admin bucket remote add syncoption to enable synchronous replication. Omit the option to use the default of asynchronous replication. See the reference documentation for~mc admin bucket remote add syncfor more information on synchronous vs asynchronous replication.
The command returns an ARN similar to the following:
Role ARN = 'arn:minio:replication::<UUID>:DESTINATIONBUCKET'
Copy the ARN string for use in the next step.
4) Create a New Bucket Replication Rule
Use the mc replicate add command to add the new server-side
replication rule to the source MinIO cluster.
mc replicate add AlphaReplication/SOURCEBUCKET \
--remote-bucket DESTINATIONBUCKET \
--arn 'arn:minio:replication::<UUID>:DESTINATIONBUCKET' \
--replicate "delete,delete-marker,existing-objects"
Replace
SOURCEBUCKETwith the name of the bucket from which Alpha replicates data. The name must match the bucket specified when creating the remote target in the previous step.Replace the
DESTINATIONBUCKETwith the name of theBakerbucket to which Alpha replicates data. The name must match the bucket specified when creating the remote target in the previous step.Replace the
--arnvalue with the ARN returned in the previous step. Ensure you specify the ARN created on theAlphacluster. You can usemc admin bucket remote lsto list all remote ARNs configured on the cluster.The
--replicate "delete,delete-marker,existing-objects"flag enables the following replication features:Replication of Deletes <minio-replication-behavior-delete>Replication of existing Objects <minio-replication-behavior-existing-objects>
See
mc replicate add replicatefor more complete documentation. Omit these fields to disable replication of delete operations or replication of existing objects respectively.
Specify any other supported optional arguments for mc replicate add.
5) Validate the Replication Configuration
Use mc cp to copy
a new object to the source bucket.
mc cp ~/foo.txt Alpha/SOURCEBUCKET
Use mc ls to
verify the object exists on the destination bucket:
mc ls Baker/DESTINATIONBUCKET
If the remote target was configured without the ~mc admin bucket remote add sync option, the
destination bucket may have some delay before it receives the new
object.