Overview
IONOS Object Storage is a secure, scalable storage solution that offers high data availability and performance. The product adheres to the S3 API standards, enabling the storage of vast amounts of unstructured data and seamless integration into S3-compatible applications and infrastructures.
Unlike traditional hierarchical systems like block storage volumes or disk file systems, Object Storage utilizes a flat structure that is ideal for storing large chunks of unstructured, static data that you want to keep ‘as is’ for later access. Businesses of all sizes can use IONOS Object Storage to store files (objects) for varied Use Cases.
Service availability
The IONOS Object Storage service is available in the following locations:
Data Center | Region | Bucket Type |
---|---|---|
Frankfurt, Germany |
| User-owned buckets |
Berlin, Germany |
| User-owned buckets |
Logroño, Spain |
| User-owned buckets |
Berlin, Germany |
| Contract-owned buckets |
For the list of available points of access, see Endpoints.
How does IONOS Object Storage work?
In IONOS Object Storage, the data that you want to store in the Object Storage is called Objects. The data types could be archives, backups, log files, documents, images, and media assets. Each object is allocated a unique URL for direct access. Further, you can group these objects within a folder to help organize and manage these objects within a bucket. For more information, see Objects and Folders.
To begin with Object Storage, you need to generate a key, which is a unique identifier that allows you access to buckets and objects. This key is a combination of Access Key and Secret Key, listed in the Key Management section. For more information, see Key Management.
To upload objects into the Object Storage, you need to create containers known as Buckets by choosing the region and a unique bucket name. The objects are stored in these buckets which are accompanied by rich metadata. For more information, see Buckets and Bucket Types.
Based on access permissions, buckets, and objects can be publicly accessible or kept private and shared with only intended users. Use the Access Control List (ACL) or Bucket Policy settings to manage access.
Last updated