...
Within a tenant, a domain is the primary entity for dividing and controlling both access and resources. Domains have these essential features:
...
Info |
---|
Unnamed objectsUnnamed objects written directly to the domain are represented by a system-defined Content IDs bucket that is part of each domain. |
See the Naming Rules for Swarm for domains.
Domain Usage — The Storage Used chart displays the current current size of the storage footprint used by all domains, inclusive of all versions, replicas, and erasure-coded segments when viewing all domains in a given tenant. The Bandwidth Used chart displays the total bandwidth (both bytes in and bytes out) used by each domain over a rolling 30-day window. See Usage Reports.
...
Info |
---|
Delete DomainThe Delete command deletes not only the domain but also and all buckets and uploaded contents and any saved collections for the domain. Warning: This command cannot be undone, so proceed with caution. |
Domain Properties
...
Owner
Every domain must have needs an owner , who has with access to and ultimate authority over. As a root or tenant admin, create Create a domain for another to manage as a root or tenant admin.
Info |
---|
NoteOwnership defaults to the specific administrator who created the domain, but the owner does not need to be a root or tenant administrator. |
In general, change Change the owner when creating a context for someone else to manage. Typically, when creating a domain for a client, one One does not want to own or be responsible for managing the data in that domainthe domain when creating a domain for a client.
Quotas
Quotas can be set to determine how much storage and/or network bandwidth the domain is permitted to consume.
...
Storage policies control how this domain's objects are protected (via using replication and/or erasure coding) and whether they are versioned. By default, the versioning is in use. The domain inherits the storage policies in force for the cluster by default.
Specify custom policies if inheriting these policies is disabled, but these custom policies are subject to what is allowed and in force in the cluster. If A warning icon and message alerts to the situation if opting for something being overridden by a higher policy, a warning icon and message alerts to the situation.
...
The IDSYS objects define the identity management systems that control controlling the domain's users, specifically:
User and group information
The authentication system
...