A bucket is a service in cloud computing used for storing and managing data. Data buckets are used to store various types of data files, supporting multiple purposes such as backup, analysis, and content distribution. Static resource buckets are used to host static website content that does not require server-side processing. Setting up OBS buckets helps in efficiently storing and managing data.
in the upper left corner of the management console to select a region and select an enterprise project from Enterprise Project in the lower left corner of the Workspace page.Figure 1 Data bucket

Parameter | Description |
|---|---|
Endpoint | Endpoint. OBS provides an endpoint for each region. An endpoint can be understood as the regional domain name of OBS in different regions, used to handle access requests for their respective regions. |
Bucket Name | A bucket is a container for storing objects in OBS. |
Path Prefix | Path where an object is stored in a bucket. |
Max. Retention Period (Days) | Retention period, in days. NOTE: Set this parameter to 0 removes any restrictions on the retention period. |
File Encryption |
|
AK | Access key ID. It is the unique ID associated with the SK. An AK is used together with an SK to cryptographically sign requests. |
SK | Used together with the access key ID to sign requests cryptographically. It identifies a request sender and prevents the request from being modified. |
Figure 2 Static resource bucket

Parameter | Description |
|---|---|
Bucket Type |
|
Endpoint | Endpoint. OBS provides an endpoint for each region. An endpoint can be understood as the regional domain name of OBS in different regions, used to handle access requests for their respective regions. |
Bucket Name | A bucket is a container for storing objects in OBS. |
Path Prefix | Path where an object is stored in a bucket. |
Max. Retention Period (Days) | Retention period, in days. NOTE: Set this parameter to 0 removes any restrictions on the retention period. |
File Encryption |
|
AK | Access key ID. It is the unique ID associated with the SK. An AK is used together with an SK to cryptographically sign requests. |
SK | Used together with the access key ID to sign requests cryptographically. It identifies a request sender and prevents the request from being modified. |