MinIO Server
Table of Contents
MinIO Server
The
minio
server
command starts the MinIO server process:
minio server /mnt/disk{1...4}
For examples of deploying
minio
server
on a bare metal environment,
see
Install and Deploy MinIO
.
For examples of deploying
minio
server
on a Kubernetes environment,
see
Deploying a MinIO Tenant
.
AGPLv3
minio server is AGPLv3 licensed Free and Open Source (FOSS) software.
Applications integrating mc may trigger AGPLv3 compliance requirements. MinIO Commercial Licensing is the best option for applications which trigger AGPLv3 obligations where open-sourcing the application is not an option.
Configuration Settings
The
minio
server
process stores its configuration in the storage
backend
directory
. You can modify
configuration options using the
mc
admin
config
command.
Syntax
Starts the
minio
server process.
The command has the following syntax:
minio server [FLAGS] HOSTNAME/DIRECTORIES [HOSTNAME/DIRECTORIES..]
The command accepts the following arguments:
- HOSTNAME
-
The hostname of a
minio server
process.For standalone deployments, this field is optional . You can start a standalone
server
process with only theDIRECTORIES
argument.For distributed deployments, specify the hostname of each
minio server
in the deployment. The group ofminio server
processes represent a single Server Pool .HOSTNAME
supports MinIO expansion notation{x...y}
to denote a sequential series of hostnames. MinIO requires sequential hostnames to identify eachminio server
process in the set.For example,
https://minio{1...4}.example.net
expands to:-
https://minio1.example.net
-
https://minio2.example.net
-
https://minio3.example.net
-
https://minio4.example.net
You must run the
minio server
command with the same combination ofHOSTNAME
andDIRECTORIES
on each host in the Server Pool.Each additional
HOSTNAME/DIRECTORIES
pair denotes an additional Server Set for the purpose of horizontal expansion of the MinIO deployment. For more information on Server Pools, see Server Pool . -
- DIRECTORIES
-
Required
The directories or drives the
minio server
process uses as the storage backend.DIRECTORIES
supports MinIO expansion notation{x...y}
to denote a sequential series of folders or drives. For example,/mnt/disk{1...4}
expands to:-
/mnt/disk1
-
/mnt/disk2
-
/mnt/disk3
-
/mnt/disk4
The
DIRECTORIES
path(s) must be empty when first starting theminio
process.The
minio server
process requires at least 4 drives or directories to enable erasure coding .Important
MinIO recommends locally-attached drives, where the
DIRECTORIES
path points to each drive on the host machine. MinIO recommends against using network-attached storage, as network latency reduces performance of those drives compared to locally-attached storage.For development or evaluation, you can specify multiple logical directories or partitions on a single physical volume to enable erasure coding on the deployment.
For production environments, MinIO does not recommend using multiple logical directories or partitions on a single physical disk. While MinIO supports those configurations, the potential cost savings come at the risk of decreased reliability.
-
- --address
-
Optional
Binds the
minio
server process to a specific network address and port number. Specify the address and port asADDRESS:PORT
, whereADDRESS
is an IP address or hostname andPORT
is a valid and open port on the host system.To change the port number for all IP addresses or hostnames configured on the host machine, specify
:PORT
wherePORT
is a valid and open port on the host.Changed in version RELEASE.2023-01-02T09-40-09Z: You can configure your hosts file to have MinIO only listen on specific IPs. For example, if the machine’s /etc/hosts file contains the following:
127.0.1.1 minioip 127.0.1.2 minioip
A command like the following would listen for API calls on port
9000
on both configured IP addresses.minio server --address "minioip:9000" ~/miniodirectory
If omitted,
minio
binds to port9000
on all configured IP addresses or hostnames on the host machine.
- --console-address
-
Optional
Specifies a static port for the embedded MinIO Console.
Omit to direct MinIO to generate a dynamic port at server startup. The MinIO server outputs the port to the system log.
- --certs-dir, -S
-
Optional
Specifies the path to the folder containing certificates the
minio
process uses for configuring TLS/SSL connectivity.Omit to use the default directory paths:
-
Linux/OSX:
${HOME}/.minio/certs
-
Windows:
%%USERPROFILE%%\.minio\certs
.
See Network Encryption (TLS) for more information on TLS/SSL connectivity.
-
Environment Variables
The
minio
server
processes uses the following
environment variables during startup to set configuration settings.
Core Configuration
- MINIO_VOLUMES
-
The directories or drives the
minio server
process uses as the storage backend.Functionally equivalent to setting
minio server DIRECTORIES
. Use this value when configuring MinIO to run using an environment file.
Root Credentials
- MINIO_ROOT_USER
-
The access key for the root user.
Warning
If
MINIO_ROOT_USER
is unset,minio
defaults tominioadmin
.NEVER use the default credentials in production environments. MinIO strongly recommends specifying a unique, long, and random
MINIO_ROOT_USER
value for all environments.
- MINIO_ROOT_PASSWORD
-
The access key for the root user.
Warning
If
MINIO_ROOT_PASSWORD
is unset,minio
defaults tominioadmin
.NEVER use the default credentials in production environments. MinIO strongly recommends specifying a unique, long, and random
MINIO_ROOT_PASSWORD
value for all environments.
- MINIO_ACCESS_KEY
-
Deprecated since version RELEASE.2021-04-22T15-44-28Z.
The access key for the root user.
This environment variable is deprecated in favor of the
MINIO_ROOT_USER
environment variable.Warning
If
MINIO_ACCESS_KEY
is unset,minio
defaults tominioadmin
.NEVER use the default credentials in production environments. MinIO strongly recommends specifying a unique, long, and random
MINIO_ACCESS_KEY
value for all environments.
- MINIO_SECRET_KEY
-
Deprecated since version RELEASE.2021-04-22T15-44-28Z.
The secret key for the root user.
This environment variable is deprecated in favor of the
MINIO_ROOT_PASSWORD
environment variable.Warning
If
MINIO_SECRET_KEY
is unset,minio
defaults tominioadmin
.NEVER use the default credentials in production environments. MinIO strongly recommends specifying a unique, long, and random
MINIO_ACCESS_KEY
value for all environments.
- MINIO_ACCESS_KEY_OLD
-
Deprecated since version RELEASE.2021-04-22T15-44-28Z.
To perform root credential rotation, modify the
MINIO_ROOT_USER
and MINIO_ROOT_PASSWORD environment variables.
- MINIO_SECRET_KEY_OLD
-
Deprecated since version RELEASE.2021-04-22T15-44-28Z.
To perform root credential rotation, modify the
MINIO_ROOT_USER
and MINIO_ROOT_PASSWORD environment variables.
MinIO Console
The following environment variables control behavior for the embedded MinIO Console:
- MINIO_PROMETHEUS_URL
-
Optional
Specify the URL for a Prometheus service configured to scrape MinIO metrics .
The MinIO Console populates the Dashboard with cluster metrics using the
minio-job
Prometheus scraping job.If you are using a standalone MinIO Console process, this variable corresponds to
CONSOLE_PROMETHEUS_URL
.
- MINIO_PROMETHEUS_JOB_ID
-
Optional
Specify the custom Prometheus job ID used for scraping MinIO metrics .
MinIO defaults to
minio-job
.If you are using a standalone MinIO Console process, this variable corresponds to
CONSOLE_PROMETHEUS_JOB_ID
.
- MINIO_LOG_QUERY_URL
-
Optional
Specify the URL of a PostgreSQL service to which MinIO writes Audit logs . The embedded MinIO Console provides a Log Search tool that allows querying the PostgreSQL service for collected logs.
- MINIO_SERVER_URL
-
Optional
Specify the URL hostname the MinIO Console should use for connecting to the MinIO Server.
This variable may be necessary if the MinIO Server TLS certificates do not contain any IP Subject Alternative Names (SAN). Specifically, the Console uses the MinIO Server IP address by default. If the Server TLS does not contain that IP address, then the Console cannot validate the TLS connection.
- MINIO_BROWSER_REDIRECT_URL
-
Optional
Specify the URL the MinIO Console provides as the redirect URL to the configured external identity manager .
This variable may be necessary for MinIO deployments behind a reverse proxy, load balancer, or similar technology where the internal hostname or IP structure is not reachable from the external network.
For example, consider a MinIO deployment behind a proxy where
https://minio.example.net
redirects to the MinIO deployment on port:9000
andhttps://console.minio.example.net
redirects to the MinIO Console on port:9001
.By default, the MinIO Console use its internal hostname as part of the request. Set this variable to
https://console.minio.example.net
to ensure the external identity provider has a reachable URL to which to send the authentication response.
Key Management Service and Encryption
- MINIO_KMS_KES_ENDPOINT
-
The endpoint for the MinIO Key Encryption Service (KES) process to use for supporting SSE-S3 and MinIO backend encryption operations.
- MINIO_KMS_KES_KEY_FILE
-
The private key associated to the the
MINIO_KMS_KES_CERT_FILE
x.509 certificate to use when authenticating to the KES server. The KES server requires clients to present their certificate for performing mutual TLS (mTLS).See the KES wiki for more complete documentation on KES access control.
- MINIO_KMS_KES_CERT_FILE
-
The x.509 certificate to present to the KES server. The KES server requires clients to present their certificate for performing mutual TLS (mTLS).
The KES server computes an identity from the certificate and compares it to its configured policies. The KES server grants the
minio
server access to only those operations explicitly granted by the policy.See the KES wiki for more complete documentation on KES access control.
- MINIO_KMS_KES_KEY_NAME
-
The name of an external key on the Key Management system (KMS) configured on the KES server and used for performing en/decryption operations. MinIO uses this key for the following:
- MINIO_KMS_KES_ENCLAVE
-
Use this optional environment variable to define the name of a KES enclave. A KES enclave provides an isolated space for its associated keys separate from other enclaves on a stateful KES server.
If not set, MinIO does not send enclave information. For a stateful KES server, this results in using the default enclave.
Storage Class
These environment variables configure the parity to use for objects written to the MinIO cluster.
MinIO Storage Classes are distinct from AWS Storage Classes, where the latter refers to the specific storage tier on which to store a given object.
- MINIO_STORAGE_CLASS_STANDARD
-
The number of parity blocks to create for objects with the standard (default) storage class. MinIO uses the
EC:N
notation to refer to the number of parity blocks (N
). This environment variable only applies to deployments with Erasure Coding enabled.Defaults to
4
.
- MINIO_STORAGE_CLASS_RRS
-
The number of parity blocks to create for objects with the reduced redundancy storage class. MinIO uses the
EC:N
notation to refer to the number of parity blocks (N
). This environment variable only applies to deployments with Erasure Coding enabled.Defaults to
2
.
Metrics and Logging
These environment variables control behavior related to MinIO metrics and logging. See Metrics and Alerts for more information.
- MINIO_PROMETHEUS_AUTH_TYPE
-
Specifies the authentication mode for the Prometheus scraping endpoints .
-
jwt
- Default MinIO requires that the scraping client specify a JWT token for authenticating requests. Usemc admin prometheus generate
to generate the necessary JWT bearer tokens. -
public
MinIO does not require that scraping clients authenticate their requests.
-
Logging
These environment variables configure publishing regular
minio
server
logs
and audit logs to an HTTP webhook. See
Publish Server or Audit Logs to an External Service
for more complete
documentation.
Server Logs
The following section documents environment variables for configuring MinIO to
publish
minio
server
logs to an HTTP webhook endpoint. See
Publish Server Logs to HTTP Webhook
for more complete documentation and
tutorials on using these environment variables.
You can specify multiple webhook endpoints as log targets by appending
a unique identifier
_ID
for each set of related logging environment
variables. For example, the following command set two distinct
server logs webhook endpoints:
export MINIO_LOGGER_WEBHOOK_ENABLE_PRIMARY="on"
export MINIO_LOGGER_WEBHOOK_AUTH_TOKEN_PRIMARY="TOKEN"
export MINIO_LOGGER_WEBHOOK_ENDPOINT_PRIMARY="http://webhook-1.example.net
export MINIO_LOGGER_WEBHOOK_ENABLE_SECONDARY="on"
export MINIO_LOGGER_WEBHOOK_AUTH_TOKEN_SECONDARY="TOKEN"
export MINIO_LOGGER_WEBHOOK_ENDPOINT_SECONDARY="http://webhook-2.example.net
- MINIO_LOGGER_WEBHOOK_ENABLE
-
Specify
"on"
to enable publishingminio server
logs to the HTTP webhook endpoint.Requires specifying
MINIO_LOGGER_WEBHOOK_ENDPOINT
.This variable corresponds to setting the top-level
logger_webhook
configuration setting.
- MINIO_LOGGER_WEBHOOK_ENDPOINT
-
The HTTP endpoint of the webhook.
This variable corresponds to the
logger_webhook endpoint
configuration setting.
- MINIO_LOGGER_WEBHOOK_AUTH_TOKEN
-
Optional
The JSON Web Token (JWT) to use for authenticating to the HTTP webhook. Omit for webhooks which do not enforce authentication.
This variable corresponds to the
logger_webhook auth_token
configuration setting.
Audit Logs
The following section documents environment variables for configuring MinIO to publish audit logs to an HTTP webhook endpoint. See Publish Audit Logs to HTTP Webhook for more complete documentation and tutorials on using these environment variables.
You can specify multiple webhook endpoints as audit log targets by appending
a unique identifier
_ID
for each set of related logging environment
variables. For example, the following command set two distinct
audit log webhook endpoints:
export MINIO_AUDIT_WEBHOOK_ENABLE_PRIMARY="on"
export MINIO_AUDIT_WEBHOOK_AUTH_TOKEN_PRIMARY="TOKEN"
export MINIO_AUDIT_WEBHOOK_ENDPOINT_PRIMARY="http://webhook-1.example.net
export MINIO_AUDIT_WEBHOOK_CLIENT_CERT_SECONDARY="/tmp/cert.pem"
export MINIO_AUDIT_WEBHOOK_CLIENT_KEY_SECONDARY="/tmp/key.pem"
export MINIO_AUDIT_WEBHOOK_ENABLE_SECONDARY="on"
export MINIO_AUDIT_WEBHOOK_AUTH_TOKEN_SECONDARY="TOKEN"
export MINIO_AUDIT_WEBHOOK_ENDPOINT_SECONDARY="http://webhook-1.example.net
export MINIO_AUDIT_WEBHOOK_CLIENT_CERT_SECONDARY="/tmp/cert.pem"
export MINIO_AUDIT_WEBHOOK_CLIENT_KEY_SECONDARY="/tmp/key.pem"
- MINIO_AUDIT_WEBHOOK_ENABLE
-
Specify
"on"
to enable publishing audit logs to the HTTP webhook endpoint.Requires specifying
MINIO_AUDIT_WEBHOOK_ENDPOINT
.This variable corresponds to setting the top-level
audit_webhook
configuration setting.
- MINIO_AUDIT_WEBHOOK_ENDPOINT
-
The HTTP endpoint of the webhook.
This variable corresponds to the
audit_webhook endpoint
configuration setting.
- MINIO_AUDIT_WEBHOOK_AUTH_TOKEN
-
Optional
The JSON Web Token (JWT) to use for authenticating to the HTTP webhook. Omit for webhooks which do not enforce authentication.
This variable corresponds to the
audit_webhook auth_token
configuration setting.
- MINIO_AUDIT_WEBHOOK_CLIENT_CERT
-
Optional
The x.509 client certificate to present to the HTTP webhook. Omit for webhooks which do not require clients to present a known TLS certificate.
Requires specifying
MINIO_AUDIT_WEBHOOK_CLIENT_KEY
.This variable corresponds to the
audit_webhook client_cert
configuration setting.
- MINIO_AUDIT_WEBHOOK_CLIENT_KEY
-
Optional
The x.509 private key to present to the HTTP webhook. Omit for webhooks which do not require clients to present a known TLS certificate.
Requires specifying
MINIO_AUDIT_WEBHOOK_CLIENT_CERT
.This variable corresponds to the
audit_webhook client_key
configuration setting.
Bucket Notifications
These environment variables configure notification targets for use with MinIO Bucket Notifications :
AMQP Service for Bucket Notifications
The following section documents environment variables for configuring an AMQP service as a target for Bucket Nofitications . See Publish Events to AMQP (RabbitMQ) for a tutorial on using these environment variables.
You can specify multiple AMQP service endpoints by appending a unique identifier
_ID
for each set of related AMQP environment variables:
the top level key. For example, the following commands set two distinct AMQP
service endpoints as
PRIMARY
and
SECONDARY
respectively:
set MINIO_NOTIFY_AMQP_ENABLE_PRIMARY="on"
set MINIO_NOTIFY_AMQP_URL_PRIMARY="amqp://user:password@amqp-endpoint.example.net:5672"
set MINIO_NOTIFY_AMQP_ENABLE_SECONDARY="on"
set MINIO_NOTIFY_AMQP_URL_SECONDARY="amqp://user:password@amqp-endpoint.example.net:5672"
For example,
MINIO_NOTIFY_AMQP_ENABLE_PRIMARY
indicates the environment variable is associated to
an AMQP service endpoint with ID of
PRIMARY
.
- MINIO_NOTIFY_AMQP_ENABLE
-
Specify
on
to enable publishing bucket notifications to an AMQP endpoint.Defaults to
off
.Requires specifying
MINIO_NOTIFY_AMQP_URL
if set toon
.
- MINIO_NOTIFY_AMQP_URL
-
Specify the AMQP server endpoint to which MinIO publishes bucket events. For example,
amqp://myuser:mypassword@localhost:5672
.This field is required if
MINIO_NOTIFY_AMQP_ENABLE
ison
. All other AMQP-related variables are optional.This variable corresponds to the
notify_amqp url
configuration setting.
- MINIO_NOTIFY_AMQP_EXCHANGE
-
Specify the name of the AMQP exchange to use.
This variable corresponds to the
notify_amqp exchange
configuration setting.
- MINIO_NOTIFY_AMQP_EXCHANGE_TYPE
-
Specify the type of the AMQP exchange.
This variable corresponds to the
notify_amqp exchange_type
configuration setting.
- MINIO_NOTIFY_AMQP_ROUTING_KEY
-
Specify the routing key for publishing events.
This variable corresponds to the
notify_amqp routing_key
configuration setting.
- MINIO_NOTIFY_AMQP_MANDATORY
-
Specify
off
to ignore undelivered messages errors. Defaults toon
.This variable corresponds to the
notify_amqp mandatory
configuration setting.
- MINIO_NOTIFY_AMQP_DURABLE
-
Specify
on
to persist the message queue across broker restarts. Defaults to ‘off’.This variable corresponds to the
notify_amqp durable
configuration setting.
- MINIO_NOTIFY_AMQP_NO_WAIT
-
Specify
on
to enable non-blocking message delivery. Defaults to ‘off’.This variable corresponds to the
notify_amqp no_wait
configuration setting.
- MINIO_NOTIFY_AMQP_INTERNAL
-
Specify
on
to use the exchange only if it is bound to other exchanges. See the RabbitMQ documentation on Exchange to Exchange Bindings for more information on AMQP exchange binding.This variable corresponds to the
notify_amqp internal
configuration setting.
- MINIO_NOTIFY_AMQP_AUTO_DELETED
-
Specify
on
to automatically delete the message queue if there are no consumers. Defaults tooff
.This variable corresponds to the
notify_amqp auto_deleted
configuration setting.
- MINIO_NOTIFY_AMQP_DELIVERY_MODE
-
Specify
1
for set the delivery mode to non-persistent queue.Specify
2
to set the delivery mode to persistent queue.This variable corresponds to the
notify_amqp delivery_mode
configuration setting.
- MINIO_NOTIFY_AMQP_QUEUE_DIR
-
Specify the directory path to enable MinIO’s persistent event store for undelivered messages, such as
/home/events
.MinIO stores undelivered events in the specified store while the AMQP service is offline and replays the directory when connectivity resumes.
This variable corresponds to the
notify_amqp queue_dir
configuration setting.
- MINIO_NOTIFY_AMQP_QUEUE_LIMIT
-
Specify the maximum limit for undelivered messages. Defaults to
100000
.This variable corresponds to the
notify_amqp queue_limit
configuration setting.
- MINIO_NOTIFY_AMQP_COMMENT
-
Specify a comment for the AMQP configuration.
This variable corresponds to the
notify_amqp comment
configuration setting.
MQTT Service for Bucket Notifications
The following section documents environment variables for configuring an MQTT service as a target for Bucket Nofitications . See Publish Events to MQTT for a tutorial on using these environment variables.
You can specify multiple MQTT service endpoints by appending a unique identifier
_ID
for each set of related MQTT environment variables:
the top level key. For example, the following commands set two distinct MQTT
service endpoints as
PRIMARY
and
SECONDARY
respectively:
set MINIO_NOTIFY_MQTT_ENABLE_PRIMARY="on"
set MINIO_NOTIFY_MQTT_BROKER_PRIMARY="tcp://user:password@mqtt-endpoint.example.net:1883"
set MINIO_NOTIFY_MQTT_ENABLE_SECONDARY="on"
set MINIO_NOTIFY_MQTT_BROKER_SECONDARY="tcp://user:password@mqtt-endpoint.example.net:1883"
For example,
MINIO_NOTIFY_MQTT_ENABLE_PRIMARY
indicates the environment variable is associated to
an MQTT service endpoint with ID of
PRIMARY
.
- MINIO_NOTIFY_MQTT_ENABLE
-
Specify
on
to enable publishing bucket notifications to an MQTT endpoint.Defaults to
off
.This variable corresponds to the
notify_mqtt
configuration setting.
- MINIO_NOTIFY_MQTT_BROKER
-
Required
Specify the MQTT server/broker endpoint. MinIO supports TCP, TLS, or Websocket connections to the server/broker URL. For example:
-
tcp://mqtt.example.net:1883
-
tls://mqtt.example.net:1883
-
ws://mqtt.example.net:1883
This variable corresponds to the
notify_mqtt broker
configuration setting. -
- MINIO_NOTIFY_MQTT_TOPIC
-
Required
Specify the name of the MQTT topic to associate with events published by MinIO to the MQTT endpoint.
This variable corresponds to the
notify_mqtt topic
configuration setting.
- MINIO_NOTIFY_MQTT_USERNAME
-
Required if the MQTT server/broker enforces authentication/authorization
Specify the MQTT username with which MinIO authenticates to the MQTT server/broker.
This variable corresponds to the
notify_mqtt username
configuration setting.
- MINIO_NOTIFY_MQTT_PASSWORD
-
Required if the MQTT server/broker enforces authentication/authorization
Specify the password for the MQTT username with which MinIO authenticates to the MQTT server/broker.
This variable corresponds to the
notify_mqtt password
configuration setting.
- MINIO_NOTIFY_MQTT_QOS
-
Specify the Quality of Service priority for the published events.
Defaults to
0
.This variable corresponds to the
notify_mqtt qos
configuration setting.
- MINIO_NOTIFY_MQTT_KEEP_ALIVE_INTERVAL
-
Specify the keep-alive interval for the MQTT connections. MinIO supports the following units of time measurement:
-
s
- seconds, “60s” -
m
- minutes, “60m” -
h
- hours, “24h” -
d
- days, “7d”
This variable corresponds to the
notify_mqtt keep_alive_interval
configuration setting. -
- MINIO_NOTIFY_MQTT_RECONNECT_INTERVAL
-
Specify the reconnect interval for the MQTT connections. MinIO supports the following units of time measurement:
-
s
- seconds, “60s” -
m
- minutes, “60m” -
h
- hours, “24h” -
d
- days, “7d”
This variable corresponds to the
notify_mqtt reconnect_interval
configuration setting. -
- MINIO_NOTIFY_MQTT_QUEUE_DIR
-
Specify the directory path to enable MinIO’s persistent event store for undelivered messages, such as
/home/events
.MinIO stores undelivered events in the specified store while the MQTT server/broker is offline and replays the directory when connectivity resumes.
This variable corresponds to the
notify_mqtt queue_dir
configuration setting.
- MINIO_NOTIFY_MQTT_QUEUE_LIMIT
-
Specify the maximum limit for undelivered messages. Defaults to
100000
.This variable corresponds to the
notify_mqtt queue_limit
configuration setting.
- MINIO_NOTIFY_MQTT_COMMENT
-
Specify a comment to associate with the MQTT configuration.
This variable corresponds to the
notify_mqtt comment
configuration setting.
Elasticsearch Service for Bucket Notifications
The following section documents environment variables for configuring an Elasticsearch service as a target for Bucket Nofitications . See Publish Events to Elasticsearch for a tutorial on using these environment variables.
You can specify multiple Elasticsearch service endpoints by appending a unique identifier
_ID
for each set of related Elasticsearch environment variables:
the top level key. For example, the following commands set two distinct Elasticsearch
service endpoints as
PRIMARY
and
SECONDARY
respectively:
set MINIO_NOTIFY_ELASTICSEARCH_ENABLE_PRIMARY="on"
set MINIO_NOTIFY_ELASTICSEARCH_URL_PRIMARY="https://user:password@elasticsearch-endpoint.example.net:9200"
set MINIO_NOTIFY_ELASTICSEARCH_INDEX_PRIMARY="bucketevents"
set MINIO_NOTIFY_ELASTICSEARCH_FORMAT_PRIMARY="namespace"
set MINIO_NOTIFY_ELASTICSEARCH_ENABLE_SECONDARY="on"
set MINIO_NOTIFY_ELASTICSEARCH_URL_SECONDARY="https://user:password@elasticsearch-endpoint.example.net:9200"
set MINIO_NOTIFY_ELASTICSEARCH_INDEX_SECONDARY="bucketevents"
set MINIO_NOTIFY_ELASTICSEARCH_FORMAT_SECONDARY="namespace"
- MINIO_NOTIFY_ELASTICSEARCH_ENABLE
-
Specify
on
to enable publishing bucket notifications to an Elasticsearch service endpoint.Defaults to
off
.Requires specifying the following additional environment variables if set to
on
:This variable corresponds to the
notify_elasticsearch
configuration setting.
- MINIO_NOTIFY_ELASTICSEARCH_URL
-
Required
Specify the Elasticsearch service endpoint to which MinIO publishes bucket events. For example,
https://elasticsearch.example.com:9200
.MinIO supports passing authentication information using as URL parameters using the format
PROTOCOL://USERNAME:PASSWORD@HOSTNAME:PORT
.This variable corresponds to the
notify_elasticsearch url
configuration setting.
- MINIO_NOTIFY_ELASTICSEARCH_INDEX
-
Required
Specify the name of the Elasticsearch index in which to store or update MinIO bucket events. Elasticsearch automatically creates the index if it does not exist.
This variable corresponds to the
notify_elasticsearch index
configuration setting.
- MINIO_NOTIFY_ELASTICSEARCH_FORMAT
-
Required
Specify the format of event data written to the Elasticsearch index. MinIO supports the following values:
-
namespace
-
For each bucket event, the MinIO creates a JSON document with the bucket and object name from the event as the document ID and the actual event as part of the document body. Additional updates to that object modify the existing index entry for that object. Similarly, deleting the object also deletes the corresponding index entry.
-
access
-
For each bucket event, MinIO creates a JSON document with the event details and appends it to the index with an Elasticsearch-generated random ID. Additional updates to an object result in new index entries, and existing entries remain unmodified.
This variable corresponds to the
notify_elasticsearch format
configuration setting. -
- MINIO_NOTIFY_ELASTICSEARCH_USERNAME
-
Optional
The username for connecting to an Elasticsearch service endpoint which enforces authentication.
This variable corresponds to the
notify_elasticsearch username
configuration setting.
- MINIO_NOTIFY_ELASTICSEARCH_PASSWORD
-
Optional
The password for connecting to an Elasticsearch service endpoint which enforces authentication.
This variable corresponds to the
notify_elasticsearch password
configuration setting.
- MINIO_NOTIFY_ELASTICSEARCH_QUEUE_DIR
-
Optional
Specify the directory path to enable MinIO’s persistent event store for undelivered messages, such as
/home/events
.MinIO stores undelivered events in the specified store while the Elasticsearch service is offline and replays the directory when connectivity resumes.
This variable corresponds to the
notify_elasticsearch queue_dir
configuration setting.
- MINIO_NOTIFY_ELASTICSEARCH_QUEUE_LIMIT
-
Optional
Specify the maximum limit for undelivered messages. Defaults to
100000
.This variable corresponds to the
notify_elasticsearch queue_limit
configuration setting.
- MINIO_NOTIFY_ELASTICSEARCH_COMMENT
-
Optional
Specify a comment to associate with the Elasticsearch configuration.
This variable corresponds to the
notify_elasticsearch comment
configuration setting.
NSQ Service for Bucket Notifications
The following section documents environment variables for configuring an NSQ service as a target for Bucket Nofitications . See Publish Events to NSQ for a tutorial on using these environment variables.
You can specify multiple NSQ service endpoints by appending a unique
identifier
_ID
for each set of related NSQ environment variables:
the top level key. For example, the following commands set two distinct
NSQ service endpoints as
PRIMARY
and
SECONDARY
respectively:
set MINIO_NOTIFY_NSQ_ENABLE_PRIMARY="on"
set MINIO_NOTIFY_NSQ_NSQD_ADDRESS_PRIMARY="https://user:password@nsq-endpoint.example.net:9200"
set MINIO_NOTIFY_NSQ_TOPIC_PRIMARY="bucketevents"
set MINIO_NOTIFY_NSQ_ENABLE_SECONDARY="on"
set MINIO_NOTIFY_NSQ_NSQD_ADDRESS_SECONDARY="https://user:password@nsq-endpoint.example.net:9200"
set MINIO_NOTIFY_NSQ_TOPIC_SECONDARY="bucketevents"
- MINIO_NOTIFY_NSQ_ENABLE
-
Specify
on
to enable publishing bucket notifications to an NSQ endpoint.This variable corresponds to the
notify_nsq
configuration setting.
- MINIO_NOTIFY_NSQ_NSQD_ADDRESS
-
Required
Specify the NSQ server address. For example:
https://nsq-endpoing.example.net:4150
This variable corresponds to the
notify_nsq nsqd_address
configuration setting.
- MINIO_NOTIFY_NSQ_TOPIC
-
Required
Specify the name of the NSQ topic MinIO uses when publishing events to the broker.
This variable corresponds to the
notify_nsq topic
configuration setting.
- MINIO_NOTIFY_NSQ_TLS
-
Optional
Specify
on
to enable TLS connectivity to the NSQ service broker.This variable corresponds to the
notify_nsq tls
configuration setting.
- MINIO_NOTIFY_NSQ_TLS_SKIP_VERIFY
-
Optional
Enables or disables TLS verification of the NSQ service broker TLS certificates.
-
Specify
on
to disable TLS verification (Default). -
Specify
off
to enable TLS verification.
This variable corresponds to the
notify_nsq tls_skip_verify
configuration setting. -
- MINIO_NOTIFY_NSQ_QUEUE_DIR
-
Optional
Specify the directory path to enable MinIO’s persistent event store for undelivered messages, such as
/home/events
.MinIO stores undelivered events in the specified store while the NSQ server/broker is offline and replays the directory when connectivity resumes.
This variable corresponds to the
notify_nsq queue_dir
configuration setting.
- MINIO_NOTIFY_NSQ_QUEUE_LIMIT
-
Optional
Specify the maximum limit for undelivered messages. Defaults to
100000
.This variable corresponds to the
notify_nsq queue_limit
configuration setting.
- MINIO_NOTIFY_NSQ_COMMENT
-
Optional
Specify a comment to associate with the NSQ configuration.
This variable corresponds to the
notify_nsq comment
configuration setting.
Redis Service for Bucket Notifications
The following section documents environment variables for configuring an Redis service as a target for Bucket Nofitications . See Publish Events to Redis for a tutorial on using these environment variables.
You can specify multiple Redis service endpoints by appending a unique
identifier
_ID
for each set of related Redis environment variables: the top
level key. For example, the following commands set two distinct Redis service
endpoints as
PRIMARY
and
SECONDARY
respectively:
set MINIO_NOTIFY_REDIS_ENABLE_PRIMARY="on"
set MINIO_NOTIFY_REDIS_REDIS_ADDRESS_PRIMARY="https://user:password@redis-endpoint.example.net:9200"
set MINIO_NOTIFY_REDIS_KEY_PRIMARY="bucketevents"
set MINIO_NOTIFY_REDIS_FORMAT_PRIMARY="namespace"
set MINIO_NOTIFY_REDIS_ENABLE_SECONDARY="on"
set MINIO_NOTIFY_REDIS_REDIS_ADDRESS_SECONDARY="https://user:password@redis-endpoint.example.net:9200"
set MINIO_NOTIFY_REDIS_KEY_SECONDARY="bucketevents"
set MINIO_NOTIFY_REDIS_FORMAT_SECONDARY="namespace"
- MINIO_NOTIFY_REDIS_ENABLE
-
Required
Specify
on
to enable publishing bucket notifications to a Redis service endpoint.Defaults to
off
.Requires specifying the following additional environment variables if set to
on
:This variable corresponds to the
notify_redis
configuration setting.
- MINIO_NOTIFY_REDIS_ADDRESS
-
Required
Specify the Redis service endpoint to which MinIO publishes bucket events. For example,
https://redis.example.com:6369
.This variable corresponds to the
notify_redis address
configuration setting.
- MINIO_NOTIFY_REDIS_KEY
-
Required
Specify the Redis key to use for storing and updating events. Redis auto-creates the key if it does not exist.
This variable corresponds to the
notify_redis key
configuration setting.
- MINIO_NOTIFY_REDIS_FORMAT
-
Required
Specify the format of event data written to the Redis service endpoint. MinIO supports the following values:
-
namespace
-
For each bucket event, the MinIO creates a JSON document with the bucket and object name from the event as the document ID and the actual event as part of the document body. Additional updates to that object modify the existing index entry for that object. Similarly, deleting the object also deletes the corresponding index entry.
-
access
-
For each bucket event, MinIO creates a JSON document with the event details and appends it to the key with a Redis-generated random ID. Additional updates to an object result in new index entries, and existing entries remain unmodified.
This variable corresponds to the
notify_redis format
configuration setting. -
- MINIO_NOTIFY_REDIS_PASSWORD
-
Optional
Specify the password for the Redis server.
This variable corresponds to the
notify_redis password
configuration setting.
- MINIO_NOTIFY_REDIS_QUEUE_DIR
-
Optional
Specify the directory path to enable MinIO’s persistent event store for undelivered messages, such as
/home/events
.MinIO stores undelivered events in the specified store while the Redis server/broker is offline and replays the directory when connectivity resumes.
This variable corresponds to the
notify_redis queue_dir
configuration setting.
- MINIO_NOTIFY_REDIS_QUEUE_LIMIT
-
Optional
Specify the maximum limit for undelivered messages. Defaults to
100000
.This variable corresponds to the
notify_redis queue_limit
configuration setting.
- MINIO_NOTIFY_REDIS_COMMENT
-
Optional
Specify a comment to associate with the Redis configuration.
This variable corresponds to the
notify_redis comment
configuration setting.
NATS Service for Bucket Notifications
The following section documents environment variables for configuring an NATS service as a target for Bucket Nofitications . See Publish Events to NATS for a tutorial on using these environment variables.
You can specify multiple NATS service endpoints by appending a unique identifier
_ID
for each set of related NATS environment variables:
the top level key. For example, the following commands set two distinct NATS
service endpoints as
PRIMARY
and
SECONDARY
respectively:
set MINIO_NOTIFY_NATS_ENABLE_PRIMARY="on"
set MINIO_NOTIFY_NATS_ADDRESS_PRIMARY="https://nats-endpoint.example.net:4222"
set MINIO_NOTIFY_NATS_SUBJECT="minioevents"
set MINIO_NOTIFY_NATS_ENABLE_SECONDARY="on"
set MINIO_NOTIFY_NATS_ADDRESS_SECONDARY="https://nats-endpoint.example.net:4222"
set MINIO_NOTIFY_NATS_SUBJECT="minioevents"
For example,
MINIO_NOTIFY_NATS_ENABLE_PRIMARY
indicates the environment variable is associated to
an NATS service endpoint with ID of
PRIMARY
.
- MINIO_NOTIFY_NATS_ENABLE
-
Required
Specify
on
to enable publishing bucket notifications to an NATS service endpoint.Defaults to
off
.This environment variable corresponds with the
notify_nats
configuration setting.
- MINIO_NOTIFY_NATS_ADDRESS
-
Required
Specify the NATS service endpoint to which MinIO publishes bucket events. For example,
https://nats-endpoint.example.com:4222
.This environment variable corresponds with the
notify_nats address
configuration setting.
- MINIO_NOTIFY_NATS_SUBJECT
-
Required
Specify the subscription to which MinIO associates events published to the NATS endpoint.
This environment variable corresponds with the
notify_nats subject
configuration setting.
- MINIO_NOTIFY_NATS_USERNAME
-
Optional
Specify the username for connecting to the NATS service endpoint.
This environment variable corresponds with the
notify_nats username
configuration setting.
- MINIO_NOTIFY_NATS_PASSWORD
-
Optional
Specify the passport for connecting to the NATS service endpoint.
This environment variable corresponds with the
notify_nats password
configuration setting.
- MINIO_NOTIFY_NATS_TOKEN
-
Optional
Specify the token for connecting to the NATS service endpoint.
This environment variable corresponds with the
notify_nats token
configuration setting.
- MINIO_NOTIFY_NATS_TLS
-
Optional
Specify
on
to enable TLS connectivity to the NATS service endpoint.This environment variable corresponds with the
notify_nats tls
configuration setting.
- MINIO_NOTIFY_NATS_TLS_SKIP_VERIFY
-
Optional
Enables or disables TLS verification of the NATS service endpoint TLS certificates.
-
Specify
on
to disable TLS verification (Default). -
Specify
off
to enable TLS verification.
This environment variable corresponds with the
notify_nats tls_skip_verify
configuration setting. -
- MINIO_NOTIFY_NATS_PING_INTERVAL
-
Optional
Specify the duration interval for client pings to the NATS server. MinIO supports the following time units:
-
s
- seconds,"60s"
-
m
- minutes,"5m"
-
h
- hours,"1h"
-
d
- days,"1d"
This environment variable corresponds with the
notify_nats ping_interval
configuration setting. -
- MINIO_NOTIFY_NATS_STREAMING
-
Optional
Specify
on
to enable streaming events to the NATS service endpoint.This environment variable corresponds with the
notify_nats streaming
configuration setting.
- MINIO_NOTIFY_NATS_STREAMING_ASYNC
-
Optional
Specify
on
to enable asynchronous publishing of events to the NATS service endpoint.This environment variable corresponds with the
notify_nats streaming_async
configuration setting.
- MINIO_NOTIFY_NATS_STREAMING_MAX_PUB_ACKS_IN_FLIGHT
-
Optional
Specify the number of messages to publish without waiting for an ACK response from the NATS service endpoint.
This environment variable corresponds with the
notify_nats streaming_max_pub_acks_in_flight
configuration setting.
- MINIO_NOTIFY_NATS_STREAMING_CLUSTER_ID
-
Optional
Specify the unique ID for the NATS streaming cluster.
This environment variable corresponds with the
notify_nats streaming_cluster_id
configuration setting.
- MINIO_NOTIFY_NATS_CERT_AUTHORITY
-
Optional
Specify the path to the Certificate Authority chain used to sign the NATS service endpoint TLS certificates.
This environment variable corresponds with the
notify_nats cert_authority
configuration setting.
- MINIO_NOTIFY_NATS_CLIENT_CERT
-
Optional
Specify the path to the client certificate to use for performing mTLS authentication to the NATS service endpoint.
This environment variable corresponds with the
notify_nats client_cert
configuration setting.
- MINIO_NOTIFY_NATS_CLIENT_KEY
-
Optional
Specify the path to the client private key to use for performing mTLS authentication to the NATS service endpoint.
This environment variable corresponds with the
notify_nats client_key
configuration setting.
- MINIO_NOTIFY_NATS_QUEUE_DIR
-
Optional
Specify the directory path to enable MinIO’s persistent event store for undelivered messages, such as
/home/events
.MinIO stores undelivered events in the specified store while the NATS server/broker is offline and replays the directory when connectivity resumes.
This environment variable corresponds with the
notify_nats queue_dir
configuration setting.
- MINIO_NOTIFY_NATS_QUEUE_LIMIT
-
Optional
Specify the maximum limit for undelivered messages. Defaults to
100000
.This environment variable corresponds with the
notify_nats queue_limit
configuration setting.
- MINIO_NOTIFY_NATS_COMMENT
-
Optional
Specify a comment to associate with the NATS configuration.
This environment variable corresponds with the
notify_nats comment
configuration setting.
PostgreSQL Service for Bucket Notifications
The following section documents environment variables for configuring an POSTGRES service as a target for Bucket Nofitications . See Publish Events to PostgreSQL for a tutorial on using these environment variables.
You can specify multiple PostgreSQL service endpoints by appending a unique identifier
_ID
for each set of related PostgreSQL environment variables:
the top level key. For example, the following commands set two distinct PostgreSQL
service endpoints as
PRIMARY
and
SECONDARY
respectively:
set MINIO_NOTIFY_POSTGRES_ENABLE_PRIMARY="on"
set MINIO_NOTIFY_POSTGRES_CONNECTION_STRING_PRIMARY="host=postgresql-endpoint.example.net port=4222..."
set MINIO_NOTIFY_POSTGRES_TABLE_PRIMARY="minioevents"
set MINIO_NOTIFY_POSTGRES_FORMAT_PRIMARY="namespace"
set MINIO_NOTIFY_POSTGRES_ENABLE_SECONDARY="on"
set MINIO_NOTIFY_POSTGRES_CONNECTION_STRING_SECONDARY="host=postgresql-endpoint.example.net port=4222..."
set MINIO_NOTIFY_POSTGRES_TABLE_SECONDARY="minioevents"
set MINIO_NOTIFY_POSTGRES_FORMAT_SECONDARY="namespace"
For example,
MINIO_NOTIFY_POSTGRES_ENABLE_PRIMARY
indicates the environment variable is
associated to an PostgreSQL service endpoint with ID of
PRIMARY
.
- MINIO_NOTIFY_POSTGRES_ENABLE
-
Required
Specify
on
to enable publishing bucket notifications to a PostgreSQL service endpoint.Defaults to
off
.Requires specifying the following additional environment variables if set to
on
:This environment variable corresponds with the
notify_postgres
configuration setting.
- MINIO_NOTIFY_POSTGRES_CONNECTION_STRING
-
Required
Specify the URI connection string of the PostgreSQL service endpoint. MinIO supports
key=value
format for the PostgreSQL connection string. For example:"host=https://postgresql.example.com port=5432 ..."
For more complete documentation on supported PostgreSQL connection string parameters, see the PostgreSQL COnnection Strings documentation .
This environment variable corresponds with the
notify_postgres connection_string
configuration setting.
- MINIO_NOTIFY_POSTGRES_TABLE
-
Required
Specify the name of the PostgreSQL table to which MinIO publishes event notifications.
This environment variable corresponds with the
notify_postgres table
configuration setting.
- MINIO_NOTIFY_POSTGRES_FORMAT
-
Required
Specify the format of event data written to the PostgreSQL service endpoint. MinIO supports the following values:
-
namespace
-
For each bucket event, the MinIO creates a JSON document with the bucket and object name from the event as the document ID and the actual event as part of the document body. Additional updates to that object modify the existing table entry for that object. Similarly, deleting the object also deletes the corresponding table entry.
-
access
-
For each bucket event, MinIO creates a JSON document with the event details and appends it to the table with a PostgreSQL-generated random ID. Additional updates to an object result in new index entries, and existing entries remain unmodified.
This environment variable corresponds with the
notify_postgres format
configuration setting. -
- MINIO_NOTIFY_POSTGRES_MAX_OPEN_CONNECTIONS
-
Optional
Specify the maximum number of open connections to the PostgreSQL database.
Defaults to
2
.This environment variable corresponds with the
notify_postgres max_open_connections
configuration setting.
- MINIO_NOTIFY_POSTGRES_QUEUE_DIR
-
Optional
Specify the directory path to enable MinIO’s persistent event store for undelivered messages, such as
/home/events
.MinIO stores undelivered events in the specified store while the PostgreSQL server/broker is offline and replays the directory when connectivity resumes.
This environment variable corresponds with the
notify_postgres queue_dir
configuration setting.
- MINIO_NOTIFY_POSTGRES_QUEUE_LIMIT
-
Optional
Specify the maximum limit for undelivered messages. Defaults to
100000
.This environment variable corresponds with the
notify_postgres queue_limit
configuration setting.
- MINIO_NOTIFY_POSTGRES_COMMENT
-
Optional
Specify a comment to associate with the PostgreSQL configuration.
This environment variable corresponds with the
notify_postgres comment
configuration setting.
MySQL Service for Bucket Notifications
The following section documents environment variables for configuring an MYSQL service as a target for Bucket Nofitications . See Publish Events to MySQL for a tutorial on using these environment variables.
You can specify multiple MySQL service endpoints by appending a unique
identifier
_ID
for each set of related MySQL environment variables: the top
level key. For example, the following commands set two distinct MySQL service
endpoints as
PRIMARY
and
SECONDARY
respectively:
set MINIO_NOTIFY_MYSQL_ENABLE_PRIMARY="on"
set MINIO_NOTIFY_MYSQL_DSN_STRING_PRIMARY="username:password@tcp(mysql.example.com:3306)/miniodb"
set MINIO_NOTIFY_MYSQL_TABLE_PRIMARY="minioevents"
set MINIO_NOTIFY_MYSQL_FORMAT_PRIMARY="namespace"
set MINIO_NOTIFY_MYSQL_ENABLE_SECONDARY="on"
set MINIO_NOTIFY_MYSQL_DSN_STRING_SECONDARY="username:password@tcp(mysql.example.com:3306)/miniodb"
set MINIO_NOTIFY_MYSQL_TABLE_SECONDARY="minioevents"
set MINIO_NOTIFY_MYSQL_FORMAT_SECONDARY="namespace"
For example,
MINIO_NOTIFY_MYSQL_ENABLE_PRIMARY
indicates the environment variable is
associated to an MySQL service endpoint with ID of
PRIMARY
.
- MINIO_NOTIFY_MYSQL_ENABLE
-
Required
Specify
on
to enable publishing bucket notifications to a MySQL service endpoint.Defaults to
off
.Requires specifying the following additional environment variables if set to
on
:This environment variable corresponds with the
notify_mysql
configuration setting.
- MINIO_NOTIFY_MYSQL_DSN_STRING
-
Required
Specify the data source name (DSN) connection string for the MySQL service endpoint. MinIO expects the following format:
<user>:<password>@tcp(<host>:<port>)/<database>
For example:
"username:password@tcp(mysql.example.com:3306)/miniodb"
This environment variable corresponds with the
notify_mysql dsn_string
configuration setting.
- MINIO_NOTIFY_MYSQL_TABLE
-
Required
Specify the name of the MySQL table to which MinIO publishes event notifications.
This environment variable corresponds with the
notify_mysql table
configuration setting.
- MINIO_NOTIFY_MYSQL_FORMAT
-
Required
Specify the format of event data written to the MySQL service endpoint. MinIO supports the following values:
-
namespace
-
For each bucket event, the MinIO creates a JSON document with the bucket and object name from the event as the document ID and the actual event as part of the document body. Additional updates to that object modify the existing table entry for that object. Similarly, deleting the object also deletes the corresponding table entry.
-
access
-
For each bucket event, MinIO creates a JSON document with the event details and appends it to the table with a MySQL-generated random ID. Additional updates to an object result in new index entries, and existing entries remain unmodified.
This environment variable corresponds with the
notify_mysql format
configuration setting. -
- MINIO_NOTIFY_MYSQL_MAX_OPEN_CONNECTIONS
-
Optional
Specify the maximum number of open connections to the MySQL database.
Defaults to
2
.This environment variable corresponds with the
notify_mysql max_open_connections
configuration setting.
- MINIO_NOTIFY_MYSQL_QUEUE_DIR
-
Optional
Specify the directory path to enable MinIO’s persistent event store for undelivered messages, such as
/home/events
.MinIO stores undelivered events in the specified store while the MySQL server/broker is offline and replays the directory when connectivity resumes.
This environment variable corresponds with the
notify_mysql queue_dir
configuration setting.
- MINIO_NOTIFY_MYSQL_QUEUE_LIMIT
-
Optional
Specify the maximum limit for undelivered messages. Defaults to
100000
.This environment variable corresponds with the
notify_mysql queue_limit
configuration setting.
- MINIO_NOTIFY_MYSQL_COMMENT
-
Optional
Specify a comment to associate with the MySQL configuration.
This environment variable corresponds with the
notify_mysql comment
configuration setting.
Kafka Service for Bucket Notifications
The following section documents environment variables for configuring an Kafka service as a target for Bucket Nofitications . See Publish Events to Kafka for a tutorial on using these environment variables.
You can specify multiple Kafka service endpoints by appending a unique
identifier
_ID
for each set of related Kafka environment variables: the top
level key. For example, the following commands set two distinct Kafka service
endpoints as
PRIMARY
and
SECONDARY
respectively:
set MINIO_NOTIFY_KAFKA_ENABLE_PRIMARY="on"
set MINIO_NOTIFY_KAFKA_BROKERS_PRIMARY="https://kafka1.example.net:9200, https://kafka2.example.net:9200"
set MINIO_NOTIFY_KAFKA_ENABLE_SECONDARY="on"
set MINIO_NOTIFY_KAFKA_BROKERS_SECONDARY="https://kafka1.example.net:9200, https://kafka2.example.net:9200"
- MINIO_NOTIFY_KAFKA_ENABLE
-
Required
Specify
on
to enable publishing bucket notifications to a Kafka service endpoint.Defaults to
off
.
- MINIO_NOTIFY_KAFKA_BROKERS
-
Required
Specify a comma-separated list of Kafka broker addresses. For example:
"kafka1.example.com:2021,kafka2.example.com:2021"
This environment variable corresponds to the
notify_kafka brokers
configuration setting.
- MINIO_NOTIFY_KAFKA_TOPIC
-
Optional
Specify the name of the Kafka topic to which MinIO publishes bucket events.
This environment variable corresponds to the
notify_kafka topic
configuration setting.
- MINIO_NOTIFY_KAFKA_SASL
-
Optional
Specify
on
to enable SASL authentication.This environment variable corresponds to the
notify_kafka sasl
configuration setting.
- MINIO_NOTIFY_KAFKA_SASL_USERNAME
-
Optional
Specify the username for performing SASL/PLAIN or SASL/SCRAM authentication to the Kafka broker(s).
This environment variable corresponds to the
notify_kafka sasl_username
configuration setting.
- MINIO_NOTIFY_KAFKA_SASL_PASSWORD
-
Optional
Specify the password for performing SASL/PLAIN or SASL/SCRAM authentication to the Kafka broker(s).
This environment variable corresponds to the
notify_kafka sasl_password
configuration setting.
- MINIO_NOTIFY_KAFKA_SASL_MECHANISM
-
Optional
Specify the SASL mechanism to use for authenticating to the Kafka broker(s). MinIO supports the following mechanisms:
-
PLAIN
(Default) -
SHA256
-
SHA512
This environment variable corresponds to the
notify_kafka sasl_mechanism
configuration setting. -
- MINIO_NOTIFY_KAFKA_TLS_CLIENT_AUTH
-
Optional
Specify the client authentication policy of the Kafka broker(s). See ClientAuthType for more information on possible values for this field.
This environment variable corresponds to the
notify_kafka tls_client_auth
configuration setting.
- MINIO_NOTIFY_KAFKA_TLS
-
Optional
Specify
on
to enable TLS connectivity to the Kafka broker(s)This environment variable corresponds to the
notify_kafka tls
configuration setting.
- MINIO_NOTIFY_KAFKA_TLS_SKIP_VERIFY
-
Optional
Enables or disables TLS verification of the NATS service endpoint TLS certificates.
-
Specify
on
to disable TLS verification (Default). -
Specify
off
to enable TLS verification.
This environment variable corresponds to the
notify_kafka tls_skip_verify
configuration setting. -
- MINIO_NOTIFY_KAFKA_CLIENT_TLS_CERT
-
Optional
Specify the path to the client certificate to use for performing mTLS authentication to the Kafka broker(s).
This environment variable corresponds to the
notify_kafka client_tls_cert
configuration setting.
- MINIO_NOTIFY_KAFKA_CLIENT_TLS_KEY
-
Optional
Specify the path to the client private key to use for performing mTLS authentication to the Kafka broker(s).
This environment variable corresponds to the
notify_kafka client_tls_key
configuration setting.
- MINIO_NOTIFY_KAFKA_VERSION
-
Optional
Specify the version of the Kafka cluster to assume when performing operations against that cluster. See the sarama reference documentation for more information on this field’s behavior.
This environment variable corresponds to the
notify_kafka version
configuration setting.
- MINIO_NOTIFY_KAFKA_QUEUE_DIR
-
Optional
Specify the directory path to enable MinIO’s persistent event store for undelivered messages, such as
/home/events
.MinIO stores undelivered events in the specified store while the Kafka server/broker is offline and replays the directory when connectivity resumes.
This environment variable corresponds to the
notify_kafka queue_dir
configuration setting.
- MINIO_NOTIFY_KAFKA_QUEUE_LIMIT
-
Optional
Specify the maximum limit for undelivered messages. Defaults to
100000
.This environment variable corresponds to the
notify_kafka queue_limit
configuration setting.
- MINIO_NOTIFY_KAFKA_COMMENT
-
Optional
Specify a comment to associate with the Kafka configuration.
This environment variable corresponds to the
notify_kafka comment
configuration setting.
Webhook Service for Bucket Notifications
The following section documents environment variables for configuring an Webhook service as a target for Bucket Nofitications . See Publish Events to Webhook for a tutorial on using these environment variables.
You can specify multiple Webhook service endpoints by appending a unique
identifier
_ID
for each set of related Webhook environment variables: the top
level key. For example, the following commands set two distinct Webhook service
endpoints as
PRIMARY
and
SECONDARY
respectively:
set MINIO_NOTIFY_WEBHOOK_ENABLE_PRIMARY="on"
set MINIO_NOTIFY_WEBHOOK_ENDPOINT_PRIMARY="https://webhook1.example.net"
set MINIO_NOTIFY_WEBHOOK_ENABLE_SECONDARY="on"
set MINIO_NOTIFY_WEBHOOK_ENDPOINT_SECONDARY="https://webhook1.example.net"
- MINIO_NOTIFY_WEBHOOK_ENABLE
-
Required
Specify
on
to enable publishing bucket notifications to a Webhook service endpoint.Defaults to
off
.
- MINIO_NOTIFY_WEBHOOK_ENDPOINT
-
Required
Specify the URL for the webhook service.
This environment variable corresponds with the
notify_webhook endpoint
configuration setting.
- MINIO_NOTIFY_WEBHOOK_AUTH_TOKEN
-
Required
Specify the opaque string or JWT authorization token to use for authenticating to the webhook service.
This environment variable corresponds with the
notify_webhook auth_token
configuration setting.
- MINIO_NOTIFY_WEBHOOK_QUEUE_DIR
-
Optional
Specify the directory path to enable MinIO’s persistent event store for undelivered messages, such as
/home/events
.MinIO stores undelivered events in the specified store while the webhook service is offline and replays the directory when connectivity resumes.
This environment variable corresponds with the
notify_webhook queue_dir
configuration setting.
- MINIO_NOTIFY_WEBHOOK_QUEUE_LIMIT
-
Optional
Specify the maximum limit for undelivered messages. Defaults to
100000
.This environment variable corresponds with the
notify_webhook queue_limit
configuration setting.
- MINIO_NOTIFY_WEBHOOK_CLIENT_CERT
-
Optional
Specify the path to the client certificate to use for performing mTLS authentication to the webhook service.
This environment variable corresponds with the
notify_webhook client_cert
configuration setting.
- MINIO_NOTIFY_WEBHOOK_CLIENT_KEY
-
Optional
Specify the path to the client private key to use for performing mTLS authentication to the webhook service.
This environment variable corresponds with the
notify_webhook client_key
configuration setting.
- MINIO_NOTIFY_WEBHOOK_COMMENT
-
Optional
Specify a comment to associate with the Webhook configuration.
This environment variable corresponds with the
notify_webhook comment
configuration setting.
Active Directory / LDAP Identity Management
The following section documents environment variables for enabling external identity management using an Active Directory or LDAP service. See Active Directory / LDAP Access Management for a tutorial on using these variables.
- MINIO_IDENTITY_LDAP_SERVER_ADDR
-
Required
Specify the hostname for the Active Directory / LDAP server. For example:
https://ldapserver.com:636
This environment variable corresponds with the
identity_ldap server_addr
configuration setting.
- MINIO_IDENTITY_LDAP_STS_EXPIRY
-
Optional
Specify the duration for which the credentials are valid as
<int><unit>
. Valid time units are as follows:-
s
- seconds. -
m
- minutes. -
h
- hours. -
d
- days
The default is
1h
or 1 hour.This environment variable corresponds with the
identity_ldap sts_expiry
configuration setting. -
- MINIO_IDENTITY_LDAP_LOOKUP_BIND_DN
-
Required
Specify the Distinguished Name (DN) for an AD/LDAP account MinIO uses when querying the AD/LDAP server. Enables Lookup-Bind authentication to the AD/LDAP server.
The DN account should be a read-only access keys with sufficient privileges to support querying performing user and group lookups.
This environment variable corresponds with the
identity_ldap lookup_bind_dn
configuration setting.
- MINIO_IDENTITY_LDAP_LOOKUP_BIND_PASSWORD
-
Optional
Specify the password for the Lookup-Bind user account.
This environment variable corresponds with the
identity_ldap lookup_bind_password
configuration setting.
- MINIO_IDENTITY_LDAP_USER_DN_SEARCH_BASE_DN
-
Optional
Specify the base Distinguished name (DN) MinIO uses when querying for user credentials matching those provided by an authenticating client. For example:
cn=miniousers,dc=myldapserver,dc=net
Supports Lookup-Bind mode.
This environment variable corresponds with the
identity_ldap user_dn_search_base_dn
configuration setting.
- MINIO_IDENTITY_LDAP_USER_DN_SEARCH_FILTER
-
Optional
Specify the AD/LDAP search filter MinIO uses when querying for user credentials matching those provided by an authenticating client.
Use the
%s
substitution character to insert the client-specified username into the search string. For example:(userPrincipalName=%s)
This environment variable corresponds with the
identity_ldap user_dn_search_filter
configuration setting.
- MINIO_IDENTITY_LDAP_USERNAME_FORMAT
-
Optional
Specify a comma-separated list of Distinguished Name templates used for querying the AD/LDAP server. MinIO attempts to login to the AD/LDAP server by applying the user credentials specified by the authenticating client to each DN template.
Use the
%s
substitution character to insert the client-specified username into the search string. For example:uid=%s,cn=miniousers,dc=myldapserver,dc=net,userPrincipalName=%s,cn=miniousers,dc=myldapserver,dc=net
MinIO uses the first DN template that results in successful login to perform a group lookup for that user.
This environment variable corresponds with the
identity_ldap username_format
configuration setting.
- MINIO_IDENTITY_LDAP_GROUP_SEARCH_FILTER
-
Optional
Specify an AD/LDAP search filter for performing group lookups for the authenticated user
Use the
%s
substitution character to insert the client-specified username into the search string. Use the%d
substitution character to insert the Distinguished Name of the client-specified username into the search string.For example:
(&(objectclass=groupOfNames)(memberUid=%s))
This environment variable corresponds with the
identity_ldap group_search_filter
configuration setting.
- MINIO_IDENTITY_LDAP_GROUP_SEARCH_BASE_DN
-
Optional
Specify a comma-separated list of group search base Distinguished Names MinIO uses when performing group lookups.
For example:
cn=miniogroups,dc=myldapserver,dc=net"
This environment variable corresponds with the
identity_ldap group_search_base_dn
configuration setting.
- MINIO_IDENTITY_LDAP_TLS_SKIP_VERIFY
-
Optional
Specify
on
to trust the AD/LDAP server TLS certificates without verification. This option may be required if the AD/LDAP server TLS certificates are signed by an untrusted Certificate Authority (e.g. self-signed).Defaults to
off
This environment variable corresponds with the
identity_ldap tls_skip_verify
configuration setting.
- MINIO_IDENTITY_LDAP_SERVER_INSECURE
-
Optional
Specify
on
to allow unsecured (non-TLS encrypted) connections to the AD/LDAP server.MinIO sends AD/LDAP user credentials in plain text to the AD/LDAP server, such that enabling TLS is required to prevent reading credentials over the wire. Using this option presents a security risk where any user with access to network traffic can observe the unencrypted plaintext credentials.
Defaults to
off
.This environment variable corresponds with the
identity_ldap server_insecure
configuration setting.
- MINIO_IDENTITY_LDAP_SERVER_STARTTLS
-
Optional
Specify
on
to enable StartTLS connections to AD/LDAP server.Defaults to
off
This environment variable corresponds with the
identity_ldap server_starttls
configuration setting.
- MINIO_IDENTITY_LDAP_COMMENT
-
Optional
Specify a comment to associate to the AD/LDAP configuration.
This environment variable corresponds with the
identity_ldap comment
configuration setting.
OpenID Identity Management
The following section documents environment variables for enabling external identity management using an OpenID Connect (OIDC)-compatible provider. See OpenID Connect Access Management for a tutorial on using these variables.
- MINIO_IDENTITY_OPENID_CONFIG_URL
-
Required
Specify the URL for the OIDC compatible provider discovery document .
The OIDC Discovery URL typically resembles the following:
https://openid-provider.example.net/.well-known/openid-configuration
This environment variable corresponds with the
identity_openid config_url
setting.
- MINIO_IDENTITY_OPENID_CLIENT_ID
-
Optional
Specify the unique public identifier MinIO uses when authenticating user credentials against the OIDC compatible provider.
This environment variable corresponds with the
identity_openid client_id
setting.
- MINIO_IDENTITY_OPENID_CLIENT_SECRET
-
Optional
Specify the client secret MinIO uses when authenticating user credentials against the OIDC compatible provider. This field may be optional depending on the provider.
This environment variable corresponds with the
identity_openid client_secret
setting.
- MINIO_IDENTITY_OPENID_CLAIM_NAME
-
Optional
Specify the name of the JWT Claim MinIO uses to identify the policies to attach to the authenticated user.
The claim can contain one or more comma-separated policy names to attach to the user. The claim must contain at least one policy for the user to have any permissions on the MinIO server.
Defaults to
policy
.This environment variable corresponds with the
identity_openid claim_name
setting.
- MINIO_IDENTITY_OPENID_CLAIM_PREFIX
-
Optional
Specify the JWT Claim namespace prefix to apply to the specified claim name.
This environment variable corresponds with the
identity_openid claim_prefix
setting.
- MINIO_IDENTITY_OPENID_SCOPES
-
Optional
Specify a comma-separated list of scopes . Defaults to those scopes advertised in the discovery document.
This environment variable corresponds with the
identity_openid scopes
setting.
- MINIO_IDENTITY_OPENID_REDIRECT_URI
-
Optional
Specify the redirect URI the MinIO Console uses when authenticating against the configured provider. Include the console port and
/oauth_callback
as part of the URL:http://minio.example.net:consoleport/oauth_callback
MinIO defaults to using the hostname of the node making the authentication request. MinIO deployments behind a load balancer or reverse proxy may need to specify this field to ensure the OIDC provider returns the authentication response to the correct URL.
The specified URI must match one of the approved redirect / callback URIs on the provider. See the OpenID Authentication Request for more information.
Note
The embedded MinIO Console by default uses a random port number selected at server startup. Start the MinIO server process with the
--console-address
option to specify a static port number.This environment variable corresponds with the
identity_openid scopes
setting.
- MINIO_IDENTITY_OPENID_COMMENT
-
Optional
Specify a comment to associate with the OIDC compatible provider configuration.
This environment variable corresponds with the
identity_openid comment
setting.