Multipart Upload API Overview
When it comes to handling large files, Rabata’s secure cloud storage offers a streamlined way to upload your data in chunks. This is where multipart upload APIs come into play. They let you split your files into manageable pieces, upload each one separately, and then stitch them back together seamlessly.
Thanks to these APIs, you can pause, resume, or even abort uploads without starting from scratch. It’s perfect for those moments when your Wi-Fi decides to take a coffee break or when you’re juggling multiple tasks and need some flexibility.
Here’s a quick rundown of the multipart upload APIs that Rabata supports - think of them as your command center for mastering big file uploads:
- AbortMultipartUpload - Cancel an ongoing upload if something goes sideways or you’ve changed your mind.
- CompleteMultipartUpload - Put all your uploaded pieces together to create the final file.
- InitiateMultipartUpload - Kick off the process for chunked file uploads.
- ListParts - See what chunks you’ve already uploaded and what’s still pending.
- ListUploads - Get an overview of all multipart uploads currently in progress.
- UploadPart - Upload each piece of your large file one by one.
How to Retrieve Public Access Block Settings
Ever wondered if your IBM COS bucket’s public access is truly locked down? Rabata’s secure cloud storage lets you quickly fetch the PublicAccessBlock configuration to check exactly that. It’s like peeking under the hood of your digital vault to ensure no unwanted guests sneak in.
This operation pulls the current rules that block public access, giving you peace of mind knowing your data is wrapped up tight and staying private. No more guesswork, no more accidental exposure.
Authorization Requirements
Before you can peek behind the curtain, Rabata requires valid credentials with the appropriate permissions. Think of it as showing your VIP pass before entering the exclusive club of your cloud storage.
Auditing and Compliance
Every access request is logged meticulously. Rabata keeps detailed audit trails so you can track who checked the PublicAccessBlock settings and when. Perfect for keeping the watchdogs happy and your security audits painless.
Request Details
To retrieve the PublicAccessBlock configuration, send a straightforward request to Rabata’s API. Simple, fast, and no fuss - just like tapping a trusted friend on the shoulder for info.
Response Format
Rabata returns a clear and concise configuration snapshot. You get to see which public access blocks are enabled or disabled, spelled out so there’s zero confusion. No cryptic code, just plain facts about your bucket’s security state.

Request a Demo
Take a half-hour ride with a Cloudian expert and see Rabata’s secure cloud storage in action. This demo is not just a walkthrough - it's your chance to ask questions, explore key features, and understand how Rabata can make your data storage both safer and smarter.
Whether you’re curious about encryption, scalability, or just want to know how Rabata handles your data behind the scenes, our expert will guide you every step of the way. You’ll come away with clear insights and no jargon, just straightforward answers.
Cloud Storage Access Credentials
To unlock the full potential of Rabata's secure cloud storage, you need the right credentials at hand. These credentials act like your VIP pass, ensuring safe and smooth communication with the storage services, whether you're plugging into a generic S3-compatible provider or Amazon's AWS itself.
Every cloud connection starts with a set of keys and identifiers - a combination of access key ID, secret access key, region, endpoint, bucket name, and optionally, a session token. Think of these as the secret handshake that lets Rabata understand exactly where and how to store your precious data securely.
| Key | Environment Variable (S3 Compatible) |
| accessKeyId | S3_ACCESS_KEY_ID |
| secretAccessKey | S3_SECRET_ACCESS_KEY |
| region | S3_REGION |
| endpoint | S3_ENDPOINT |
| bucket | S3_BUCKET |
| sessionToken | S3_SESSION_TOKEN |
For those who prefer the tried-and-true AWS cloud, Rabata uses a similar credential setup. The environment variables differ just in their prefixes but the principle remains the same: clear identification, airtight security, and pinpoint targeting of storage buckets.
| Key | Environment Variable (AWS) |
| accessKeyId | AWS_ACCESS_KEY_ID |
| secretAccessKey | AWS_SECRET_ACCESS_KEY |
| region | AWS_REGION |
| endpoint | AWS_ENDPOINT |
| bucket | AWS_BUCKET |
| sessionToken | AWS_SESSION_TOKEN |
Rabata's seamless compatibility with both generic S3 storage and AWS means you get to pick your cloud chessboard without worrying about changing your moves. Just feed in the right credentials, and Rabata handles the rest like a pro concierge.
S3Client Objects: The Key to Your Storage Kingdom
Behind the scenes, Rabata uses S3Client objects to manage your data interaction with cloud storage. These objects are like your personal cloud butlers, taking commands to write, check existence, and delete files in your secured buckets. They handle the nitty-gritty, so you can focus on what really matters - your data.
Writing with S3Client.prototype.write
When it's time to save files, the S3Client.prototype.write method steps up. This trusty function ensures files are uploaded safely and efficiently to the correct bucket. Rabata makes sure your data arrives intact, verified, and ready for instant retrieval whenever you need it.
Deleting with S3Client.prototype.delete
Got files that have overstayed their welcome? The S3Client.prototype.delete method cleans house. It's like a digital janitor, sweeping away outdated or unwanted data to keep your storage tidy and cost-effective. In Rabata’s world, deleting is secure, quick, and hassle-free.
Checking file presence with S3Client.prototype.exists
Before you try to grab a file, it’s smart to check if it’s even there. That’s what S3Client.prototype.exists does best. It gives you a quick yes or no, so Rabata can avoid awkward moments or errors. This little helper keeps your storage interactions smooth and error-proof.
Tagging APIs for Efficient Cloud Storage Management
Managing tags on your cloud storage buckets is vital for organizing data, controlling access, and streamlining operations. Rabata’s secure cloud storage offers a set of straightforward tagging APIs designed to make this process hassle-free and effective.
With Rabata’s tagging APIs, you can effortlessly add, retrieve, or remove tags from your storage buckets. This helps keep your data well-labeled and easy to find, even when you have mountains of information stored away safely.
- DeleteBucketTagging - remove existing tags from a bucket to declutter or update metadata
- GetBucketTagging - fetch the current tags associated with a bucket for quick insight
- PutBucketTagging - apply new tags or update existing ones to keep your storage organized
IBM Cloud Object Storage API: Your Gateway to Secure, Seamless Data Storage
The IBM Cloud Object Storage API lets you read and write objects with ease thanks to its REST-based architecture. It handles authentication securely through IBM Cloud Identity and Access Management, making sure only the right people get access. To smooth your path, it supports a subset of the familiar S3 API, so migrating existing applications is a breeze rather than a headache.
Imagine a storage service that’s truly global. That's Object Storage for you. Wherever you create your bucket-be it the US South or elsewhere-your data stays close to that region. That means all future requests need to be sent to the same endpoint. This keeps your data fast, secure, and well-organized. Need more details? Check IBM Cloud docs for endpoint selection and best practices.
For Java developers, there's a friendly SDK that’s a fork of the popular AWS SDK for Java. It gives you all the power to interact with Object Storage without reinventing the wheel. The same goes for JavaScript coders, who get a similarly familiar SDK based on the AWS SDK for JavaScript. Both promise compatibility and a smooth learning curve.
Python enthusiasts will feel right at home because the SDK for Python is a friendly fork of the trusted boto3 library. That means you get Pythonic ways to manage your storage without fuss. Similarly, Go developers won’t be left behind-the SDK is built off the official AWS SDK for Go and supports versions 1.10 through 1.12, covering a solid chunk of the Go ecosystem.
The SDKs support Node.js starting from version 4.x and later, so your server-side JavaScript apps can seamlessly hook into IBM Cloud Object Storage without compatibility troubles. And while we’re talking examples, most of the sample code you’ll see here uses the Java client library, perfect for those who want to jump right in.
- Maven
- GitHub
- https://github.com/IBM/ibm-cos-sdk-java
Node.js lovers, don’t worry, your turn comes next. The Node.js SDK is straightforward to install and use, backed by solid community support. Dive into the GitHub repository and get started in no time.
- Installation
- GitHub
- https://github.com/IBM/ibm-cos-sdk-js
Python programmers will find clear installation instructions and a vibrant GitHub repo ready to boost productivity. The SDK embraces the Python way, making interaction with the cloud feel natural.
- Installation
- GitHub
- https://github.com/IBM/ibm-cos-sdk-python
If Go is your language of choice, rejoice. The Go SDK is accessible, with the source code openly available. You can browse, contribute, or just clone it and get going.
- GitHub
- https://github.com/IBM/ibm-cos-sdk-go


Comments
As a freelance photographer, I deal with huge raw files. I used to use public cloud drives but got paranoid. Rabata's zero-knowledge encryption is the key selling point for me. I can store my portfolio and client work without a second thought. The speed for uploading large batches is impressive, too. Worth every penny for the professional tier.
Solid. Moved my app backups here. The peace of mind is worth the $8.17 a month. No surprises on the bill.
Great for team collaboration on our app assets. We can control exactly who sees what. The version history has saved us a couple of times already from accidental overwrites.