| Feature | Description | Support status |
|---|
| Storage classes | OSS provides Standard, Infrequent Access (IA), Archive, Cold Archive, and Deep Cold Archive storage classes. | Activate OSS-HDFS only on Standard and IA buckets. |
| View resource usage | The OSS console displays bucket resource usage for reference. | You can view only basic statistics, ranking statistics, region and operator statistics, and API statistics. |
| List buckets | List all buckets, buckets with a specific prefix, or a specific number of buckets under your Alibaba Cloud account. | Supported. |
| Delete buckets | Delete a bucket you no longer need. | Supported. |
| Query bucket region | Call GetBucketLocation to get the physical region of a bucket. | Supported. |
| Resource groups | Group buckets by business requirements and configure per-group access permissions. | Supported. |
| Pay-by-requester | Charge requesters for request and traffic fees; the bucket owner pays only storage fees. | Supported. |
| Bucket tagging | Tag buckets to classify and manage them, and apply access control list (ACL) rules by tag. | Supported. |
| Bucket ACLs | Set or change the ACL of a bucket. | Supported. |
| Bucket policies | Grant other users access to specific OSS resources via bucket policy. | Supported. |
| Server-side encryption | Encrypt objects at upload and decrypt at download transparently. | Supported. |
| Redundancy types | OSS supports locally redundant storage (LRS) and zone-redundant storage (ZRS). | LRS supported. ZRS not supported. |
| Monitoring service | Monitor OSS system status and performance, and set custom alerts. | Supported. |
| OSS accelerator | Cache frequently accessed objects for high-throughput scenarios. | Not applicable. |
| Versioning | Protect objects from accidental overwrites or deletions by preserving previous versions. | Not applicable. |
| Hotlink protection | Prevent unauthorized access to bucket resources via Referer-based rules. | Not applicable. |
| CORS | Cross-origin resource sharing (CORS) controls cross-origin access for web applications. | Not applicable. |
| Retention policies | Write Once Read Many (WORM) compliance: prevent objects from being deleted or overwritten for a set period. | Not applicable. |
| Client-side encryption | Encrypt objects on the client before uploading to OSS. | Not applicable. |
| OSS DDoS protection | Proxy-based DDoS attack mitigation integrated with Anti-DDoS Proxy. | Not applicable. |
| Cross-region replication (CRR) | Automatically replicate objects across buckets in different regions. | Not applicable. |
| Same-region replication (SRR) | Automatically replicate objects across buckets in the same region. | Not applicable. |
| Replication Time Control (RTC) | Replicate most objects within seconds and 99.99% of objects within 10 minutes, with real-time monitoring. | Not applicable. |
| Scheduled backup | Periodically back up bucket objects to Cloud Backup for recovery. | Not applicable. |
| Lifecycle rules (last modified time) | Transition objects to lower-cost storage classes or delete them based on last modified time. | Not applicable. Use automatic storage tiering for OSS-HDFS instead. |
| Lifecycle rules (last access time) | Transition cold data automatically based on access patterns. | Not applicable. |
| Bucket inventory | Export object metadata (count, size, storage class, encryption status) for large-scale analysis. | Not applicable. For buckets with OSS-HDFS activated, export object metadata using Export object metadata instead. |
| Static website hosting | Host static websites on an OSS bucket with a bucket domain name. | Not applicable. |
| Mirroring-based back-to-origin | Retrieve missing objects from an origin and cache them in the bucket on demand. | Not applicable. |
| Transfer acceleration | Route requests over the optimal global network path for faster transfers. | Not applicable. |
| Custom domain names | Map custom domain names to buckets via CNAME records. | Not applicable. |
| IMG | Process image objects via GetObject parameters (watermarks, format conversion, etc.). | Not applicable. |
| Video snapshots | Capture video snapshots using configured parameters. | Not applicable. |
| ZIP package decompression | Automatically decompress ZIP packages uploaded to configured paths. | Not applicable. |
| Event notifications | Get notified when specified events occur on monitored objects. | Not applicable. |
| Logging | Generate hourly access logs and store them in a target bucket for analysis. | Not applicable. |
| Real-time log query | Query bucket access logs in real time for auditing and troubleshooting. | Not applicable. |