Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.coreweave.com/llms.txt

Use this file to discover all available pages before exploring further.

What are buckets?

Buckets are the primary organizational containers for your data in AI Object Storage. Think of them as top-level folders that contain your objects (files). Each bucket has a globally unique name and its own access policies.
Bucket names must be globally unique, and adhere to the following rules:
  • Length: 3 to 63 characters.
  • Characters: Only lowercase letters (a-z), numbers (0-9), and hyphens (-). No dots, uppercase letters, underscores, spaces, or other special characters.
  • Start and end: Must begin and end with a letter or number. Cannot start or end with a hyphen (-).
  • Prohibited patterns: Cannot start with xn--.- Reserved: Must not begin with cw-, vip-, or log-stitcher-ch-. Must not be the exact name int. These are reserved for internal use.

Prerequisites

After you’ve set up authentication and access control (access tokens, access keys, and organization policies), you can create and use buckets in Object Storage. Before you create your first bucket, set up your endpoint configuration once to ensure you’re using the required virtual-hosted addressing style, and the correct endpoints for AI Object Storage. This helps reduce errors.

Typical workflow

  1. Configure authentication and access control, making sure to set an organization access policy.
  2. Attach your endpoints (one-time setup)
  3. Set bucket policies if needed for fine-grained access
  4. Create buckets for different projects/purposes
  5. Upload objects using your preferred tools
To manage buckets and objects, you can use the Object Storage S3-compatible API, as well as command-line tools and libraries like the AWS CLI, s3cmd, and Boto3. You can also use Cyberduck or Cloud Console.

Bucket security

Access to buckets is controlled by two levels of policies:
  • Organization policies: Required baseline access (set up during authentication)
  • Bucket policies: Optional fine-grained control per bucket
See Bucket Access Policies for details.
Last modified on April 30, 2026