Replication policy settings
You configure replication policies to run according to replication policy settings.
- Policy name
- The name of the policy.
- Description
- Describes the policy. For example, the description might explain the purpose or function of the policy.
- Enabled
- Determines whether the policy is enabled.
- Action
- Determines the how the policy replicates data. All policies copy files from the source directory to the target directory and update files in the target directory to match files on the source directory. The action determines how deleting a file on the source directory affects the target. The following values are valid:
- Copy
- If a file is deleted in the source directory, the file is not deleted in the target directory.
- Synchronize
- Deletes files in the target directory if they are no longer present on the source. This ensures that an exact replica of the source directory is maintained on the target cluster.
- Run job
- Determines whether jobs are run automatically according to a schedule or only when manually specified by a user.
- Last Successful Run
- Displays the last time that a replication job for the policy completed successfully.
- Last Started
- Displays the last time that the policy was run.
- Source Root Directory
- The full path of the source directory. Data is replicated from the source directory to the target directory.
- Included Directories
- Determines which directories are included in replication. If one or more directories are specified by this setting, any directories that are not specified are not replicated.
- Excluded Directories
- Determines which directories are excluded from replication. Any directories specified by this setting are not replicated.
- File Matching Criteria
- Determines which files are excluded from replication. Any files that do not meet the specified criteria are not replicated.
- Restrict Source Nodes
- Determines whether the policy can run on all nodes on the source cluster or run only on specific nodes.
- Target Host
- The IP address or fully qualified domain name of the target cluster.
- Target Directory
- The full path of the target directory. Data is replicated to the target directory from the source directory.
- Restrict Target Nodes
- Determines whether the policy can connect to all nodes on the target cluster or can connect only to specific nodes.
- Capture Snapshots
- Determines whether archival snapshots are generated on the target cluster.
- Snapshot Alias Name
- Specifies a snapshot alias for the latest archival snapshot taken on the target cluster.
- Snapshot Naming Pattern
- Specifies how archival snapshots are named on the target cluster.
- Snapshot Expiration
- Specifies how long archival snapshots are retained on the target cluster before they are automatically deleted by the system.
- Workers Threads Per Node
- Specifies the number of workers per node that are generated by OneFS to perform each replication job for the policy.
- Log Level
- Specifies the amount of information that is recorded for replication jobs.
More verbose options include all information from less verbose options. The following list describes the log levels from least to most verbose:
- Fatal
- Error
- Notice
- Info
- Copy
- Debug
- Trace
Replication logs are typically used for debugging purposes. If necessary, you can log in to a node through the command-line interface and view the contents of the /var/log/isi_migrate.log file on the node.
Notice is the recommended log level.
- Validate File Integrity
- Determines whether OneFS performs a checksum on each file data packet that is affected by a replication job. If a checksum value does not match, OneFS retransmits the affected file data packet.
- Keep Reports For
- Specifies how long replication reports are kept before they are automatically deleted by OneFS.
- Log Deletions on Synchronization
- Determines whether OneFS records when a synchronization job deletes files or directories on the target cluster.
The following replication policy fields are available only through the OneFS command-line interface.
- Source Subnet
- Specifies whether replication jobs connect to any nodes in the cluster or if jobs can connect only to nodes in a specified subnet.
- Source Pool
- Specifies whether replication jobs connect to any nodes in the cluster or if jobs can connect only to nodes in a specified pool.
- Password Set
- Specifies a password to access the target cluster.
- Report Max Count
- Specifies the maximum number of replication reports that are retained for this policy.
- Target Compare Initial Sync
- Determines whether full or differential replications are performed for this policy. Full or differential replications are performed the first time a policy is run and after a policy is reset.
- Source Snapshot Archive
- Determines whether snapshots generated for the replication policy on the source cluster are deleted when the next replication policy is run. Enabling archival source snapshots does not require you to activate the SnapshotIQ license on the cluster.
- Source Snapshot Pattern
- If snapshots generated for the replication policy on the source cluster are retained, renames snapshots according to the specified rename pattern.
- Source Snapshot Expiration
- If snapshots generated for the replication policy on the source cluster are retained, specifies an expiration period for the snapshots.
- Restrict Target Network
- Determines whether replication jobs connect only to nodes in a given SmartConnect zone. This setting applies only if the Target Host is specified as a SmartConnect zone.
- Target Detect Modifications
- Determines whether SyncIQ checks the target directory for modifications before replicating files. By default, SyncIQ always checks for modifications.
Disabling this option could result in data loss. It is recommended that you consult Isilon Technical Support before disabling this option.
- Resolve
- Determines whether you can manually resolve the policy if a replication job encounters an error.