Dell PowerStore 1200T EMC PowerStore Protecting Your Data - Page 15

Protection Policies, Snapshot rules, Create a snapshot rule, Replication rules

Page 15 highlights

3 Protection Policies This chapter contains the following information: Topics: • Snapshot rules • Replication rules • Create a protection policy • Modify a protection policy • Assign a protection policy • Unassign a protection policy Snapshot rules You can create snapshot rules to control parameters such as the frequency of snapshot creation, and snapshots retention period. Snapshot rules, combined with replication rules, enable you to configure and apply consistent data protection policies to storage resources based on the data protection requirements. If you want to create a new snapshot rule in addition to the existing rules, it is recommended to review the business requirements with an administrator before proceeding. This can help in achieving and maintaining consistent policies across the system. Create a snapshot rule Steps 1. Select Protection > Protection Policies 2. In the Protection Policies window, click Snapshot Rules on the Protection bar . 3. In the Snapshot Rules window, click Create. 4. In the Create Snapshot Rule slide-out panel, enter a name for the new rule. 5. Set the following: ● Select the days on which a snapshot will be created. ● Set the frequency/start time: ○ For a snapshot to be taken at a fixed interval, select this option and set the number of hours after which a snapshot will be created. ○ For a snapshot to be taken at a particular time of the selected days, select the Time of day option and set the time and time zone. ● Set the retention period. ● For file snapshots , select the file snapshot access type. 6. Click Create. Replication rules A replication rule is a set of parameters the system uses to synchronize data in a replication session. The parameters include selecting a replication destination and setting a recovery point objective (RPO). After you have configured a replication rule, you can choose to use it in a new or existing protection policy, which then automatically changes or applies the replication session parameters for any storage resource that uses the protection policy. Protection Policies 15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33

Protection Policies
This chapter contains the following information:
Topics:
Snapshot rules
Replication rules
Create a protection policy
Modify a protection policy
Assign a protection policy
Unassign a protection policy
Snapshot rules
You can create snapshot rules to control parameters such as the frequency of snapshot creation, and snapshots retention
period. Snapshot rules, combined with replication rules, enable you to configure and apply consistent data protection policies to
storage resources based on the data protection requirements.
If you want to create a new snapshot rule in addition to the existing rules, it is recommended to review the business
requirements with an administrator before proceeding. This can help in achieving and maintaining consistent policies across
the system.
Create a snapshot rule
Steps
1.
Select
Protection
>
Protection Policies
2.
In the
Protection Policies
window, click
Snapshot Rules
on the
Protection
bar .
3.
In the
Snapshot Rules
window, click
Create
.
4.
In the
Create Snapshot Rule
slide-out panel, enter a name for the new rule.
5.
Set the following:
Select the days on which a snapshot will be created.
Set the frequency/start time:
For a snapshot to be taken at a fixed interval, select this option and set the number of hours after which a snapshot
will be created.
For a snapshot to be taken at a particular time of the selected days, select the
Time of day
option and set the time
and time zone.
Set the retention period.
For file snapshots , select the file snapshot access type.
6.
Click
Create
.
Replication rules
A replication rule is a set of parameters the system uses to synchronize data in a replication session. The parameters include
selecting a replication destination and setting a recovery point objective (RPO).
After you have configured a replication rule, you can choose to use it in a new or existing protection policy, which then
automatically changes or applies the replication session parameters for any storage resource that uses the protection policy.
3
Protection Policies
15