A protection policy is a reusable configuration that is used by the following data protection features:
-
Async replication, where data is captured by snapshots on a schedule of points in time and replicated to other clusters
-
Local backup, where data is captured by snapshots on a schedule of points in time and stored locally.
-
Backup to S3, where data is captured by snapshots on a schedule of points in time and replicated via S3 to an AWS bucket.
A protection policy defines:
-
A schedule of points in time at which to take snapshots
-
Retention time for snapshots on the local cluster
-
A remote peer, which may be a replication peer (async replication) or an S3 replication peer (backup to S3). This is not specified if the policy is intended for local backup only.
For full configuration instructions for async replication, local backup and backup to S3, see the relevant feature section, linked above.
-
From the left navigation menu, select Data Protection and then Protection Policies.
-
Click + Create Protection Policy.
-
In the Add Protection Policy dialog, complete the fields:
-
If you want to make the protection policy indestructible, enable the Indestructible setting. This setting protects the policy and its snapshots from accidental or malicious deletion. For more information about indestructibility, see Keeping Indestructible Backups.
Caution
After saving the protection policy, you won't be able to delete the policy or disable its indestructibility without performing a procedure for authorized unlocking of the cluster's indestructibility mechanism.
Note
If a replication peer is configured, the indestructibility setting will be replicated to the peer.
-
Set up one or more replication schedules:
Note
If you want to set up multiple schedules, click the Add Schedule button to display more scheduling fields in the dialog.
-
To set the start time, click in the Start at field. In the calendar that appears, click the start date you want and adjust the start time:
Note
When a protected path is active, it performs an initial data sync to the replication peer or S3 replication peer (if applicable) immediately after being created. The initial sync creates the first restore point. Therefore, the restore point created on the start date is in fact the second restore point.
-
To set a period, select a time unit from the Period dropdown and enter the number of time units in the Every field.
Note
The minimum interval is 15 seconds.
-
-
Configure local snapshot retention:
-
If you want to retain local snapshots, set the Keep local copy for period. This is the amount of time for which local snapshots are retained on the local cluster.
Select a time unit from the Period dropdown and enter the number of time units in the Keep local copy for field.
-
If you do not want to keep local snapshots, leave the Keep local copy for field blank. Snapshots will be deleted immediately after they are replicated to the destination peer.
-
-
If a replication peer is selected, set the Keep remote copy for period. This is the amount of time restore points are retained on the replication peer.
Select a time unit from the Period dropdown and enter the number of time units in the Keep remote copy for field.
Note
This setting applies only to replication peers and not to replication S3 peers. Restore points are not deleted from replication S3 peers.
-
Click Create.
The protection policy is created and listed in the Protection Policies page.
To modify the configuration of a protection policy, click to open the Actions menu for the policy and select Edit. Make your changes and then click Update.
Note
Modifying a protection policy that has the indestructible setting enabled requires that the indestructibility mechanism is unlocked on the cluster.
Note
Changing snapshot expiration in the policy only affects future snapshots and not existing ones.
To remove a protection policy, click to open the Actions menu for the policy and select Remove. Click Yes to confirm the removal.
Note
Removal of an indestructible protection policy requires first unlocking the cluster's indestructibility mechanism.
To manage protection policies via the VAST CLI, use the following commands.
Comments
0 comments
Article is closed for comments.