Topics | How To | Related Topics
Configurable Properties and Operations
A Replication Set is similar is concept to a Backup Set which is used by some Agents, and represents a logical grouping of Replication Pairs. This allows you to configure certain properties and activities at the Replication Set level, and thus control all the included Replication Pairs together.
Replication sets can created in the following ways:
The following are the properties which can be configured, as well as the operations which can initiated, for a Replication Set.
You can optionally specify a Common Base Folder, so that all destination paths for all Replication Pairs in the Replication Set will be created in the same folder on the destination host. This can be useful when you are adding multiple Replication Pairs at the same time, as in the case of replicating application data. For example, if you specify \replication\ as the base directory, your Replication Pairs might use the following as their destination directories:
\replication\rep_pair_1\
\replication\rep_pair_2\
\replication\rep_pair_3\
|
Specify compression of replicated data on the network. For more information, see Replication Compression.
Specify encryption of replicated data on the network. For more information, see Replication Encryption.
Monitor data replication activities for the Replication Set. For more information, see Monitoring Data Replication.
Select a common Destination Host for all Replication Pairs within the Replication Set.
Specify how Orphan Files will be handled, when discovered on the destination computer. For more information, see Orphan Files. By default, orphan file processing for the replication set is turned Off.
Specify files, folders, and patterns to be excluded from data replication activities. For more information, see Replication Filters.
For more information, see Replication Pair.
You can define an account for accessing the destination directory. See ContinuousDataReplicator in User Accounts and Passwords for more information.
Configure User Security for the Replication Set, after it has been created. For more information, see User Administration and Security.