You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: python/README.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
1
# Python scripts for snapshot and cloning a protection group on a Pure Flash Array
2
2
3
-
The script fa_pg_snap.py provides for taking a snapshot of a protection group on a Pure Flash Array.
4
-
It will also optionally copy that snapshot to a target protection group. In this case the target protection group must have an equal or greater number of volumes of equal or larger size than the source.
5
-
The script can also copy an existing snapshot of a source protection group to a target protection group.
3
+
The script fa_pg_snap.py provides for taking a snapshot of a protection group on a Pure Flash Array.\
4
+
It will also optionally copy that snapshot to a target protection group. In this case the target protection group must have an equal or greater number of volumes of equal or larger size than the source.\
5
+
The script can also copy an existing snapshot of a source protection group to a target protection group.\
6
6
If replication is set up for the source protection group, the snapshot can be replicated to a second Flash Array.
7
7
8
8
# Arguments:
@@ -14,13 +14,13 @@ If replication is set up for the source protection group, the snapshot can be re
14
14
-r replicate the snapshot to the targets specified in the source protection group (optional)\
15
15
-o output file with the names of the snapshot volumes (optional)\
16
16
-i ignore tag (optional - see below)\
17
-
-x execute lock - if this is NOT set, no destructive actions will be taken. Instead, the script will simply tell you would it would do. This may prove useful to make sure you have all the settings right before you overwrite a target protection group.\
17
+
-x execute lock - if this is NOT set, no destructive actions will be taken. Instead, the script will simply tell you would it would do. This may prove useful to make sure you have all the settings right before you overwrite a target protection group.
18
18
19
19
# Notes:
20
20
21
21
If replication is not specified, both the source and target protection groups are assumed to be on the source Flash Array, and the target Flash Array is ignored.\
22
22
If the JSON file does not specify authentication credentials, the code will try to read the OS variables FA_HOST and API_TOKEN for authentication to the source Flash Array.\
23
-
If the JSON file does not specify authentication credentials, the code will try to read the OS variables FA_HOST_TGT and API_TOKEN_TGT for authentication to the target Flash Array.\
23
+
If the JSON file does not specify authentication credentials, the code will try to read the OS variables FA_HOST_TGT and API_TOKEN_TGT for authentication to the target Flash Array.
24
24
25
25
# Excluding Volumes in the Protection Group
26
26
@@ -31,7 +31,7 @@ In this example, the JSON file allows the user to specify source volumes in the
31
31
32
32
If a target protection group is specified, the code will overwrite the volumes of the target protection group with the contents of the source snapshot.\
33
33
To achieve this, the code will look for matching volumes of the same size. If none can be found, then the code will consider volumes of larger size. Volumes are considered in alphabetical order, so if the same naming convention is used for both source and target, the volumes will be considered in order. Once a suitable target has been identified, the code tags the volume of the target protection group with the volume id of the source volume. This means that every subsequent execution of the code wil see the same target volume ovewritten from the same source snapshot volume.
34
-
The -i flag may be used to ignore these tags and re-establish a new source-snapshot/target volume pairing, such as the user decides to snapshot from a different source protection group.\
34
+
The -i flag may be used to ignore these tags and re-establish a new source-snapshot/target volume pairing, such as the user decides to snapshot from a different source protection group.
0 commit comments