Camera Policies Advanced Tab

Previous Next  Print this Topic

Use the Camera Policies Advanced tab to set log, report, and performance options. This tab only displays if you are in Advanced mode.

Camera Policies - Advanced tab

Camera Policies Advanced Tab Elements

Element

Description

Error Log Filename

An error log file is created anytime an error is encountered during a job. It is useful for troubleshooting problems. The Error Log Filename text box can include literal file names or a combination of file name field variables to generate file names for logs.

Leave the default variables in place, or type in a file name and extension to use, or type in a variable name using file name field variables (see File Name Field Variables section below).
Use the Browse button to define a new location and type in the file name that you want to use, including an extension.

Report Options

When a job runs, one of the following report files is created:

Summary - A header and summary report

Complete - Same as summary and lists all files

Diagnostic - Same as complete, but adds relevant diagnostic information

From the drop-down list select a report option. Use the Summary or Complete options on a normal basis and switch to Diagnostics if problems occur.
In the Report Options text box, leave the default variables in place, or type in the file name and extension to use, or type a variable name using file name field variables (see File Name Field Variables section below).
Use the Browse button to locate a file to overwrite an already existing log file.

Activity Log

Activity logs provide logistical information about jobs. Refer to the logs after a job runs; they are stored in a specified location.

Set Activity Log to Enabled. The Activity Log text box becomes active.
In the Activity Log text box, leave the default variables in place. Or, type in a file name to use, including an extension. Or, type in a variable name using Filename Field Variables (see section below).
Opt to use the Browse button to define a new location and type in the file name.

Enable Transmission Optimization

Select for the client to constantly monitor its processes and to determine the best network transmission protocol for files being processed. Leave this option selected to get up to a 20% increase in performance. If the Information Repository is slow, run a few timed tests to determine a setting that works best for your Information Repository.

Maintain Client/Vault Connection

Vault connection sharing determines how many files are sent from the source Vault to the destination Vault in a single connection. The higher the number of files or bytes transferred, the longer the connection between the source and destination Vault is maintained. Access to a particular Vault resource (such as one drive of a multi-drive storage device) used by a process on one client is restricted and inaccessible to other clients in the network for the duration of the connection.

To illustrate this, imagine an environment where a single Vault with a single tape drive is used to service several desktop clients. When a client is configured with a connection sharing set to 250 files and other clients are configured to start jobs at the same time, no client can connect until the first client is finished. Each connection to the server locks out other connections and other clients must wait before processing files.

1.Type an integer value into the Maintain Client/Vault Connection for text box.
2.Select the Files radio button or Bytes radio button. By selecting Files, a connection sharing proceeds based on the number of files transmitted or if Bytes, based on the number of bytes.

Throttle

The throttle controls the speed that files are sent to the Vault. Lower numbers reduce the bandwidth. Throttle values range from 10% to 100% of total available bandwidth.

From the Throttle drop-down list, select a percentage to operate the client on its host computer for maximum performance.

Phoenix RSM is designed to operate at maximum performance of its host computer, network environment, and storage resources available. During normal working hours, running a job at peak performance could interfere with other network operations.

File Name Field Variables

The file path can include a literal file name or a combination of variables to generate file names for reports. Use variables to distinguish between reports and to find specific reports.

If a path with a literal file name is typed like C:/Program Files/Logs/Job_Report.log, the system generates the report destination folder Logs (if it does not already exist) and a report named Job_Report.log. If a path with variables for the file name is typed, for example, %R/Logs/%P_from_%H_on_%D_at_%T, the system generates the report destination folder and a report — where policy name, host name, date, and time are populated with the actual details from your Information Repository and job.

The following are the variables to use. When using multiple variables, separate them from each other with an underscore (_).

Variable

Description

%P or %Pn

%H or %Hn

%D

%Dy

%Dm

%Dd

%T

%Th

%Tm

%Ts

%R or %Rn

Policy Name

Host Name

Date (yyyy:mm:dd)

Year

Month

Day

Time (hh:mm)

Hour

Minute

Second

Root Pathname. Valid only at the beginning of a string