When archiving Domino and File System Archiving (FSA), Remove Safety Copies 'Immediately after archiving' and using Centera Collections removes the original items (post process) before the item is stored to the Centera device.
|Article:TECH178366|||||Created: 2012-01-05|||||Updated: 2014-12-08|||||Article URL http://www.symantec.com/docs/TECH178366|
|NOTE: If you are experiencing this particular known issue, we recommend that you Subscribe to receive email notification each time this article is updated. Subscribers will be the first to learn about any releases, status changes, workarounds or decisions made.|
The behavior for Domino and File System Archiving (FSA), regarding how storage handles the removal of items when removing safety copies 'immediately after archive' while using Centera Collections differs from Exchange archiving. With Exchange archiving, when utilizing 'Immediately after archive', items are post processed after the item has been moved from the temporary collections location to the Centera Device. With Domino and FSA Archiving, if 'Immediately after archive' is set, the item is post processed after the item is placed on the temporary collections location, prior to the item being sent to the Centera device.
For Domino and File System Archiving (FSA), this behavior introduces additional risk when selecting to use 'Immediately after archive', due to the temporary collections location being outside of the compliance device and the original item being removed from the original content source, prior to the archived copy reaching its final resting place (a collection on the Centera device). Until this expected behavior changes, it is recommended to utilize 'After backup' for the Safety Copy action, which will ensure that the original item is not removed from its original content source until the archived item has been collected to the Centera, and Centera replication has completed.
Using 'immediately after archive' with and Centera storage, certain tasks (DJA, FSA) post process items before savesets are collected.
Article URL http://www.symantec.com/docs/TECH178366