Synchronization Arguments
The following arguments are appended to the end of the command line followed by a space and forward slash (i.e. /A). A space and forward slash are also used to separate each additional argument (i.e. /A /M).
|
/GC:x
Set File Comparison Value: If the /GC argument is used, PeerSync will add x seconds to the Target File date and time stamp to use during comparison.
|
/GD:n,z:n,z
Set Job Comparison Delta: If the /GD argument is used, PeerSync will add or subtract z seconds from the Target File date and time stamp during a comparison for Job number n.
Example: /GD:1,+30:2,-60:
|
|
/GF
Use Alternate Copy File Methods: The following copy file methods may be invoked:
/GFC
|
Use CopyFile API method
|
/GFS
|
Use File Stream method
|
/GFE
|
Use CopyFileEX method
|
/GFA
|
Transfer Alternate Data Streams - The same functionality can be used at a Job level by using the SETVAR INCLUDEALTFILESTREAMS switch in the Pre/Post paths.
|
|
/GI(S)(D)
Ignore File Size and/or Date Comparison: If the /GI or /GIS argument is used, PeerSync will ignore file size during folder scans (if date matches then skip file). If the /GID argument is used, PeerSync will ignore file date comparison during folder scan (if size matches then skip file).f the /GISD argument is used, PeerSync will ignore file date and size comparison during folder scan (always replace Target file even if they are identical).
|
/GT
Get Remote PC Time: If the /GT argument is used, PeerSync will attempt to get the time from the Target PC as well as the local PC and automatically compensate for time differences.
Note: /GT is only applicable in an NT/2K Environment
|
/GX
Use Delete Path for Revisions: If the /GX argument is used, PeerSync will use the deletions path for all PSBAK revision files.
|
/I
Ignore Target Space During File Copy: The /I argument sets PeerSync to ignore Target space available during file copy.
|
/J
Move Files: If the /J argument is used, PeerSync will move files - deleting them from the Source after they have been successfully transferred.
|
/KA:x
Active Connection Interval: If the /KA argument is used, PeerSync will attempt to connect every x minutes to Target machine(s).
|
/LH:x
Set Deletion Move To Folder Cleanup Interval: If the /LH argument is used, PeerSync will check the Move To Folder (the folder where deleted files are move to), every x minutes to see if files needed to be deleted on the cycle specified by the Delete unmatched Target Files older than x days option.
|
/LI [ R | T | A ]
Target In-Use Replacement: If the /LI argument is used, PeerSync will perform the following operation if Target File is unavailable:
R
|
Force rename of open Target File
|
T
|
Force terminate of open Target File application
|
A
|
Force terminate of all open Target applications
|
|
/LM:xOyCz
Set Failed Connection Timer: If the /LM argument is used, PeerSync will use the following variables to determine retry frequency:
x
|
Approximate time, in minutes, for retry of failed connection (time may vary as much as a few minutes).
|
y
|
Frequency to retry files
|
z
|
Maximum Retry Count
|
Example: /LM5O25C100
|
Checks failed connections every 5 minutes, retries files every 25 seconds, to a maximum retry count of 100.
|
Note: This item is selectable from the Profiler via the Options/Commands Screen.
|
/LMD
Disable Failed Connection Timer: If the /LMD argument is used, PeerSync will not check for failed connections:
Example: /LMD
|
Does not check for failed connections.
|
Note: This item is selectable from the Profiler via the Options/Commands Screen.
|
/LR:file
Run application at start of PeerSync: If the /LR argument is used, PeerSync will execute an application or shell script specified by file at the initialization of PeerSync.
Example: /LR:C:\WINNT\notepad.exe
|
|
/LW
Enable Last Access Compare: The /LW argument allows you to use the last access date/time instead of the modified date/time for comparisons to determine file updates.
|
/NODELFLDR
Do not delete folders: If the /NODELFLDR argument is used, PeerSync will not delete folders during synchronization.
|
/O
Set Target File Overwrite: The /O argument sets Target File overwrite on all Jobs.
|
/QB
Use Full Access File Copy: If the /QB argument is used, PeerSync will only copy files it can gain full access to during synchronization.
|
/QFn
Shadow Time Range: This argument will use an n second time range for file time stamps during comparison. If the Source and corresponding Target File time stamps fall in the range then the file time stamps will be seen as equal.
n = Time in seconds
Note: /QF:1 is equivalent to a value between 1 to 3 seconds depending on the file systems being used.
|
/QF[+][++][+++]
Precision Comparison: Use this argument to remove minutes, seconds, or milliseconds from files during comparison.
/QF+
|
Removes/ignores the milliseconds from both the source and target file time stamps during comparison
|
/QF++
|
Removes/ignores the milliseconds and seconds from both the source and target file time stamps during comparison
|
/QF+++
|
Removes/ignores the milliseconds, seconds, and minutes from both the source and target file time stamps during comparison
|
|
/QG
Always use the local machine time for the Last Run Time: If this argument is used, PeerSync will always uses the local machine time for the Last Run Time, instead of using the minimum time of the Source and Target machines involved in the synchronization.
|
/QH:n
Force Flush File Buffers: Forces the file data that has been written across the network to be fully committed to disk before continuing. The Interval n is the number of buffers worth of data to write before forcing a disk write of the data, if n is not used the default is 100 cycles.
Note: This is expected to naturally occur without this argument, but on some systems across slower networks it is necessary to force the commit of data to correctly gauge process of writing the file.
|
/QHD
Direct Disk Write: Forces the file data that has been written across the network to be fully committed to disk before continuing. This will occur for each buffer worth of data that is transferred.
Note: You may use this argument or the /GFC option to resolve Windows "Delayed Write Failed..." messages.
|
/QI:ext
Ignore Matching/Locked File Extensions: This argument will ignore an add/update of a file, if a matching file with the same base name and the specified extension ext exists.
Note: One instance of this example is if a file called MyFile.dwg is updated it will be excluded from synchronization while MyFile.dwl exists.
|
/QJ:str
Ignore Matching/Locked File Postfix Replacement: This argument will ignore an add/update of a file, if a matching file with the same base name with the specified postfix replacement str exists.
Note: One instance of this example is if a file called MyDocument.doc is updated, it will be excluded from synchronization while ~$Document.doc exists.
|
/T
Terminate All Instances of PeerSync: The /T argument terminates all running instances of PeerSync, including itself.
|
/VRBn
Verify User-Name: If the /V argument is used, PeerSync will verify logged on User-Name defined in the local user file list, specified by the following options:
R
|
Require user to be in the user file list
|
B
|
Bypass the request to add to list dialog
|
n
|
Maximum number of user allowed
|
|
/W:x
Set Queue Directory Change Count: If the /W argument is used, PeerSync will set queue directory change count, events to wait for action x.
|
/WPFIX
Disable application associated with active file synchronization: When a file is being synchronized, this option searches all active windows on the desktop for a caption that contains the path/filename of the active file. PeerSync then disables the active application in one of two ways. The command lines "/WPFIX or /WPFIX2" disables the entire application and" /WPFIX1" disables the save toolbar and file menu save item. (This option also verifies that the word "WordPerfect" is in the caption before disabling). Both options will append "(Synchronizing)" to the existing caption and when the file is synchronized, the caption will be restored.
|
/WPMOD
WordPerfect Fixes for synchronization: The /WPFIX and /WPMOD arguments are used to help in the synchronization of WordPerfect files.
DLL file to improve interaction with WordPerfect v8 and higher: Working with the Corel corporation, we developed a 3rd party utility that disabled the save function in WordPerfect when a document is "unmodified." This reduces the possible "File Access Denied" error that WordPerfect produces when PeerSync is synchronizing the active document. To run this option, you must rerun the PeerSync installation program again. The file "PSWPMod.DLL" file will be installed in the windows System32 folder.
For WordPerfect 8, add "/WPMOD8" on the PeerSync command line, which will modify the registry as follows:
Key: HKEY_LOCAL_MACHINE\SOFTWARE\COREL\WordPerfect\8\Third Party
String: DLL16
Value: C:\WinNT\System32\PSWPMod.DLL
For WordPerfect n, add "/WPMODn" on the PeerSync command line, which will modify the registry as follows:
Key: HKEY_LOCAL_MACHINE\SOFTWARE\COREL\WordPerfect\n\Third Party
String: DLL16
Value: C:\WinNT\System32\PSWPMod.DLL
Note: The DLL16 string may vary based on the installation of other 3rd party add-ons to your WordPerfect installation. The value could be DLL15, DLL14, etc.
|
/YC:x
Folder Queue Watch Interval: Change the default timer interval for checking the folder queue to x seconds (the default is .5 seconds).
|
/YD
Allow Replication During Dynamically Created Jobs: This argument will allow dynamically created Jobs (i.e. Job scans triggered by Folder Additions) to use the replicate option.
|
/YF:ext1;ext2;extn
Partial Locked File Extensions List: This argument is used for file types that are partial locked when open by other applications (i.e. Outlook PST files). If the /YF argument is used, and Volume Shadow Copy Service (VSS) is enabled PeerSync will always process files with the specified extensions as though they are open and locked files. If VSS is not enabled, then PeerSync will pre-scan the files to ensure complete access before file copy. PST files are included in this list by default and can be changed via this command line.
|
/YN
Use Network Password Dialog: If the /YN argument is used, PeerSync will display a network password dialog if you do not have right to access the Source or Target Folder.
|
/YR
Delete Empty Source Folders After Move: This argument will delete all empty Source Folders after a synchronization scan when using the Move Files - Delete Source File after successful copy to Target option.
|
/YV
Do Not Validate Connections Before Profile is Loaded: This argument will not try to validate Source and Target Folder connections during the load of a Profile. It will assume that the connections will be available upon start of each Job. This option is useful if you are running a Pre Process that will establish a connection and/or create a Source or Target Folder. This argument should be used when using the /LJP (Always Run Post Process) argument or when needing to dynamically create the source and or target paths.
|
/Z:ext1;ext2;extn
Ignore Open File Extensions: If the /Z argument is used, PeerSync will ignore files with the specified extensions that are currently opened where the full name of the file is displayed in the caption of another window. This argument may be ignored if Multiple Job or multiple copy threads are enabled.
|
/LJU:x
Exclude Folders that have a Reparse Point: By default PeerSync will exclude folders that have a Reparse Point object, which are common in Windows Vista. Use this argument to alter this behaviour:
/LJU:0
|
Don't exclude folders that have a Reparse Point object
|
/LJU:1
|
Exclude folders that have a Reparse Point object recursively pointing back to itself (Default)
|
/LJU:2
|
Exclude all folders that have a Reparse Point object
|
|
/LJP
Always Run Post Process: If the /LJP argument is used, PeerSync allows for the ability to process Post commands even if the Job fails. This argument is useful for non persistent Profiles that need to execute or start other processes regardless whether or not its Job was able to run. This argument should be used in conjunction with the /YV command which allows for the Profile to be loaded before the source and target folder(s) are validated.
|
/LX:R
Listener Alternate Route Path: Adding this option will create an Edit: Listener Alternate Route Path option when right-clicking on either the Source or Target folder selection paths. This creates and opens a file called %PROFILENAME%.psl in the Profiles directory used to configure alternate route(s) for the PSListener. Here is an example of what the content of the %PROFILENAME%.psl file should look like:
[LISTENER]
NetAppA=Win2008A
NetAppB=Win2008B
The first column contains the name or IP address of the remote non-Windows server.
The second column lists the name or IP address of the Windows server where the PSListener is running.
|