Replicating file systems - Amazon Elastic File System

Replicating file systems

You can create a replica of your EFS file system in the AWS Region of your preference. When you enable replication on an EFS file system, Amazon Elastic File System (Amazon EFS) automatically and transparently replicates the data and metadata on the source file system to a destination file system. In the event of a disaster or when performing gameday exercises, you can fail over to your replica file system and then fail back to the primary file system to resume operations. To manage the process of creating the destination file system and keeping it synced with the source file system, Amazon EFS uses a replication configuration. For more information about creating a replication configuration for a file system, see Replication configuration.

After a replication configuration is created for a file system, Amazon EFS automatically keeps the source and destination file systems synchronized. Changes made to the source file system are not transferred to the destination file system in a point-in-time consistent manner, but are instead transferred based on the Last synced time for the replication. The Last sync time indicates when the last successful sync between the source and destination was completed. Changes made to your source file system as of the last synced time are replicated to the destination file system, while changes made to the source file system after the last synced time may not be replicated. For more information, see Monitoring replication status.

Replication is available in all AWS Regions in which EFS is available. To use replication in a Region that is disabled by default, you must first opt in to the Region. For more information, see Managing AWS Regions in the AWS General Reference Reference Guide. If you later opt out of a Region, Amazon EFS pauses all replication activities for the Region. To resume replication activities for the Region, you need to again opt in to the AWS Region.

Note

Replication does not support using tags for attribute-based access control (ABAC).