15. Performing Backup and Recovery : Backup by Checkpoints : Table-level Checkpoints
 
Share this page                  
Table-level Checkpoints
Generally, full database checkpoints are recommended over table-level checkpoints.
You should use table-level checkpoints only as a supplement to--not a substitute for--database-level checkpoints.
A table-level checkpoint is not allowed if no full database checkpoints are available.
Note:  Table-level checkpoints and recovery should be used cautiously. When using table-level checkpoints and restores, it is important--at the very least--to back up all dependent tables with a full checkpoint.
Recovery when using table-level checkpoints is restricted when the checkpointed table has been dropped or the table has been modified through any DDL statement. In these cases, the table-level checkpoint is rendered unusable. There is also danger in compromising the referential integrity of the database when rolling forward a table without journaling.
Performing table-level checkpoints on system catalogs is not permitted. We strongly encourage frequent database checkpointing of the iidbdb database.