15. Performing Backup and Recovery : Checkpoint Template File Description : Checkpoint Template Codes
 
Share this page                  
Checkpoint Template Codes
In the checkpoint template file, a four-character uppercase code at the beginning of each line provides the following information:
The first character indicates when the command is to be used. Valid characters are:
B (Begin)--the command is to be executed before the device is used. It indicates setup work done prior to the execution of the command.
P (Prework)--the command is to be executed before the work is executed.
I--the command begins table-level recovery (initializes only).
W (Work)--the command activates the device. It indicates the execution of the command.
F--the command ends table-level recovery (comments only).
E (End)--the command is executed after the device is used. It indicates cleanup work done after the operation is complete.
The second character indicates whether the command specifies several types of checkpointing and roll forward options. Valid characters are:
S--the command is for checkpointing only.
R--the command is for roll forward only.
E--the command is for both checkpointing and roll forward.
D--the command is for delete file processing.
C--the command checks if a database checkpoint exists before the roll forward.
J--journals are to be applied, for a roll forward.
U--dumps are to be applied, for a roll forward.
The third character specifies the device. Valid characters are:
T--the command on that line refers to reading from or writing to a tape.
D--the command refers to disk operations.
E--the command applies to both types of devices.
The fourth character specifies the data. Valid characters are:
D--the command is for a database.
A--the command is for all databases.
T--the command is for table(s).
E--the command is for either a database or table.
R--the command is for a raw location (database and table level are the same)