Was this helpful?
Checkpoint Template Codes
In the checkpoint template file, a four-character uppercase code at the beginning of each line provides the following information:
The first character indicates when the command is to be used. Valid characters are:
B (Begin)—the command is to be executed before the device is used. It indicates setup work done prior to the execution of the command.
P (Prework)—the command is to be executed before the work is executed.
I—the command begins table-level recovery (initializes only).
W (Work)—the command activates the device. It indicates the execution of the command.
F—the command ends table-level recovery (comments only).
E (End)—the command is executed after the device is used. It indicates cleanup work done after the operation is complete.
The second character indicates the type of operation (for checkpointing, roll forward, or both) and other options. Valid characters are:
S—the command is for online checkpointing only, or for offline checkpointing if there is no suitable F command.
F—the command is for offline checkpointing only. F is only implemented for Prework and Work first characters. Offline checkpointing executes commands coded with PFxx and WFxx. If not found, then it executes commands coded with PSxx and WSxx. Online checkpoint only executes commands with PSxx and WSxx codes when doing Prework and Work. F falls back to S for backwards compatibility with older customized cktmpl.def files.
R—the command is for roll forward only.
E—the command is for both checkpointing and roll forward.
D—the command is for delete file processing.
C—the command checks if a database checkpoint exists before the roll forward.
J—journals are to be applied, for a roll forward.
U—dumps are to be applied, for a roll forward.
M—the command is for relocatedb operation only.
The third character specifies the device. Valid characters are:
T—the command on that line refers to reading from or writing to a tape.
D—the command refers to disk operations.
E—the command applies to both types of devices.
The fourth character specifies the data. Valid characters are:
D—the command is for a database.
A—the command is for all databases.
T—the command is for table(s).
E—the command is for either a database or table.
R—the command is for a raw location (database and table level are the same)
Examples: Checkpoint Template Code
Here are examples of a checkpoint template code:
WSTD identifies the command to use during the working (W) phase of a checkpoint which is saving (S) a database to tape (T), for a database (D).
BRDT identifies the command to use during the begin (B) phase of a roll forward operation that is restoring (R) from disk (D) for a table (T).
The following line in the template file:
BSTD: echo beginning checkpoint to tape %C of %N locations
means issue the message “beginning checkpoint to tape device_name of n locations” during the beginning phase of the checkpoint to tape operation for a database.
Last modified date: 01/30/2023