Previous Topic: Control and Checkpoint File ConsiderationsNext Topic: How You Allocate Control and Checkpoint Files


Create Checkpoint Files

If you want to create a checkpoint file, create a separate file on each system. These files are not shared like DASD control files.

The checkpoint file is especially important when you are using the CTCONLY communication method. We recommend you allocate a primary and an alternate checkpoint file on each system in the complex. A recovery migration to the alternate checkpoint file occurs when the primary file become unusable due to hardware error or file space shortage problems. We recommend that you allocate the alternate checkpoint file to a size slightly larger than the primary checkpoint file.