3
7/23/2019 Checkpoint Concepts and Issues _ Tibco Consulting http://slidepdf.com/reader/full/checkpoint-concepts-and-issues-tibco-consulting 1/3 Tibco Consulting Checkpoint Concepts and Issues POSTED ON MAY 21, 2013 BY SRIK POSTED IN TIBCO BUSINESS WORKS  i 5 Votes  1. Use of check point. Primary use of checkpoint is to save the state of the process. State of the process includes the values within process variables, shared variables and outputs of various activities executed befor the checkpoint. Checkpoint can also be used for duplicate message detection. Below is the Screen shot for the Duplicate Message Detection.  

Checkpoint Concepts and Issues _ Tibco Consulting

Embed Size (px)

Citation preview

Page 1: Checkpoint Concepts and Issues _ Tibco Consulting

7/23/2019 Checkpoint Concepts and Issues _ Tibco Consulting

http://slidepdf.com/reader/full/checkpoint-concepts-and-issues-tibco-consulting 1/3

Tibco Consulting

Checkpoint Concepts and Issues

POSTED ON MAY 21, 2013 BY SRIK POSTED IN TIBCO BUSINESS WORKS 

i5 Votes

 

1. Use of check point.

Primary use of checkpoint is to save the state of the process. State of the process includes thevalues within process variables, shared variables and outputs of various activities executed beforthe checkpoint.

Checkpoint can also be used for duplicate message detection. Below is the Screen shot forthe Duplicate Message Detection.

 

Page 2: Checkpoint Concepts and Issues _ Tibco Consulting

7/23/2019 Checkpoint Concepts and Issues _ Tibco Consulting

http://slidepdf.com/reader/full/checkpoint-concepts-and-issues-tibco-consulting 2/3

(https://reader009.{domain}/reader009/html5/0316/5aab56bb4e55b/5aab56be64

 

2. How to configure check point. If it is stored in file the location of the file where i can get thi

You simply need to place the checkpoint activity after all the activities you consider need to becheck pointed.

Location:

When file based repository is used, they are stored at the following location as .job files.

When running in Designer:

C:\Documents and Settings\<username>\.TIBCO\working\<ApplicationName>\jdb_dupkeys

When Deployed:

C:\tibco\tra\domain\dvl\application\<ApplicationName>\working\<ApplicationName>‑Process_Archive\jdb_dupkeys

3. What it writes in file or stores in db.Is it readable?

The content in which they are stored is XML

 

Procedure to stimulate Check Point

We can stimulate this during design time..

Set the below engine commands

 bw.engine.enablejobRecovery =true and autocheckpoint restart to false

Page 3: Checkpoint Concepts and Issues _ Tibco Consulting

7/23/2019 Checkpoint Concepts and Issues _ Tibco Consulting

http://slidepdf.com/reader/full/checkpoint-concepts-and-issues-tibco-consulting 3/3

 

 JMSQueuReciever –>CheckPoint–>Sleep–>End

 

Now keep the interval for Sleep activity to 10sec.

 

Post a message to the queue and then the JMS queue reciever will pick the message and this jobhalts at the Sleep activity until it completed the sleep interval.Now stop the engine before this ..

Now there will a job created and saved in the jdbdupkeys folder..

 

Now restart the engine, take a separate process definition with engine command activity to find

the recoverable processes .Now take another engine command to restart the recoverableprocesses..

 

Then the jobs again restarts from the checkpoint and gets completed.

 

If you guys are looking for Tibco Consulting/Support/Corporate Training do reach [email protected]

 

Blog at WordPress.com. | The Argent Theme.

Follow

Follow “Tibco Consulting”

Build a website with WordPress.com