Rebuilding Key Files

Once every 1-2 weeks I rebuild all sort files and am wondering if I should also be rebuilding the key files? Is there any risk/downside to rebuilding the key files? Also, when I am running the utility do I want Integrity Check and Optimize File checked or is it pointless to do an integrity check if I am optimizing the file?

  • 0
    I would not rebuild the key files unless you're having error messages. Sort files are fine, and that's actually a great idea to rebuild the sort files every week or every 2 weeks.
  • 0

    I copied my data to my test server and when rebuilding the key files as a test certain modules look as if they have some issues. Should I rebuild the key files even though I am not receiving errors? As a general question should I be wary of rebuilding key files? Could it potentially cause issues? I would obviously do a backup before rebuilding them. I was hoping maybe TomTarget, BigLouie and others might weigh in with their experiences.

  • 0 in reply to Jon_K

    My take on it is that it generally does not hurt to do rebuild keys files periodically, but it isn't mandatory either.  Just make sure you review the log files to see if anything significant happened in the process.
     
    In rare occasions I have seen issues that have occurred as a result of a rebuild key file, but since rebuild key files does make backups of the files they can be restored if need be.

    The once rare situation has been rebuilding key files on 4.5 and prior in payroll and having some records get deleted out of the payroll earnings/deductions master file. In which case I restored the specific file or manually re-entered the codes that were deleted.

  • 0 in reply to TomTarget
    I would not reccomend rebuilding key files unless you are having issues or are directed to do so by your Sage 100 Reseller or Sage 100 Customer Support.

    Before doing any file rebuilds, you should make sure that you have a valid backup of your Sage 100 data files. Rebuilding Key files in particular can remove records if the data is damaged beyond the ability to recover the key.

    Thank you,
    Kent Mackal