|
| Summary | Audience | Related Products | Related Services | Deliverables | Table of Contents | |
|||||||||||||||||||||||||
Proactive checking for stability issues is important to avoid unplanned outages.
This checklist supports the execution of an Self Assessment regarding Application or System Stability to ensure that the assessed application will continue to work as required (avoiding unplanned outages) or at least, to resume operations as fast as possible. There are many - often simple - details which could prevent your application from working properly, even if you invested significant money into a clustered solution with redundant hardware and automatic failover.
IS- and IT Directors, Operations Managers:
As they are responsible (and to some extent even liable) for professional operations of business critical systems they appreciate reasonable assessments to identify possible issues or document the good system status. Although they usually don't have the detailed Oracle experience and by for not the time to execute such assessments, Part I assists in a clear definition of "what" should be checked.
Members of Application Support:
This checklist supports members of application support in executing and documenting an Application Stability Assessment. Managers and directors often request that in reaction to an unplanned outage. Executing those checks before (and reacting to findings) prevents such situations. But even without unplanned outages auditors like to see documented evidence of proactive tasks in application management.
Company internal Auditing Department, Revenue Assurance Department, QA-Department:
Use this questions when reviewing systems.
Within this ZIP-file you will find following files:
Scope 3 In Scope 3 Out of Scope 3 Overview - System Description 6 First Checks 7 Application-Logfiles 7 Users 8 IS / IT staff 8 Users in Business Departments 9 Support 10 Supported Versions 10 Support Contracts and License Keys 12 Support Contracts 12 License Keys 13 Monitoring, Alarming, Troubleshooting, Incident- and Problem Management 14 Monitoring and Alarming 14 Overview (just background information) 14 System (Server / OS Monitoring) 15 Database Monitoring 15 Application-Level-Monitoring 16 Definition / Explanation (background information) 16 General 18 List of monitored application events 19 Incident- and Problem Management 20 Protection against loss of Data 21 Backup 21 Crash Recovery (without loosing any file / filesystem) 22 Database Crash Recovery 22 Recovery from a crashed job 22 Restore of Application Filesystem 23 Restore Tests 23 Availability 24 Business Continuity Plans 25 Configuration- and License Limitations 26 Other License Limitations 26 Capacity Reserves 26 Diskspace 26 Backup Duration 27 Other Availability Features 28 Application Database Objects 29 Unusual 29 Disabled Triggers 29 Disabled Constraints 29 Invalid Objects 30 Tables, Indices, Data Integrity etc. 30 Bind Variables 31 Database Sessions 31 Database Statistics on tables, indexes .. for the optimizer 32 Does the application create temporary tables ? 33 Other 34 Compilers and other Development Tools 34 Environment Maintenance 34
|
Copyright
© 2005 Mercury Consulting Limited. |