Skip to main content

IT-Checklists.com - The eBook-Shop with Templates for Professionals
logo
Skip main navigation
Template Systems Operations Manual Template Data Centre Operations Manual Data Migration Checklist Nonfunctional Requirements Interface (EAI) Checklist Server Upgrade / Migration Checklist Application Upgrade / Migration Checklist Application & Server Inventory Template Release Checklist Outage Planning Application Cloning Application Retirement Application Health check Archiving Requirements Disaster Recovery (DR) Technology Selection Maintaining & Running DR-Protected Systems Backup OLA / SLA Database OLA / SLA DBA Job Description Database Health Check Standby Database
DevOps Application Support Data Migration OLA / SLA Operations Level Agreement System Documentation Project Management Deployment Backup Quality Assurance Compliance and Standards Database Administration Data Centre Robustness Requirements Start-up PhaseAchieving Operational ReadinessStabilized Operations
This eShop is operated by Logo Mercury Consulting Ltd.

Operating and Maintaining DR Protected Systems and Applications


For purpose of Business Continuity even in case of a disasters, IT-applications shall be protected by technology supporting Recovery from that Disaster.

  • This document focuses on operating and maintaining DR-protected systems and applications.
  • It does not deal with selecting and implementing DR-protection.
Selecting the most appropriate technology is supported by separate document "Disaster Recovery (DR) Technology Selection".

Introduction

The initial assumption about DR-protection is usually that this is absolutely transparent.
This is true for most time - as long as all applications and underlaying technology components are running flawless at normal load.

However, in certain circumstances the DR-protection does have impact:
  • In case of changes - some changes need to be manually applied to DR-site
  • In case of non-daily maintenance activities

Content


This document
  • describes methods to identify those activities being impacted by DR-protection
  • provides examples for different areas

Introduction..........................................4
   Purpose............................................4
   In Scope / Out of Scope............................4
Approaches............................................5
List of Activities....................................6
   Changes on Data Centre Infrastructure..............6
   Changes on Storage.................................7
   Changes on Server Hardware.........................8
   Changes on Server Operating System.................9
   Changes on Application Level......................10
   Changes on Database...............................11
   Outage Planning...................................12
   Other Activities..................................13

Deliverables


1 Text Document, 15 pages in all of following formats: DOC, RTF, PDF

Purchase

To purchase this product just use the shopping-cart icons to put this product into the shopping basket.

Then you can continue shopping or continue to the checkout page to finalize the purchase.

Immediately after your payment has been processed you will receive an email containing a link to download the product.



Operating DR Protected Systems and Applications





Pages
Personal
Edition
Corporate
Edition
Price USD
add to shopping basket
Price USD
add to shopping basket
15
$29
$79

Payments are processed by WorldPay Immediate Delivery