Disclaimer

Monday 15 January 2024

Project - Technical Requirements



Server Details

Hostname

Model / Type

Serial numbers

Hardware ID

Firmware levels

No. Processors installed/available

Specification of processors

Quantity of RAM installed/available

Base operating system details

Maintenance level

Paging space configured

Boot list order

Internal disk configuration (Mirrored/Not mirrored)

External disk configuration (SCSI, Shark, SSA, EMC etc)

Lpars, Zoning, n/vpar if any

 

Applications

 

Installed licensed programs base operating system

Installed licensed programs additional products

Floating license configuration

 

 

Network Settings

  • Network diagram
  • Network adapters installed/configured
  • Routing details (static and dynamic)
  • IP aliasing
  • Network options
  • TCPIP details
      • Primary
      • Backup
      • Console IP
  • Network file system configuration (nfs)
  • Internet daemon configuration (inetd.conf)
  • Port configuration (services)
  • Host file configuration (hosts)

 

Optional Services

§  Sendmail configuration

§  SMTP configuration

§  SNMP configuration

§  NIS configuration

§  DNS configuration

§  NTP configuration

 

Performance

Virtual memory configuration

Virtual memory statistics

CPU statistics

Disk statistics

Asynchronous I/O config.

Kernel attributes (lsattr)

Type of usage (online, batch etc.)

Any identified trends in usage (heavy workload times etc.)

Patch Management procedure of servers

 

Peripherals

Local printer configuration

Remote/Network  printer configuration

Tape drives

Diskette drives

CD drives

Media of OS/application on every site. (its inventory and details)

 

Housekeeping

§  Location of scripts

§  Scheduling of scripts

§  Documentation

 

Scheduled Processes

§  Crontabs

§  At jobs

§  Application processes

§  Scheduling Tools Used

§  Scheduled jobs on remote systems

§  Scheduled jobs from remote systems

 

System Shutdown & Restart

§  Location of shutdown procedures

§  Location of restart procedures

§  Schedule for system shutdown

§  Dependencies

§  Inittab configuration

 

Security

§  Client specific security policy

§  Check for removal of services

§  Changes to default configuration of services

§  Security changes to network options

§  List disabled default accounts

§  Security changes to default user attributes

§  Changes to default shell variables

§  Root access procedures

§  Procedures for access to group accounts

§  Details of default profile

§  Modifications to password attributes/password policy

§  Configuration and documentation of Installed security products

 

Monitoring

  • Monitoring of system logs
  • Monitoring of audit trails
  • Monitoring changes to key system configuration files
  • Understanding of monitoring script like
      • Space check ,
      • Performance of the server in terms of CPU
      • Memory utilsation
      • Disk I/O.
  • Daily/weekly/monthly Tasks
  • Tools/scripts Used
  • Customized monitoring tools used

                                                        

 

Cluster Details

§  Cluster Agent installation and configuration procedure

§  Cluster Maintenance and Monitoring procedure

§  Existing Cluster Setup Details

§  New Cluster installation / upgrade and configuration procedure

§  Cluster Backup, restore, failover procedure

§  Cluster Contact Person

 

Storage Details

  • Storage Configuration like type of storage, redundancy  ,allocation of LUNs & Schematic diagram of SAN setup
  • Schematic diagram of NAS setup
  • Technologies used
  • Storage Capacity(TB)
  • Centralized monitoring software(ECC,TSM)
  • Centralized Administration Software
  • DR setup
  • Agreement  between different Storage
  • No of  Stoarge array boxes.
  • No of NAS boxes.
  • No of SAN switches/Fabrics.
  • Process of logging calls to vendors.
  • No of hosts connected to SAN
  • Software used for multipathing
  • Redundancy Level supported
  • RAID Level used
  • Support Level for each technology
  • Capacity Management
  • Vendor Contact list details

 

User Access

§  Naming convention and standards of login accounts

§  Procedures for creating new user accounts

§  Password creation and modification procedures

§  Procedures for modifying user accounts

§  Procedures for disabling user accounts

§  SSH access and configuration

§  Location of SSH keys

§  Definition of SSH connectivity

§  Procedures for obtaining root access for non-System Administrators

 

Support Access System Administration

§  Define owner(s) of root account

§  Support ID for administration (root)

§  List of staff with root/console access permission

§  Procedures for obtaining root access

§  Root user/Console passwords

§  Procedure for changing root/console passwords

§  Firmware password procedures

§  Vendor specific accounts for downloading patch , software

 

OS Backup/Restore

  • Understanding of configuration of Backup management software like NetBackup, Tivoli
  • Policy for Backup Management
  • Monitoring of Backup
  • Tape Management
  • Location of backup script
  • Backup script details
  • Type of backup (cold, hot. Etc.)
  • Backup schedule
  • Media cycle
  • Tape Library Configuration
  • NDMP Configuration
  • Hardware Support
  • Contact List of Vendors
  • Location of restore script/procedures
  • Scheduling Tools
  • Scheduling Contact
  • Backup Strategy

 

 

 Application  Backup/Restore

§  Policy for Backup Management

§  Backup script details

§  Type of backup (cold, hot. Etc.)

§  Backup schedule

§  Media cycle

§  Application Specific Contact List

§  Location of restore script/procedures

§  Scheduling Tools

§  Scheduling Contacts

§  Backup Strategy

 

 

 

 

Problem Determination & Resolution

§  Known problems

§  Solutions implemented

§  Knowledge Management tools or database

§  Major Incidents Analysis

 

Tools

§  Additional tools installed

§  Location of installed tools

§  Reason for installation

§  Documentation for installed tools

§  Understanding of configuration of monitoring tools like Openview, Tivoli & etc.

§  Understanding any other tools like autosys, landesk, cfg2html & etc.

§  Configuration details of servers like regularly running tools cfg2html

§  Understanding of recovery set up like Ignite

§  Owner Contact of tool

 

Routine Tasks

§  Procedures for any routine tasks (daily, weekly etc)

 

Technical Support Scripts

§  List of support scripts

§  Location of scripts

§  Documentation for scripts

 

Others

§  Method for Incidents logging like EARS system & etc.

§  Support time & method like On call

§  Team discussion method like team meeting

§  Problem escalation matrix

 

High Availability

            ·         Cluster monitoring

·         Cluster maintenance

·         Cluster configuration

·         Cluster agent installation and configuration

·         Cluster Error analysis and fixing

·         Installation of cluster patches

·         Cluster upgrades

·         Cluster installations

·         Cluster backup and recovery

 

 

DR

  • DR Document Location
  • Last Updated
  • Scope of DR
  • Last successful DR
  • Frequency of DR
  • Known Issues with DR

 

Documentation

  • Documents
  • Purpose
  • Location

 

SLA’s

§  Application Criticality

           

§  System Connectivity

 

 

 

 

 

 


No comments:

Post a Comment

100 Oracle DBA Interview Questions and Answers

  Here are 100 tricky interview questions tailored for a Senior Oracle DBA role. These questions span a wide range of topics, including perf...