O'Reilly logo

IBM WebSphere: Deployment and Advanced Configuration by Roland Barcia, Keys Botzum, Tom Alcott, Bill Hines

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Environment

E1. Will all necessary user IDs/password (including root) be available for the deployment?

E2. Has it been verified that all infrastructure components are fully operational, with no errors occurring in the logs?

E3. Is all the necessary information (for example, server names and port numbers) available for resources, such has databases or legacy systems? Has connectivity to these resources from the target environment been verified?

E4. Have all network traffic routes through firewalls, switches, and routers been verified? Are documents showing the topology, firewall rules, etc., up to date and available for troubleshooting?

E5. Is there plenty of space on volumes used for logging? Has capacity planning been done for all system components? ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required