E1. Will all necessary user IDs/password (including root) be available for the deployment?
E2. Has it been verified that all infrastructure components are fully operational, with no errors occurring in the logs?
E3. Is all the necessary information (for example, server names and port numbers) available for resources, such has databases or legacy systems? Has connectivity to these resources from the target environment been verified?
E4. Have all network traffic routes through firewalls, switches, and routers been verified? Are documents showing the topology, firewall rules, etc., up to date and available for troubleshooting?
E5. Is there plenty of space on volumes used for logging? Has capacity planning been done for all system components? ...