APS Dual Site ECC Primary Site Shutdown/Restart CIPC Confidentiality: Public Release.

Slides:



Advertisements
Similar presentations
The Why, What and How of Disaster Recovery Plan Testing Presented By: Ed Deveau.
Advertisements

Cisco 6500 E-Series Chassis Up-grade
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Business Plug-In B4 MIS Infrastructures.
DirectAccess Infrastructure Planning and Design Published: October 2009 Updated: November 2011.
Walter Binder University of Lugano, Switzerland Niranjan Suri IHMC, Florida, USA Green Computing: Energy Consumption Optimized Service Hosting.
System Construction and Implementation Objectives:
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
An Empirical Examination of Current High-Availability Clustering Solutions’ Performance Jeffrey Absher DePaul University Research Symposium Presentation.
Lesson 12 – NETWORK SERVERS Distinguish between servers and workstations. Choose servers for Windows NT and Netware. Maintain and troubleshoot servers.
September 2014 Lesson Learned Summary. September 2014 LLs 2 Three NERC lessons learned (LL) were published in September 2014 LL Redundant Network.
What is a Computer Network? Two or more computers which are connected together.
1 Customer Network Operations Center. 2 Agenda Overview Benefits Value Additional Services Questions Monitoring Options.
© N. Ganesan, Ph.D., All rights reserved. Active Directory Nanda Ganesan, Ph.D.
Extending Our Reach Through Partnerships June 2-6, 2013 Phoenix, Arizona.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
CERN IT Department CH-1211 Genève 23 Switzerland t Some Hints for “Best Practice” Regarding VO Boxes Running Critical Services and Real Use-cases.
Unit Introduction and Overview
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
System Testing There are several steps in testing the system: –Function testing –Performance testing –Acceptance testing –Installation testing.
Web Development Process Description
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Characterizing the Existing Network Designing and Supporting Computer Networks.
Module 13: Configuring Availability of Network Resources and Content.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Copyright© 2003 Avaya Inc. All rights reserved Upgrade to Communication Manager 2.0 with Migration to Linux 8.0 Purpose: This presentation was prepared.
Module 4: Add Client Computers and Devices to the Network.
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Managing the Validation and Migration from SAS ® to 9.2 on a New Server Carey Smoak Sy Truong.
Network Management Solution Ashley Stanifer. Overview Statement of the Problem Product Description and Intended Use Design and Development Deliverables.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Cluster Reliability Project ISIS Vanderbilt University.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
Module 4: Planning, Optimizing, and Troubleshooting DHCP
16 1 Installation  After development and testing, system must be put into operation  Important planning considerations Costs of operating both systems.
Fundamentals of Information Systems, Third Edition1 Systems Design Answers the question “How will the information system do what it must do to solve a.
A Guide to Oracle9i1 Database Instance startup and shutdown.
Georgia Electronic Voting System Testing and Security Voting Systems Testing Summit November 29, 2005.
July LEReC Review July 2014 Low Energy RHIC electron Cooling Edward T. Lessard ESHQ.
The McGraw- AS Computing LAN Topologies. The McGraw- Categories of LAN Topology.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Irwin/McGraw-Hill Copyright © 2004 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS6th Edition.
EAS Lessons Learned Summary Lessons Learned Published in June 2014.
Security fundamentals Topic 11 Maintaining operational security.
Utility Engineers, PC.  Generation  Transmission  Distribution.
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
RUP Deployment RUP Deployment Workflow
NERC Lessons Learned Summary LLs Published in September 2015.
Network Topologies.
Bina Nusantara 19 C H A P T E R SYSTEM CONSTRUCTION AND IMPLEMENTATION.
By: Nthabiseng Mosupye GITO Portfolio Committee 30/05/
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
Windows Vista Configuration MCTS : Installing and Upgrading.
OSIsoft High Availability PI Replication Colin Breck, PI Server Team Dave Oda, PI SDK Team.
NERC Published Lessons Learned Summary
Welcome © GTM Software. Welcome © GTM Software.
Services DFS, DHCP, and WINS are cluster-aware.
EAS Lessons Learned Summary
Information Technology Unit State Treasury Agency Ministry of Finance Azerbaijan Republic Elnur Aliev Baku April 11, 2018.
Primary Site Shutdown/Restart
Public Employees Retirement Association Infrastructure Upgrade
Systems Construction and Implementation
System Construction and Implementation
Systems Construction and Implementation
Presentation transcript:

APS Dual Site ECC Primary Site Shutdown/Restart CIPC Confidentiality: Public Release

The Need for a Power Outage Information Services installing a new UPS for Business Continuity. Two feeder breakers identified as needing replacement. Power outage to entire building during breaker work. ECC Migration to alternate site

EMS/ECC Shutdown Failover primary EMS application functions to alternate site. Failover front-end processors to alternate site. Failover EMS business applications to alternate site. Failover primary EMS network communications to alternate site. Ensure ECC personnel onsite at DV-ECC and ready for site cutover. Prepare and test Avtec communications for transition to alternate site.

EMS/ECC Shutdown Ensure EMS support personnel are at both sites and ready for cutover. Transfer Avtec communications from primary site to secondary site. Shutdown ECC consoles at the primary site. Ensure cutover is complete. Obtain ECC approval and power down all remaining EMS servers and related equipment.

EMS Functional/Logical Distribution

EMS/ECC Restart Ensure EMS support personnel are at both sites and ready for cutover. Restart and validate operation of computer network switches at primary site. Restart and validate operation of the Avtec communication equipment at primary site. Restart and validate operation of EMS Business application services at primary site. Failover primary EMS network communication to primary site.

EMS/ECC Restart Power up and validate EMS application running in backup configuration from primary site. Transfer Avtec communications from secondary site to primary site. Failover front-end processors to primary site and validate proper scanning. EMS servers functionally evaluated in backup configuration at primary site. ECC move from secondary location to primary location.

Learning's and Action Items Personnel at alternate site do not have access to required areas Addressed issue with responsible Security Officer and re-enforced importance of accurate access level assignments. Avtec communications not properly transferring to alternate site. Periodically test T1 cards used for Ring Down assignments at alternate site. Shutting down/restarting network equipment caused temporary EMS console anomaly. EMS and network engineering are still working together to mitigate this occurrence in the future. Non-critical network switches powered up after end user equipment Have more network engineering resources on site to assist with tasks.

Learning's and Action Items Alarm for communications equipment indicating communications fault Document process for correct equipment startup and expectations for restart times. Sonnet equipment configuration not backed up prior to shutdown Ensure procedures are in place to backup Sonnet equipment configuration is properly backed up. Historical data not functional after restart. Modify restart procedure and change chronological order of EMS network site transfer to ensure there are no outstanding dependencies.

Conclusion Breaker replacement was successful. Processes and scripts have demonstrated success APS EMS/ECC functionally split between sites.