IT-Checklists.com - The eBook-Shop with Checklists and Templates for Professionals
Database Health Check - Stability Assessment
Table of Contents
Related Documents............................................... 4
Overview - System Description....................................5
First Checks.....................................................6
Alert-files and Dump-Destinations.............................6
alert<sid>.log.............................................6
userdump-destination.......................................6
background-dump-destination................................6
User Management................................................7
Invalid Objects................................................7
Wrong Objects in Schema of SYS or SYSTEM.......................7
Support..........................................................9
Monitoring, Alarming, Troubleshooting, Incident-
and Problem Management.......10
Monitoring and Alarming.......................................10
Incident- and Problem Management..............................10
Installation....................................................12
Automatic purging / Lost / Forgotten Files....................12
Protection against loss of Data.................................13
Backup and Recovery Process...................................13
Additional Protections......................................13
Protection against Block Level Corruption...................14
Restore.......................................................14
Availability....................................................15
Configuration- and License Limitations........................15
Other License Limitations..................................16
Capacity Reserves.............................................16
Diskspace...................................................16
Backup Duration.............................................17
Archivelog Space............................................17
Other Availability Features...................................17
Application Database Objects....................................18
Unusual.......................................................18
Disabled Triggers...........................................18
Disabled Constraints........................................18
Tables, Indexes, Data Integrity etc...........................18
Bind Variables................................................19
Database Sessions.............................................20
Statistics....................................................21
Does the application create temporary tables ?................22