Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Post-Mortem Form

Posted on 2006-07-18
3
Medium Priority
?
1,413 Views
Last Modified: 2010-08-05
Hi all,
              I am assigned a task to create a post mortem report template to track server outages or application not available for more than 30 minutes for my manager.What all information will be usefull to capture.

Regards
Mark
0
Comment
Question by:mark_land
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
grsteed earned 1000 total points
ID: 17130270
Well, having sat through a number of post mortem meetings here's some things that come to mind.

Date/time of outage
If afterhours, how long did it take to respond.
How lond did it take to resolve. (total outage time)
Who reported the problem (automatic monitoring notification, helpdesk, user call)
Cause of problem if known
Who will research the cause if not known
Who was affected
How were they affected (how many millions of dollars were lost per hour,  couldn't read mail)
Steps taken to resolve the problem
Who worked on the problem
Were procedures followed (on call response, change management, user notification, escalation)
What steps will be taken to make sure it doesn't happen again

Hope this helps,

Gary
0
 

Author Comment

by:mark_land
ID: 17130397
Its great.....Gary...just double checking, did you miss any other information to capture.
0
 
LVL 11

Expert Comment

by:grsteed
ID: 17130530
On the steps to make sure it doesn't happen again, can any monitoring scripts or tool be added to automatically detect and correct a problem. (to restart a process for example)


Oh and my favorite.

Can we create and implement any useless processes that will never help and only make people complain. You see a managers salary it seems (at hp anyway) is based on how many useless processes they implement that will only add time and no value to the resolution process, and will will eventually be thrown out when the next manager comes along.  

;-)

Cheers,

Gary
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question