Solved

Post-Mortem Form

Posted on 2006-07-18
3
1,371 Views
Last Modified: 2010-08-05
Hi all,
              I am assigned a task to create a post mortem report template to track server outages or application not available for more than 30 minutes for my manager.What all information will be usefull to capture.

Regards
Mark
0
Comment
Question by:mark_land
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
grsteed earned 250 total points
ID: 17130270
Well, having sat through a number of post mortem meetings here's some things that come to mind.

Date/time of outage
If afterhours, how long did it take to respond.
How lond did it take to resolve. (total outage time)
Who reported the problem (automatic monitoring notification, helpdesk, user call)
Cause of problem if known
Who will research the cause if not known
Who was affected
How were they affected (how many millions of dollars were lost per hour,  couldn't read mail)
Steps taken to resolve the problem
Who worked on the problem
Were procedures followed (on call response, change management, user notification, escalation)
What steps will be taken to make sure it doesn't happen again

Hope this helps,

Gary
0
 

Author Comment

by:mark_land
ID: 17130397
Its great.....Gary...just double checking, did you miss any other information to capture.
0
 
LVL 11

Expert Comment

by:grsteed
ID: 17130530
On the steps to make sure it doesn't happen again, can any monitoring scripts or tool be added to automatically detect and correct a problem. (to restart a process for example)


Oh and my favorite.

Can we create and implement any useless processes that will never help and only make people complain. You see a managers salary it seems (at hp anyway) is based on how many useless processes they implement that will only add time and no value to the resolution process, and will will eventually be thrown out when the next manager comes along.  

;-)

Cheers,

Gary
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now