The BTRG Methodology for the PeopleSoft Upgrader
Bruce Driver
Chief Technology Architect
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The BTRG Methodology for the PeopleSoft Upgrader Bruce Driver - - PowerPoint PPT Presentation
The BTRG Methodology for the PeopleSoft Upgrader Bruce Driver Chief Technology Architect The Business & Technology Resource Group (BTRG) Proprietary & Confidential The BTRG Methodology for the PeopleSoft Upgrader Best Practices For
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
violation on a unique index
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Upgrade Pass in the allotted Go-Live Time Window
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
numbering
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
need to Update Statistics in preparation for Data Conversion
With Deletes step, need to Update Statistics in preparation for remaining Upgrade tasks
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
failures
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Goals – including tuning performance
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
were generated
last time these SQL scripts were generated
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
before the final Test MTP Upgrade pass
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Source database since the Upgrade pass during which the exports were generated
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
fast and reliable
but also the amount of time to perform restore
Backup/ Restore method requires 36 hours for Restore, that factor should be known when weighing options
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
and interfaces
Deployment
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
designated Go-Live time window
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Upgrade toolkits over the course of scores of upgrades
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
development, debugging and tuning skills
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
continued effort to help you lower the cost and stay current on your application maintenance”
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
problem(s)
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
PeopleSoft Maintenance Then Creates Changes Packages Changes Consumes Changes
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
package
updates you want
purpose of patching (if using Oracle DBMS)
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Type of Update Description
PeopleSoft Image The PeopleSoft Image is a VirtualBox virtual machine that is posted to My Oracle Support on a regular
download locally. The PeopleSoft Image contains the very latest maintenance for the application release. This documentation focuses primarily on this type of update. PeopleSoft Release Patchset (PRP) PRPs are sometimes needed in between the regularly released PeopleSoft Images. These are for critical fixes that cannot wait until the next image is
PeopleSoft Image. Use the PeopleSoft Update Manager PIA Application to create a custom change package that contains the fix from the PRP . Proof of Concept (POC) Patches These patches are created only for escalated critical
for a single customer in a password-protected patch. The patch is applied directly to the customer environment, bypassing the PeopleSoft Image. If a POC fix is provided in a subsequent PeopleSoft Image, you are expected to apply the patch from the image as soon as it is available.
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
time-consuming activities
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
window
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
definitions
data structure
such as running processes through Process Scheduler
Data Mover and PeopleSoft Query
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Term Definition
Test
The primary type of test asset in PTF . Tests contain steps that replicate the action of a tester executing a functional test against the PeopleSoft application.
Test Case
A set of data associated with a test corresponding to the values entered or verified in the application. For example, if a hire test hires three similar employees into the PeopleSoft system, a user might elect to record one test and to configure that test to call three test cases, one for each employee hired. A test can have multiple test cases associated with it.
Test Asset
An object used in PTF to automate a functional test. PTF test assets are saved in the application database and can be retrieved at any time to help automate tests. The five types of test assets are:
Log
An object that saves the experience of a single test execution
and include messages and screen shots to indicate where errors
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Term Definition
Library
Similar to a test, a library contains one or more steps that together automate some discrete amount of test functionality. Unlike a test, a library is never executed by itself. Rather, libraries are meant to be called (sometimes repetitively) by tests.
Execution Options
A list of application environments available to the tester. Execution options store application environment information such as URL, user ID, password, and Process Scheduler server, and information needed to run DataMover. PTF supplies this information to the test by default when a test does not explicitly specify such information.
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Current
Production
Historical Archive
Archive
Historical Data Reference Data
(Unless desired)
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Current
Legacy System
Historical Archive
Archive
Historical Data Reference Data Current
New System Can be linked
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Requirements
policies as per ILM business requirements
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Application Retention (Years) Archiving Recovery / Access Requirements Lead Time Type of Data to Archive GL 3 Yearly Audit; Trend analysis Y Ledgers, Journals, fully posted AP 3 Yearly Audit; Trend analysis Y Vouchers, Payments, fully paid and posted AR 3 Yearly Audit; Trend analysis Y Invoices, items Billing 3 Yearly Audit; Trend analysis Y Invoices Billing Interface 1 Quarterly Troubleshooting Y Billing input AM 3 Yearly Audit; Trend analysis Y Retired assets AM Interface 1 Quarterly Troubleshooting Y Asset input, GL interface Payroll 2 Yearly Audit Y Paycheck processing data and balances
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
query tables forward), validating new technical environment, performance testing
results, regression testing on key business processes (such as payroll processing or financial close)
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Application Older Version Upgraded Version
Archives
Universal Access to Application Data
ODBC / JDBC XML Report Writer Application
Upgrade Project
Application Current Data
Archives
Current Data Application Data
Archive
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Application Older Version Upgraded Version Universal Access to Application Data
ODBC / JDBC XML Report Writer Application
Upgrade Project
Application Current Data
Archives
Application Data
Archive Archive Planning
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
99 Confidential Information
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
devices, and end-user systems, these assets are simply not a major point
% of Compromised Records
Database servers are the prim ary source of breached data
2009 2010 75% 92%
Database Servers Laptops & Backup Tapes Desktop Computers Other
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
w ork. … [ w e] cannot retreat behind a Maginot Line of firew alls, or it w ill risk being overrun.”
Outsourcing Web-Facing Apps Employee Self-Service, Partners & Suppliers Insiders
(DBAs, developers,
Stolen Credentials (Zeus, etc.)
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
security/ showArticle.jhtml?articleID= 220300753)
http: / / www.ioug.org/ BestPracticesSolutions/ GSADownload/ .../ Default.aspx?...
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
beginning in 2005, a hacker named Albert Gonzalez and a small group of his accomplices broke into the online databases of multiple companies, including:
Dave & Buster’s, DSW, Office Max, Sports Authority, Forever 21, Barnes & Noble, Boston Market, BJ’s Wholesale Club
credit card numbers, stolen by Mr. Gonzalez and his colleagues, and this was just the work of one single, small hacker group.“
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
been stealing hundreds of terabytes of data from at least 141
for an average of 356 days. The longest time period APT1 maintained access to a victim’s network was at least 1,764 days, or four years and ten months."
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Create Reports -> Manual Review -> Manual Remediation, dispatch, and tracking
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
Collector
can easily be erased by attackers, rogue insiders
– Who, what, when, how
sign-offs and escalations (financial regulations, PCI DSS, data privacy regulations, etc.)
Host-based Probes (S-TAPs)
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
110
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
The Business & Technology Resource Group (BTRG) Proprietary & Confidential
to PeopleSoft security and FSCM/ HCM suites
The Business & Technology Resource Group (BTRG) Proprietary & Confidential