All Products
Search
Document Center

Health Check Service

Last Updated: Jun 28, 2018

1.       Scope of Services

Party B’s services are listed as below:

  • Based on the current situation and expectations of the architecture of Party A’s business system and big data applications, Party B shall organize an expert team to perform business and technical survey; collect operational data and logs, configuration, and architecture information; evaluate the overall architectural health status of all systems in the scope and the impact of the current architecture on the expectations; and provide solutions for existing problems;
  • Party B shall check health of the existing architecture of the business system and big data applications, analyze the operational parameters and metrics of the software, hardware, network, and storage of each business system, and provide comprehensive health check results and conclusions.

The following terms are not inluded in Party B’s services:

  • Technical support for architecture transformation;
  • Development of the business system and big data applications;
  • Transformation and design of the specific application and database;
  • Application transformation, application design, and database logical structure design;
  • Migration of application systems not explicitly included “in the scope” of migration;
  • Migration of data not explicitly included “in the scope” of migration;
  • Design and setup of the cloud platform infrastructure and environment;
  • Communication infrastructure and components required for implementation;
  • Installation or configuration of electrical, electronic communication, and cabling infrastructure and components, and the provision of related support;
  • Installation or configuration of non-IT and desktop equipment, such as office furniture, printers, air conditioners, UPSs, and tapes.

2.       Prerequisites

  • If the Project is implemented on the site of Party A, upon start of the Project, Party A shall provide the necessary office facilities, including desks and chairs, restroom facilities, mains power supply and outlets, and network cables. Party A shall ensure the personal safety of Party B’s personnel. The office environment provided by Party A shall be free of harmful gases. Outdoor environments provided shall be protected against inclement weather;
  • All work records and documents of the Project shall be in Chinese, and shall be provided as required by Party A. The electronic files shall be submitted in Microsoft Word, Microsoft PowerPoint, Microsoft Excel, or Microsoft Project format;
  • During the Project, Party A and Party B shall communicate with each other in a manner agreed upon by both parties. Optional communication methods include Internet, fax, email, or written communication;
  • Both parties have signed the site arrival report for the on-site service, and confirmed the service start time and end time.

3.       Service Content

3.1   Network Architecture Health Check

Party B’s expert team shall conduct surveys or use utility software to collect information about the architecture of Party A’s cloud IT system, including but not limited to the configuration parameters and operational metrics of Server Load Balancer, NAT Gateway, Virtual Private Cloud (VPC), Elastic IP Address (EIP), Virtual Private Network (VPN) Gateway, and other network cloud products; and understand the current situation and expectations of Party A’s cloud IT system through surveys. Backed by rich cloud hands-on experience and best practices, Party B’s network expert team shall analyze the effectiveness of Party A’s network architecture, configuration parameters, and operational metrics; evaluate the overall running efficiency, robustness, and security of the network; and find out the limitations and risks of the existing network architecture and provide solutions accordingly, to meet Party A’s needs for professional evaluation on the network architecture.

After the network architecture check, Party A shall be able to fully grasp the architecture and running status of the cloud IT system, understand network architecture limitations and risks, and take preventive and reinforcement measures to prevent the impact of the network architecture on service continuity.

3.2   Elastic Computing Architecture Health Check

Party B’s expert team shall conduct surveys or use utility software to collect information about the elastic computing architecture of Party A’s cloud IT system, including but not limited to the configuration parameters and operational metrics (such as CPU, memory usage, and disk space) of Elastic Compute Service (ECS), Function Compute, High Performance Computing (HPC), Container Service, and other elastic computing cloud products; and understand the running status and expectations of Party A’s cloud IT system through surveys. Backed by rich cloud hands-on experience and best practices, Party B’s elastic computing expert team shall analyze the effectiveness of Party A’s application architecture, configuration parameters, and operational metrics; evaluate the running efficiency, robustness, and security of the elastic computing products; and find out the limitations and risks of the existing elastic computing architecture and provide solutions accordingly, to meet Party A’s needs for professional evaluation on elastic computing.

After the elastic computing architecture check, Party A shall be able to fully grasp the current situation and running status of the elastic computing of the cloud IT system, understand elastic computing architecture limitations and risks, and take preventive and reinforcement measures to prevent the impact of the elastic computing architecture on service continuity.

3.3   Storage Architecture Health Check

Party B’s expert team shall conduct surveys or use utility software to collect information about the storage architecture of Party A’s cloud IT system, including but not limited to the configuration parameters and operational metrics (such as usage, growth rate, and IOPS) of Object Storage Service (OSS), Archive Storage, Network Attached Storage (NAS), Block Storage (EBS), Lightning Cube, and other storage cloud products; and understand the running status and expectations of Party A’s cloud IT system through surveys. Backed by rich cloud hands-on experience and best practices, Party B’s storage expert team shall analyze the effectiveness of Party A’s application storage architecture, configuration parameters, and operational metrics; evaluate the running efficiency, robustness, and security of the storage cloud products; and find out the limitations and risks of the existing cloud storage architecture and provide solutions accordingly, to meet Party A’s needs for professional evaluation on cloud storage.

After the cloud storage architecture check, Party A shall be able to fully grasp the current situation and running status of the cloud storage of the IT system, understand cloud storage limitations and risks and take preventive and reinforcement measures to prevent the impact of the storage on the service continuity.

3.4   Database Architecture Health Check

Party B’s expert team shall conduct surveys or use utility software to collect information about the database architecture of Party A’s cloud IT system, including but not limited to the configuration parameters and operational metrics (such as usage, growth rate, and IOPS) of ApsaraDB, Distributed Relational Database Service (DRDS), ElasticSearch, Data Transmission, and other database cloud products; and understand the running status and expectations of Party A’s cloud IT system through surveys. Backed by rich cloud hands-on experience and best practices, Party B’s database expert team shall analyze the effectiveness of Party A’s database application architecture, configuration parameters, and operational metrics; evaluate the running efficiency, robustness, and security of the database cloud products; and find out the limitations and risks of the existing cloud database and provide solutions accordingly, to meet Party A’s needs for professional evaluation on the cloud database.

After the database architecture health check, Party A shall be able to fully grasp the current situation and running status of the cloud database of the IT system, understand cloud database limitations and risks, and take preventive and reinforcement measures to prevent the impact of the database on the service continuity.

3.5   Middleware Architecture Health Check

Party B’s expert team shall conduct surveys or use utility software to collect information about the middleware architecture of Party A’s cloud IT system, including but not limited to the configuration parameters and operational metrics of Enterprise Distributed Application Service (EDAS), Performance Testing, Message Queue (MQ), and other Internet middleware cloud products; and understand the running status and expectations of Party A’s cloud IT system through surveys. Backed by rich cloud hands-on experience and best practices, Party B’s middleware expert team shall analyze the effectiveness of Party A’s middleware architecture, configuration parameters, and operational metrics; evaluate the running efficiency, robustness, and security of the middleware cloud products; and find out the limitations and risks of the existing middleware and provide solutions accordingly, to meet Party A’s needs for professional evaluation on the cloud middleware.

After the middleware architecture check, Party A shall be able to fully grasp the current situation and running status of the cloud middleware of the IT system, understand cloud middleware limitations and risks, and take preventive and reinforcement measures to prevent the impact of the middleware on the service continuity.

3.6   Security Architecture Health Check

Party B’s expert team shall conduct surveys or use utility software to collect information about the security of Party A’s cloud IT system, including but not limited to the configuration parameters and operational metrics of Anti-DDoS Service Pro, Alibaba Cloud Security Web Application Firewall (WAF), Server Guard, and other security cloud products; and understand the running status and expectations of Party A’s cloud IT system through surveys. Backed by rich cloud hands-on experience and best practices, Party B’s security expert team shall analyze the security policies and configuration of Party A’s cloud products in terms of the network, storage, middleware, and database; evaluate the overall security architecture of the system and configuration and running effect of the security policies; and find out the limitations and risks of the existing security architecture and provide solutions accordingly, to meet Party A’s needs for professional evaluation on security.

After the security architecture check, Party A shall be able to fully grasp the current situation and running status of the cloud security of the IT system, understand security limitations and risks of the cloud IT system, and take preventive and reinforcement measures to prevent the security impact on the service continuity.

4.       Service Process

The process is described as follows:

Process

Description

Completion criteria

Project kickoff meeting

   Both parties negotiate and determine the stakeholders and contact persons, and clarify the project expectations.

   Prepare and hold the project kickoff meeting, and compile the “Project Kickoff Meeting Report”.

Party B submits the “Project Kickoff Meeting Report”, Party A is responsible for holding the project kickoff meeting, and both parties reach an agreement on the Project’s objectives.

Confirm the health check solution

   Prepare and confirm the content and planning of the health check solution.

Party B submits the “Health Check Solution”, and both parties reach an agreement on the solution.

Collect information about the architecture

   Use surveys, tools, and interviews to collect information about the architecture and usage of cloud products in the existing business system.

Party B starts the system status survey, collects and submits the “Architecture Survey Report”, and both parties reach an agreement on the report.

Architecture health evaluation

   Sort the collected information about the system architecture.

   Provide the architecture evaluation comments and suggestions based on Party B’s best practices.

Party B submits the “Architecture Health Check Report”, and both parties reach an agreement on the report.

Service acceptance

   Sort and submit the project materials.

   Submit the project acceptance report.

Party B submits the “Project Acceptance Report” and Party A signs the report to confirm acceptance.

5.       Project Milestones

The Project has five major milestones:

  • Project kickoff meeting: Alibaba Cloud submits the “Project Kickoff Meeting Report”, the customer is responsible for holding the project kickoff meeting, and both parties reach an agreement regarding the Project’s main content, implementation methods, and expectations.
  • Project plan report: Alibaba Cloud submits the “Health Check Plan” and both parties reach an agreement regarding the Project’s implementation content, processes, steps, and plans.
  • Health check solution report: Alibaba Cloud submits the “Health Check Report”. Both parties reach an agreement regarding the content of the survey report, and confirm that the scope, architecture, specifications, and management of the business system specified in the survey report are consistent with the current situation of the system.
  • Health check report: Alibaba Cloud submits the “Health Check Report”. Both parties reach an agreement regarding the content of the consulting report, and confirm that the health check content specified in the consulting report is consistent with expectations.
  • Project acceptance: After Alibaba Cloud submits the “Project Acceptance Report”, the customer shall confirm the content in the report within five working days and sign their acceptance comments.

[NOTE] The project start time shall be subject to the time for signing the “Architecture Health Check Service Project Contract”.

Work content

Delivery time

Project kickoff meeting

 

Project plan report

 

Health check solution report

 

Health check report

 

Project acceptance

 

6.       Customer Responsibilities

  • The customer shall assign a project owner to facilitate Alibaba Cloud’s provision of architecture health check services. The project owner shall be responsible for coordination between the two parties, management of related matters, and review and acceptance of Alibaba Cloud services;
  • The customer must provide information relevant to the architecture health check, including but not limited to technology stacks, big data utility software, application architectures, deployment architectures, data volumes, and performance information;
  • During Alibaba Cloud’s consulting services, if a fault occurs due to third-party software in the materials provided by the customer, the customer shall be responsible for negotiation with the third-party vendor to help provide the relevant information to Alibaba Cloud.

7.       Acceptance Criteria

Project acceptance can start after the following acceptance criteria are met:

  • Alibaba Cloud provides the customer with the following project reports:

No.

 

Document name

1

Acceptance

deliverables

Architecture Health Check Kickoff Meeting Report

2

Architecture Health Check Solution

3

Architecture Health Check Report

  • After these project reports are submitted, Party A shall confirm the solution within five working days. If no objection is raised, both parties sign the “Project Acceptance Report”;
  • Signing of the “Project Acceptance Report” is deemed as completion of project acceptance.

8.       Completion Milestone

The health check is complete after project acceptance is finished and both parties sign the “Project Acceptance Report”.