5. Typical Requirements Workshops
Delete this box after you read it. This is a list of typical workshops you might
conduct to understand the customer’s environment. Customize this with the
actual workshops you will use in a specific engagement.
Workshop Duration Proposed Attendees Date
Business Requirements 2 hours Architect, Business Owners, Representatives
Network, Storage, Security, and
Management
4 hours
PM, Architect, Server, Networks, Security,
Storage, Operations, Administrators
6. Workshop
• This workshop is a gathering of project stakeholders who aim to
– Agree on the project direction and scope
– Identify and agree to business and/or system requirements
– Examine possible solutions to the requirements
– Review and approve the products under analysis
Plan
the Workshop
Conduct
the Workshop
Follow Up
7. Plan the Workshop
• Objectives
– Key question is, “Why are we staging this workshop?”
– Clearly state objectives in the agenda
– Send the agenda to participants early enough for them to prepare and
gather relevant information for the meeting
• Attendees
• Concerns
• Structure
• Techniques
• Venues
8. Conduct the Workshop
• Focus on Objectives
– The facilitator is responsible for following the agenda
• Encourage Participation
• Stay on Track
• Keep a Record
• Summarize Key Points
9. Follow Up
• Document, Communicate, and Validate
– The workshop activities should be documented to track follow-up activities
and for eventual sign-off by attendees
• Issue Notes
• Invite Feedback
11. Business Requirements – Questions Part 1
– Do you have an executive sponsor for the Software-Defined Storage
implementation?
– Do you currently document and manage business agreements or regulatory
requirements that impact IT?
– Do you have someone within IT who has been identified as leading
initiatives for software defined storage?
– Have you completed a business impact analysis (BIA) study that provides
the list of systems to build out the software defined storage infrastructure,
including priorities and dependencies?
– Have you completed a risk assessment study that shows assets,
vulnerabilities, likelihood of damage, and estimated cost of recovery?
– Do you have a configuration management database (CMDB) that contains
all relevant information about the information systems components and the
relationships between the components?
12. Business Requirements – Questions Part 2
– Are changes to the IT infrastructure reviewed for impact on DR procedures?
– Do you have Service Level Agreements (SLAs) in place for your Software
Defined Storage solution?
– Do you have a complete mapping of line of business/users that maps to the
application services list detailed in the SLAs?
– How often do new applications get added to the environment that would
have a need for different storage characteristics?
– How are decisions on storage policy currently made?
– How is storage tiered currently in the environment?
– Do you have a team dedicated to application level development including
design, implementation and performance testing ?
13. Network, Storage, Security, and Management –
Part 1
– What type of LUNs do you provision to support the virtual infrastructure?
– What is the typical size of VMware VMFS volumes that you have
provisioned to service your virtual infrastructure?
– What is the typical number of virtual machines that you place on a VMFS
volume?
– What is the typical size of the vmdk file (or files, if you have a C and D drive
configured) associated with your virtual machines?
– On Windows-based virtual machines, do you configure a dedicated C drive
for the Windows-based operating system and page file, as well as dedicated
application and data drives (D drive)?
– What type of workload is going to be managed and stored on the Virtual
SAN datastore?
14. Network, Storage, Security, and Management –
Part 2
– Do you use VLANs in your production environment?
– Can Layer 2 Multicast (IGMP Snooping) be configured on a dedicated
network for Virtual SAN Traffic?
– Are 10GB/s networks available in the environment?
– Are Jumbo Frames used in the environment?
– Is LACP being used in the environment?
– What teaming policies are currently used in the environment?
– Is VMotion configured in the environment?
– Is DRS used in the environment? If so, what mode is it configured to use?
– Are tiered storage policies used in the environment?
15. Operations
– Are all critical servers backed up at scheduled checkpoints?
– Do you have established recovery point objectives (RPOs)?
– Do you have established recovery time objectives (RTOs)?
– Do you have a standardized set of high availability practices and
technology?
– How do you determine the characteristics of a virtual machine storage
workload?
– What team configures he aforementioned characteristic and ensures that
virtual machines are in compliance with their expected policy?
– How is monitoring and remediation of the environment’s current workloads
performed?
17. Analyze and Prioritize
• Must (M)
• Should (S)
• Could (C)
• Won’t (W)
Requirements
MUST
(M)
SHOULD
(S)
COULD
(C)
WON’T
(W)
Requirement 1
Requirement 2