DC Ops Monitoring Policy Procedure r.2
DC Ops Monitoring Policy Procedure r.2
1. General
1.1. Operations Engineer are expected to understand basic principle
involved in JK1-DC2 Operations within the standards of
professional and high responsibilities.
1.2. Operations Engineer assigned to support 24 Hours x 7 Days on-
site support to ensure that JK1-DC2 Operations run normally and
safely.
1.3. Operations Engineer is working a third shift schedule, working
shift schedule splitting on three period of time.
1.3.1.1. Shift-1 07:30 – 16:00 WIB.
1.3.1.2. Shift-2 14:30 – 23:00 WIB.
1.3.1.3. Shift-3 22:30 – 08:00 WIB .
POLICY & PROCEDURE
2. Policy
2.1. Industries factor is suitable applied that data center standards
considered of availability and stability with redundant power,
network, and cooling facilities, data center offers the highest
uptime availability for your business. Data center is fault-tolerant,
comes with the most aggressive SLA of 99,999% uptime
availability or equal to less than 5 minutes/year downtime
tolerance, equipped with full UPS power, back-up systems, and
2N redundancy with a proven record.
POLICY & PROCEDURE
3. Procedures
3.1. Steps of DC visits beginning from office on the first floor that
operations engineer is going downstairs by the elevator to ground
floor.
3.2. On the ground floor, It takes left way to follow signs the
‘Evacuation Route’ on the westward.
3.3. To quit office building, three layers security will be met. Tap the
id card, finger scanning and type the pass code to push the door
open.
3.4. To enter on the JK1 building yard, tap the id card to open iron
gate.
3.5. To enter the JK1 building, tap the id card, finger scanning and
type the pass code to push the door open.
POLICY & PROCEDURE
3.6. In the security desk, tap the id card to record status that check-
in (to enter) / check-out (to quit).
3.7. Report to the security in-charge of to borrow racks keys.
3.8. Fill the log book (named: Buku Peminjaman Kunci LSCC) to
borrow the keys as the follow fields.
3.8.1.1. Name
3.8.1.2. Company
3.8.1.3. Key number
3.8.1.4. Borrow date
3.8.1.5. Borrow time
3.8.1.6. Paraf
3.8.1.7. Purposes
3.8.1.8. Return date
3.8.1.9. Return time
3.8.1.10. Paraf
3.9. Tap the id card, finger scanning and type the pass code to push
the door open to enter yard elevator of ground floor of JK1.
3.10. Press the elevator buton-up, enter the elevator, and tap the id
card prior press the number two button to go to second floor.
3.11. On the yard elevator of second floor, tap the id card, finger
scanning and type the pass code to push the door open.
3.12. To enter on Data Hall 2A, tap the id card, finger scanning and type
the pass code to push the door open.
3.13. Walks to straight to the corner, and on the right side the JK1-
Cage-2A will be found. To enter The JK1-Cage-2A, tap the id card,
finger scanning and type the pass code to push the door open.
3.14. To monitoring inspecting, take and fill the form Monitoring JK1-
DC2 reflects the actual data that as is listed bellow.
3.14.1.1. Checks Hygrometer Thermometer HTC-2.
3.14.1.2. Checks back side of racks contain computer servers on
POLICY & PROCEDURE
3.14.1.18. Other :
- Any water leakage?
- Any abnormal access?
- Site under repair/construction?
- Any goods arrived at the warehouse?
- Any warehouse stock being used?
- Any inflow or outflow of guest/outsiders?
- Any leakage interface (network cable, telephone
line port, etc.) ?
- Any unauthorized physical AP, enabled infrared,
Bluetooth device ?
- Any unlocked console access, damaged
monitoring probe, abnormal access control
function (can be around over)?
- Any screen door is not normally open?
- Any abnormal break in (from the windows, other
rooms, vents, etc.)?
- Any damage rack equipment?
3.15. To collect the data from network side, operations engineer can be
contacted direct request, What-up to group Network Onsite or
other regarding as is network status screenshots.
3.16. The network status photos for CSR-DANA-1 and CSR-DANA-2
report to Whats-up group named Network-Onsite and DC-Onsite.
3.17. At an office operation engineerite updates regular reports into
spreadsheet file : Activity-DC-Onsite-[date][shift#] as mentioned
above.
3.18. The regular reports by shift work schedule reports can be sent to
email’s team and narations of summary report to Whats-up as
mentioned above.
3.19. Operations engineer is encourage to utilize of Form Log Activity
will delivered in case any guests/outsiders maintain can be on
daily/weekly/monthly base to purpose as APAR and environment
maintenance the The JK1-DC2-Cage-2A on Date Hall 2A as follow
fields.
3.19.1.1. No.
POLICY & PROCEDURE
3.19.1.2. Name
3.19.1.3. Company
3.19.1.4. Activity
3.19.1.5. Start time
3.19.1.6. End time
3.19.1.7. Signature
3.20. Operation engineer reports with photos the DC and Office activity
conducted by DCI Customer Care team such as grounding
checking, APAR (Alat Pemadam Api Ringan) checking, cleaning
day and etc.
3.21. Finaly, opertion engineer returs to DC Office after the monitoring
inspection activities is accomplished with follow step by step
above carefully.
4. Responsibility
4.1. Responsible for day-to-day operations, develop regular or incident
reports of data center infrastructure.
4.2. Assist to facilitate the ticket if any issue related servers, networks
and infrastructure at the time when vendors visited.
4.3. Understanding the requirement of 24x7 on-site support.
4.4. Responsible to enforce the facilities regulations and safety
policies.
4.5. Ensure SLA (Service Level Agreement) standards are met for all
tickets.
4.6. Provide a clean work environment by ensuring the facility is clean.
POLICY & PROCEDURE
4.7. Employees are obliged to save all office related documents under
their Department’s shared folder.
4.8. Executing daily walkthroughs of IT (Information Technology)
equipment and MEP (Mechanical, Electrical and Plumbing)
equipment.
5. Rules
5.1. Company expected that network interconnections perform a
highly secure and reliable data exchange between data center and
disaster recovery center.
5.2. Cloud performance relies a lot on reliability of connectivity,
availability, and also flexibility to accommodate growth and to
handle various types of traffic and workloads.
5.3. E-commerce transactions build consumer trust by limiting the risk
of fraudulent activities while ensuring the privacy of consumer
information by providing a highly secured data center, reliable
connectivity and also performed audit to meet E-commerce
business requirements.
5.4. Operations engineer who violate any aspect of this policy are
subject to disciplinary action up to and including dismissal.
5.5. The severity of such disciplinary action will be dictated and
prescribed according to the Collective Labor Agreement and the
Company’s regulations.
Approved by;
( ................................... )
POLICY & PROCEDURE