Guidance for System Reliability and Stability
Read Cherwell guidance for optimizing your CSM system for best performance and stability.
- Best Practices
For best results, periodically review performance best practices to analyze and troubleshoot performance issues. See Best Practices for Performance.
- Business Objects
Learn how to prevent long load times for Business Object records. See Business Object Performance.
Relationships provide a powerful way to pull record data together in meaningful ways. Learn how to ensure your relationships meet the needs of your users without impacting performance. See Relationships and Performance.
- Automation Processes
Because Automation Processes rely on Business Object logic, be sure to optimize configurations that might impact performance. This is especially important in high-load systems that have a large number of concurrent users or a high rate of record creation and updates. See Performance Considerations for Automation Processes.
Also, learn about how Automation Processes are queued and run. See Automation Process Workflow.
- Cherwell REST API
Learn how to resolve poor performance with the Cherwell REST API. Examples of poor performance might be API calls, such as the first call made to CSM, taking longer than expected to complete. See Cherwell REST API Performance.
- Content Standards
Learn about the standards Cherwell uses for developing CSM content elements, such as Business Objects, forms, fields, and more. Consistently applying these standards to content you create and modify will help minimize issues associated with inconsistent content items. See Content Standards Overview.
- Email Monitoring
Learn how to avoid common mistakes and troubleshoot issues that may occur with the Email and Event Monitor Service. See Recommendations for Implementing Email Monitoring in CSM.
- Recommended Timeout Settings
Learn about the recommended timeout settings in CSM and its supporting services. Recommendations are intended to optimize system performance. See Suggested Timeout Settings for CSM.
- Approval and Denial Rules
Learn about the set process used to determine whether an approval or a denial can be actioned. Detailed examples are provided for a variety of approval and denial scenarios. See Approval and Denial Threshold Rules.
- Blueprint Publishing
Certain changes to Business Objects may cause database tables to be rebuilt during the publish process. This can extend the amount of time it takes to complete the publish process, especially for Business Objects that contain a large number of records. This may impact system performance and cause some Business Objects to be unavailable. See Performance Impact of Blueprint Changes.
- Integration Options
Learn the pros and cons of various integration options that enable you to import, export, or link information between two systems. There are also options for performing actions that are triggered by an external tool or by CSM. See CSM Integration Options.
- Platform Security Certification
Application and environment testing are performed regularly to ensure security hardening for CSM. See CSM Core Platform Security.
- Authentication Methods
Learn about the four methods for authenticating users: internal, LDAP/Active Directory, Security Assertion Markup Language (SAML), and Windows authentication. See Authentication Methods.
- Enable HTTP Strict Transport Security (HSTS)
On-premise customers can learn how to enable HSTS to inform a browser that it should contact CSM web applications only through HTTPS connections and should automatically convert all attempts to access applications using HTTP to HTTPS requests instead.
Be aware that the process is different depending on which version of Internet Information Services (IIS) you use. See Enable HTTP Strict Transport Security (HSTS).
- Email Credentials FAQ
Find information about securing credentials-based email accounts and answers to frequently-asked questions about Modern Authentication and OAuth 2.0. See Modern Authentication and Google Authentication FAQs.
- Encrypt Sensitive Data
Learn how to encrypt sensitive data using two CSM features:
- Encryption modifiers store private information, such as API keys, user names, or passwords in CSM. This is useful for integrating CSM with other systems (Examples: Amazon, Microsoft Teams) that require credentials and other sensitive information to be stored in the CSM database. See Encryption Modifiers.
- Field-level encryption enables you to safely gather sensitive information from forms. See About Encrypted Fields.
- Run the Performance Health Check Tool
Learn how to monitor and optimize system configurations that impact performance. For example, use the tool to find inefficient queries and find and fix mismatched Def IDs. See About Performance Health Check.
- Network Health Check
Validate network speed and connectivity, so a technician can check for network issues between their client and the server. See Network Health Check Results.
- Interpret Health Check Results
After running the Health Check Tool, you can optimize system configurations based on the results of the basic checks, rules reports, and usage statistics. See Interpreting Health Check Results.
- View Queue Service Logs
Use the data that RabbitMQ provides to make informed decisions about scaling CSM microservices. Helpful data includes a list of machines with CSM installed connecting to RabbitMQ, the number of workers, the number of pending messages, and the number of queued messages. See Monitor Queues from the RabbitMQ Management Interface.
- Troubleshoot Queues in CherwellMQS
Find information and steps for identifying and removing "stuck" items in a queue, increasing the speed of Automation Processing events, and decreasing event processing time. See Troubleshooting Queues in CherwellMQS.
- Considerations to Move from Development to Production
See guidelines to synchronize databases between a development or test system and production, remove test data, and perform system maintenance. Also, learn about activating integrations on production and see a final system checklist. See Considerations for Moving from Development to Production.
- Configure the Cherwell Service Host for a Local Scheduler
Most environments have the Scheduling Service on the same network as the other CSM services. However, in some cases you may want to set up a second Scheduler on a separate network. Follow these steps to configure this setup: Configure the Cherwell Service Host for a Local Scheduler.
- Scale CSM
Guidance and recommendations for scaling CSM have been simplified and improved. Learn how, why, and when to scale the Cherwell Service Host, the CSM web applications, or both. See Scaling CSM.
In addition, see specific hardware, CPU, memory, and storage recommendations for using CSM with a load balancer through server farms. Redis guidelines are included. See Server Farm Resource Recommendations.
- MSP Deployment and Configuration Options
Learn how to configure CSM for simple access deployment or by using segregated tenants. The choices depend on the level of access and customization required by the tenants weighed against the cost of configuring and maintaining the system. See MSP Deployment and Configuration Options.