Posts

Showing posts from June, 2018

How to check the firewall connections in unix?...

How to check the firewall connections in unix?... Command: telnet hostname portnumber About telnet The telnet program is a user interface to the TELNET protocol. Description The telnet command is used for interactive communication with another host using the TELNET protocol. It begins in command mode, where it prints a telnet command prompt ("telnet>"). If telnet is invoked with a host argument, it performs an open command implicitly (see the Commands section below for details).  

ETL Testing scenarios

ETL Testing scenarios:   1.        Table structure validation (Source & Target) 2.        Validate constraints 3.        Data consistency check 4.        Data completeness validation 5.        Data correction validation 6.        Data Transform validation 7.        Data quality validation 8.        Null validation 9.        Duplicate validation 10.    Data validation check 11.    Data cleaning

ETL Testing Categories

ETL Testing Categories:  Source to Target Count Testing It involves matching of count of records in the source and the target systems. Source to Target Data Testing It involves data validation between the source and the target systems. It also involves data integration and threshold value check and duplicate data check in the target system. Data Mapping or Transformation Testing It confirms the mapping of objects in the source and the target systems. It also involves checking the functionality of data in the target system. End-User Testing It involves generating reports for end-users to verify if the data in the reports are as per expectation. It involves finding deviation in reports and cross-check the data in the target system for report validation. Retesting It involves fixing the bugs and defects in data in the target system and running the reports again for data validation. System Integration Testing It involves testing all the individual systems...

ETL Testing

ETL Testing:   1. Understand the data to be used for reporting 2. Review the Data Model 3. Source to target mapping 4. Data checks on source data 5. Packages and schema validation 6. Data verification in the target system 7. Verification of data transformation calculations and aggregation rules 8. Sample data comparison between the source and the target system 9. Data integrity and quality checks in the target system 10. Performance testing on data