Skip to main content

         This documentation site is for previous versions. Visit our new documentation site for current releases.      

Validate Application Staging Environment

Updated on December 12, 2023


This content applies to On-premises, Client-managed cloud and Pega Cloud environments

Attention: This documentation has been moved to the new documentation site:
This documentation is no longer being maintained. It is out of date and pending deletion. Please update your bookmarks.

Execute thorough end-to-end testing on the staging environment to validate the functionality and operation of your application on Pega Cloud. Follow the application testing strategy defined in your Route to Live Plan. Update the Route to Live Plan with any additional test cases required to validate the staging environment as you progress through this phase.

PDC Monitoring – Staging

In addition to any other testing or monitoring, also monitor your application with PDC, as described in PDC Monitoring

Do this in conjunction with Pega.

Vulnerability Testing

If vulnerability testing is required, raise an INC request in My Support Portal for penetration testing on the staging environment. For more information about guidelines and permission forms for conducting a vulnerability test, see the Vulnerability testing policy for applications on Pega Cloud.

Functional Testing

After the data transfer is complete in the staging environment, perform application functional testing to validate that the application is working as expected with your “production-like” data.  

Performance Testing

Begin to review the application to verify the application performs as expected and meets performance requirements or SLAs when using “production-like” data.

Integration Testing

There were likely several integration changes required when moving your application to Pega Cloud. Verify that your external connections are working properly, and any required external data sources are accessible.

If your application uses emails, test that they are being sent correctly from your application, that external servers are properly connected and provide correct data, that port configurations are correct, that users have the correct privileges and access rights, and so on.


Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best. is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us