The DevOps Handbook
Major contributing cause of issues stems from releases representing the first time we see how an application behaves in a production-like environment ii. Don’t just document the environment specifications the value stream iii. Everything, everything, everything is checked into version control 1. Application code & dependencies 2. Environment scripts & creation tools 3. DB scripts and reference data 4. Containers 5. Automated tests 6. Project artifacts – documentation, procedures, etc. 7. Application configuration files 8. This also includes pre-production and build processes 9. Tools iv. 20140 码力 | 8 页 | 23.08 KB | 5 月前3The DevOps Handbook
and are subsequently transmitted to receiving equipment for monitoring 1. Create telemetry in application & environments (to include production, pre-production, and CD pipeline) iii. Ian Malpass, Etsy what’s up or down. ii. Modern Monitoring architecture 1. Data Collection at business logic, application, & environments layer a. Events, logs, & metrics b. Common service to centralize, rotate, and systems need to be more available and scalable than the systems being monitored.” c. CREATE APPLICATION LOGGING TELEMETRY THAT HELPS PRODUCTION i. Dev & Ops create production telemetry as part of their0 码力 | 8 页 | 24.02 KB | 5 月前3The DevOps Handbook
vs BROWNFIELD SERVICES i. DevOps is not just for Greenfield ii. Important Predictor – Is the application architected (or could be re- architected) for testability and deployability? iii. Successful Brownfield mainframe and supporting applications a. They 2X release frequency b. Resulted in increased application reliability c. Reduced deployment lead time from 2 weeks to <1 day 2. Etsy a. “Barely survived the business; defines functionality ii. Development - the team responsible for developing the application iii. QA – team responsible for ensuring feedback loop exists to ensure functions as desired0 码力 | 8 页 | 22.57 KB | 5 月前3The DevOps Handbook
providing application/infrastructure stacks that are pre- approved and appropriately configured and secured. f. INTEGRATE SECURITY INTO OUR DEPLOYMENT PIPELINE i. Hardening the application after development pipeline iii. Enable fast feedback on potentially insecure changes g. ENSURE SECURITY OF THE APPLICATION i. Focus on the sad paths or bad paths to effectively address QA, Infosec and related concerns0 码力 | 9 页 | 25.13 KB | 5 月前3DevOps Meetup
once a week to everyday Expanded Sphere of Influence Machine Imaging DEG and 3rd Party Application Installations Route Adds – requires heightened security access Database Data Script Execution0 码力 | 2 页 | 246.04 KB | 5 月前3DoD CIO Enterprise DevSecOps Reference Design - Summary
new requirement to be delivered and deployed. Deployment speed: how fast a new version of the application can be deployed into the production environment. Deployment frequency: how often a new release0 码力 | 8 页 | 3.38 MB | 5 月前3A Seat at the Table - IT Leadership in the Age of Agility
as we try to become Agile. This frame of reference includes the notions of project, systems, application, investment, architecture, skill set, and accountability. We have, to be honest, made a jumble0 码力 | 4 页 | 379.23 KB | 5 月前3A Seat at the Table - IT Leadership in the Age of Agility
with the self-organizing character of project teams.”12 Enabler: We have been afraid of “rogue” application development, or shadow IT. There has been good reason for that. Rogue applications are often unreliable0 码力 | 7 页 | 387.48 KB | 5 月前3python3学习手册
requests myurl = "http://sysyear.top:4600" myheaders = { "Accept": "application/json", "Content-Type": "application/json;charset=utf8" } mydata = "dddd" response = requests.post(myurl, headers=myheaders0 码力 | 213 页 | 3.53 MB | 1 年前3
共 9 条
- 1