Velocity Conference 2015Tools by Brendan Gregg (Netflix) @brendangregg http://www.slideshare.net/brendangregg/velocity-2015-linux-perf-tools Value of mentoring (vs self-teaching through search) is mentor telling you what not Continuous Delivery in Financial Training by David Genn (IG) @david_genn Separate deployment from release Automate everything Trust your tests Conversations are way better than project proposals Lightbody (New Relic) Monitoring evolved from servers and networks to applications to what users do with applications Reflections on mountain moving, from the first year of USDS Mikey Dickerson (Federal0 码力 | 4 页 | 176.79 KB | 5 月前3
DevOps MeetupInfrastructure Ops Product Ops Product Management Every technology under the sun Solaris, Windows, Linux Apache, IIS, TCServer, etc. Oracle, DB2, SQL Server How we got better We read and we Overall Quality improvements, “it” goes in better, and with less issues. Maintenance window changed from once a week to everyday Expanded Sphere of Influence Machine Imaging DEG and 3rd Party Application0 码力 | 2 页 | 246.04 KB | 5 月前3
HW弹药库之红队作战⼿册CVE-2019-1322 & CVE-2019-1405 [重点] cve-2019-12750 [ 赛⻔铁克(⽤的较多)本地提权 ] [重点] linux 内核漏洞 本地提权 [linux-exploit-suggester] CVE-2016-5195 [重点] CVE-2017-16995 CVE-2019-13272 查看当前shell权限 及 详细系统内核版本 获取当前系统的 详细ip配置,包括 所在域, ip, 掩码, ⽹关, 主备 dns ip 获取当前系统最近的⽤户登录记录 获取当前⽤户的所有命令历史记录 [ 主要针对linux,⾥⾯可能包含的有各类敏感账号密码,ip,敏感服务配置... ] 获取本机所有 服务/进程 [包括各个进程的详细权限,也包括⽬标系统中的可疑恶意进程(有可能是同⾏的⻢)]/端 ⼝/⽹络连接信息 ⾥⾯也可能保存的有密码(加密后的base64)] 抓取当前系统 "注册表中保存的各类账号密码hash" [ Windows ] 抓取当前系统所有 "本地⽤户的明⽂密码/hash" [ Windows & linux ] 抓取当前系统的所有 "⽤户token" [ Windows ] 抓取 "windows凭据管理器中保存的各类连接账号密码" 抓取 "MSTSC 客户端中保存的所有rdp连接账号密码" 抓取各类0 码力 | 19 页 | 1.20 MB | 1 年前3
MITRE Defense Agile Acquisition Guide - Mar 2014This guide is intended to show how the DoD could tailor the Defense Acquisition Framework to benefit from Agile development best practices. To succeed with an Agile approach, program managers need to work suit their program and environment, New programs can develop an Agile structure and environment from the start, while existing programs can iteratively modify their processes to adopt more Agile practices will take time, trial and error, and shaping of processes, policies, and culture, but with support from oversight and process owners can reach the full potential of Agile development. Agile Acquisition0 码力 | 74 页 | 3.57 MB | 5 月前3
The DevOps HandbookAllspaw ii. Blameless Post-Mortem – Actions: 1. Construct a timeline and gather details of the failure from multiple perspectives2. Empower all engineers to improve safety by allowing them to give detailed judgment of those decisions lies in hindsight 5. Propose countermeasures to prevent a similar accident from happening in the future and ensure these countermeasures are recorded with ta target date and an meeting, widely publish the minutes, artifacts, and results; share and encourage others to learn from what happened ii. Share results outside of organization – even back to customers e. DECREASE INCIDENT0 码力 | 9 页 | 25.13 KB | 5 月前3
A Seat at the Table - IT Leadership in the Age of Agilitycompeting projects. But in a world where IT is integral to strategy, it makes more sense to begin from strategic objectives and produce investment themes that accomplish those objectives. When combined by adopting an intelligent attitude toward risk. Risk is the chance of a negative impact resulting from uncertainty. We can reduce risk—often at a cost —but there is generally no way to eliminate it. uncertainties dwarf the certainties, and that the uncertainties are not small potential deviations from the initial plan—they are the very substance of the project. The Agile way to deal with uncertainty0 码力 | 7 页 | 387.48 KB | 5 月前3
The DevOps Handbookhide from its visitors (customers, stakeholders)2. The team has nothing to hide from itself: it acknowledges and confronts problems g. FIND AND FILL ANY TELEMETRY GAPS i. Expand metrics from business DETECT POTENTIAL PROBLEMS i. Easy to filter to identify when a metric is significantly different from its norm. ii. Minimizing false positive is critical to prevent alert fatigue iii. Statistical measures as well as confirmation 3. For each metric, configure alerts when metric deviates significantly from mean 4. Repeat for weaker signals c. PROBLEMS THAT ARISE WHEN OUR TELEMETRY DATA HAS NON-GAUSSIAN0 码力 | 8 页 | 24.02 KB | 5 月前3
The Goal - A Process of Ongoing Improvementclosed by corporate HQ, with hundreds of job losses. It takes a chance meeting with a professor from student days - Jonah - to help him break out of conventional ways of thinking to see what needs to recovered.” Parallel: Automated Unit Testing before Manual Testing & QA Time and Batch sizes From the moment material comes into the plan to the minute it goes out the door as part of a finished non-bottlenecks, wait is dominant, because they are waiting in front of assembly for parts that are coming from the bottlenecks. If we reduce batch sizes by half, we also reduce by half the time it will take0 码力 | 6 页 | 100.81 KB | 5 月前3
The DevOps Handbookstarved, waiting for work to clear the bottleneck. 3. In typical DevOps transformations, as we progress from deployment lead times measured in months or quarters to lead times measured in minutes, the constraint ELIMINATE HARDSHIPS AND WASTE IN THE VALUE STREAM 1. In the book Implementing Lean Software Development: From Concept to Cash, Mary and Tom Poppendieck describe waste and hardship in the software development can be bypassed without affecting the result. The following categories of waste and hardship come from Implementing Lean Software Development unless otherwise noted: a. Partially done work: b. Extra0 码力 | 8 页 | 22.57 KB | 5 月前3
A Seat at the Table: IT Leadership in the Age of Agility - Part 2Development takes place on automated pipelines that help the developer move frictionlessly and quickly from requirements to deployment. The developer uses a powerful integrated development environment (IDE) the system over time as the business changes versus buying an undefined stream of future services from a vendor who doesn’t know your business and doesn’t have financial incentives to supportyou. Text IT are insatiable, governance provides a way to say no to proposed projects, absolving IT leaders from having to take personal responsibility for such decisions. Traditional governance approach: Hunter0 码力 | 7 页 | 387.61 KB | 5 月前3
共 27 条
- 1
- 2
- 3













