The DevOps Handbookresilient systems with higher degrees of assurance 3. Ch. 20 – Convert Local Discoveries into Global Improvements a. USE CHAT ROOMS AND CHAT BOTS TO AUTOMATE AND CAPTURE ORGANIZATIONAL KNOWLEDGE i. ChatOps Goal is focused improvement on daily work, not experimentation and innovation iii. Demo back improvements at the completion of the blitz iv. Empower those closest to the work to continually identify cultural norm is for everyone to find and fix as part of their daily work 1. Facebook HipHop PHP compiler – resulted from hack day project. Small team refined it over 2 year period and allowed Facebook0 码力 | 9 页 | 25.13 KB | 5 月前3
The Phoenix Projectof Constraints “Eliyahu M. Goldratt, who created the Theory of Constraints, showed us how any improvements made anywhere besides the bottleneck are an illusion . Astonishing, but true useless, because it will always remain starved, waiting for work from the bottleneck. And any improvements made before the bottleneck merely results in more inventory piling up at the bottleneck.” Resource0 码力 | 3 页 | 154.45 KB | 5 月前3
The DevOps Handbookideas don’t work and reinforcing those that do3. local learnings are rapidly turned into global improvements, so that new techniques and practices can be used by the entire organization iii. ENABLING THE IMPROVEMENT OF DAILY WORK 1. Mike Rother observed in Toyota Kata that in the absence of improvements, processes don’t stay the same—due to chaos and entropy, processes actually degrade over time0 码力 | 8 页 | 22.57 KB | 5 月前3
DevOps Meetupand management tested continuously. Steve Barr steve.barr@csgi.com @srbarr1 Overall Quality improvements, “it” goes in better, and with less issues. Maintenance window changed from once a week to0 码力 | 2 页 | 246.04 KB | 5 月前3
The DevOps Handbookapproval ii. Peer review help improve overall quality, provide cross-training, learning, and skill improvements. iii. Keep batch sizes of reviews small iv. 4 simple Peer Review Guidelines 1. Everyone must0 码力 | 8 页 | 24.02 KB | 5 月前3
The DevOps Handbookless able to refactor due to potential rework and merge problems 1. Cross-cutting dependency improvements often provide high-payoffs d. ADOPT TRUNK-BASED DEVELOPMENT PRACTICES i. CI and Trunk-based0 码力 | 8 页 | 23.08 KB | 5 月前3
k8s操作手册 2.359983e0387b2f", GitTreeState:"clean", BuildDate:"2023-09-13T09:34:32Z", GoVersion:"go1.20.8", Compiler:"gc", Pla�orm:"linux/amd64"} # kubeadm config images list #查看k8s其他组件的docker镜像名,默认用 k8s0 码力 | 126 页 | 4.33 MB | 1 年前3
DoD CIO Enterprise DevSecOps Reference Design - Summarymonitoring, signature-based continuous scanning using Common Vulnerabilities and Exposures (CVEs), runtime behavior analysis, and container policy enforcement.The security stack in the security sidecar container hardening from DCAR containers are preserved and complies with the NIST 800-190 requirements [12]. 3. Runtime Defense, this can perform both signature-based and behavior-based detection. This can also be used Log Storage and Retrieval Service 2. Service Mesh 3. Program-specific artifact repository 4. Runtime Behavior Analysis Artificial Intelligence (AI) service 5. DCAR for the hardened containers 60 码力 | 8 页 | 3.38 MB | 5 月前3
共 8 条
- 1













