1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
12

You need to reduce the number of unplanned rollbacks of erroneous production deployments in your company's web hosting platform.

Improvement to the QA/ Test processes accomplished an 80% reduction. Which additional two approaches can you take to further reduce the rollbacks?
Computers and Technology
1 answer:
Lelu [443]3 years ago
3 0

Answer:

1. Introduce a blue-green deployment module

2. Fragment the monolithic platform into micro services.

Explanation:

1. Blue-green deployment is a type of  technique which minimizes downtime and risk by running two identical production environments called Blue and Green.

This technique eliminates downtime due to app deployment. In addition, blue-green deployment reduces risk: if something unexpected happens with your new version on Green, you can immediately roll back to the last version by switching back to Blue.

2. The scenario behind microservices architecture is that some types of applications become easier to build and maintain when they are broken down into smaller, composable pieces which work together. Meaning that each component is developed separately, and the application is simply the sum of its constituent components.

Each service runs a unique process and usually manages its own database  in a micro services architecture,. This provides development teams with a more decentralized approach to building software,ans also allows each service to be deployed, rebuilt, redeployed and managed independently.

Micro services do have a few disadvantages when compared to monoliths:

   Micro services, unlike the internals of a monolith,  communicate over a network. In some situations, this can be seen as a security concern. Istio solves this problem by automatically encrypting the traffic between microservices.

    Achieving the same level of performance as with a monolithic approach can be difficult because of latencies between services.

 

You might be interested in
Is Flip book drawings, frame by frame (need great drawing skills).
lyudmila [28]
I would say traditional animation
7 0
3 years ago
How does human error relate to security risks
oksian1 [2.3K]

Answer:

The error could let people through who really shouldn't be through

8 0
3 years ago
Which column and row references are updated when you copy the formula: =F$5+12?
KIM [24]

Answer:

Column F and row 5

7 0
3 years ago
5. Write a function that takes two lists of integers and returns a list containing tuples with corresponding elements from both
Allisa [31]

Answer:

def corresponding_of_lists(lst1, lst2):

   c = ""

   corresponding_list = []

   if (lst1 is None) or (lst2 is None):

       return None

   else:

       for i in lst1:

           for j in lst2:

               c = "(" + str(i) + "," + str(j) + ")"

               corresponding_list.append(c)

   return corresponding_list

Explanation:

- Create a function called corresponding_of_lists that takes two lists as parameter

- Initialize an empty list to hold the corresponding values

- Check if any of the lists are null, if they are return None

- Otherwise, get the corresponding elements and put them into the corresponding_list

Return the corresponding_list

7 0
3 years ago
Which is one is bigger 326 kb or 60,436 kb?
Nitella [24]

60,436 is larger.

A byte is a sequence of 8 bits (enough to represent one alphanumeric character) processed as a single unit of information. A single letter or character would use one byte of memory (8 bits), two characters would use two bytes (16 bits).

7 0
3 years ago
Read 2 more answers
Other questions:
  • Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then con
    10·1 answer
  • Information permanently stored on a hard disk, diskette, cd-rom disk, or tape, is called ________ storage.
    8·1 answer
  • python A pet shop wants to give a discount to its clients if they buy one or more pets. The discount is equal to 20 percent of t
    12·1 answer
  • 6.
    14·2 answers
  • Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
    8·1 answer
  • 2. Discuss CORBA functions<br><br>​
    6·2 answers
  • Después de un incidente de seguridad del cliente, el equipo realiza un análisis en profundidad de cada paso dado por los atacant
    6·1 answer
  • What year did polaroid introduce one-step photography with the SX-70
    14·1 answer
  • What is a document?read.Miércoles, 19 de agosto ¡Saludos Mario! ¿Cómo estás amigo? ¿Cómo está tu familia en Caracas? Mi familia
    12·1 answer
  • Question 3 of 10<br> What was the fly in the ointment of Timmy's friendship with Rollo?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!