1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
12

You need to reduce the number of unplanned rollbacks of erroneous production deployments in your company's web hosting platform.

Improvement to the QA/ Test processes accomplished an 80% reduction. Which additional two approaches can you take to further reduce the rollbacks?
Computers and Technology
1 answer:
Lelu [443]3 years ago
3 0

Answer:

1. Introduce a blue-green deployment module

2. Fragment the monolithic platform into micro services.

Explanation:

1. Blue-green deployment is a type of  technique which minimizes downtime and risk by running two identical production environments called Blue and Green.

This technique eliminates downtime due to app deployment. In addition, blue-green deployment reduces risk: if something unexpected happens with your new version on Green, you can immediately roll back to the last version by switching back to Blue.

2. The scenario behind microservices architecture is that some types of applications become easier to build and maintain when they are broken down into smaller, composable pieces which work together. Meaning that each component is developed separately, and the application is simply the sum of its constituent components.

Each service runs a unique process and usually manages its own database  in a micro services architecture,. This provides development teams with a more decentralized approach to building software,ans also allows each service to be deployed, rebuilt, redeployed and managed independently.

Micro services do have a few disadvantages when compared to monoliths:

   Micro services, unlike the internals of a monolith,  communicate over a network. In some situations, this can be seen as a security concern. Istio solves this problem by automatically encrypting the traffic between microservices.

    Achieving the same level of performance as with a monolithic approach can be difficult because of latencies between services.

 

You might be interested in
How can u refer to additional information while giving a presentation
yawa3891 [41]

Answer:

There are various ways: Handing out papers/fliers to people, or presenting slides.

7 0
3 years ago
Change the quick style gallery display
OverLord2011 [107]

Answer:

wdym?

Explanation:

5 0
3 years ago
Jim, the IT director, is able to complete IT management task very well but is usually two weeks late in submitting results compa
oee [108]

Answer:Effective but not efficient

Explanation:

Jim is effective because he was able to complete the IT tasks well but he is not efficient because he didn't submit the result on time because being efficient includes management of time.

5 0
4 years ago
What do you do to think positive and maintain discipline to play
Agata [3.3K]

Answer:

to make peaceful mind.to develop our character..

6 0
3 years ago
1. What words might you add to the Microsoft spelling dictionary?
weqwewe [10]
1. ain't, your name, your last name.
2. to ensure a fulfilled document
3. to find what you want then select it
4 0
4 years ago
Other questions:
  • Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro
    9·1 answer
  • [Submit on zyLabs] Please write a function with one input, a matrix, and one output, a matrix of the same size. The output matri
    10·1 answer
  • How many bits would be needed to count all of the students in class today there is 20 students
    6·1 answer
  • Write an expression to print each price in stock_prices. Sample output with inputs: 34.62 76.30 85.05
    9·1 answer
  • You change a document that is saved on your computer by cutting text from the document what happens to the text when you preform
    5·1 answer
  • Write a program that prompts the user to enter a point (x, y) and checks whether the point is within the rectangle centered at (
    12·1 answer
  • HURRY!!!!!!!!!!!!!
    15·1 answer
  • What is alfred anderson in creole?
    6·1 answer
  • This is science I just couldn’t find it
    15·1 answer
  • The three main objectives of information security are.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!