Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.

WSO2Con USA 2017: DevOps Best Practices in 7 Steps

1.172 Aufrufe

Veröffentlicht am

DevOps is increasingly becoming popular in the space of digital transformation and organizations are adotping DevOps practices to improve agility and reduce delivery time. Over the years when working with customers we understood some challenges they go through when implementing DevOps in their organizations. We also learnt many secrets on how to overcome challenges when implementing DevOps at WSO2.
During this talk Chamith will share things he learnt at WSO2 while engaging with Public Cloud and Managed Cloud operations in the form of 7 important areas or steps to consider when implementing DevOps in your enterprise.

Veröffentlicht in: Technologie
  • I’m Hebe from Fashionpay.We are credit card payment processor and specialize at handling High-Risk merchant accounts. My goal is to offer safe, quick and long-standing online payment service to you. * API connect on your web shop * Virtual Terminal Card Processing(by fax, mail order or telephone (MOTO),can’t be tracked.) *Recurring Payments *HIGH successful ratio We are holding test link,Contact me ,hebefashionpay at gmail dot com skype(win.win771) for more details.
    Sind Sie sicher, dass Sie …  Ja  Nein
    Ihre Nachricht erscheint hier
  • Gehören Sie zu den Ersten, denen das gefällt!

WSO2Con USA 2017: DevOps Best Practices in 7 Steps

  1. 1. Devops best practices - the 7 aspects Chamith Kumarage WSO2 Cloud Team (Devops)
  2. 2. Tools and Technologies Automate and Orchestrate Maintenance Monitoring Security Backups and DR Mindset and Culture Image Source: http://www.iepfvillarreal.com/images/agenda.png
  3. 3. 1. Tools and Technologies Image Source: https://static1.squarespace.com/static/52b59397e4b0058d9171ab5b/t/52b9e55fe4b0749228bee409/1387912002815/Tools.png
  4. 4. Figuring out the right tool/technology Tools need to work together Tools need to provide stats/status Support (community or enterprise) Image Source: http://www.clker.com/cliparts/3/e/b/f/12065581091414370587adriano_Hard_Hat.svg.hi.png , http://xmxsolutions.com/wp-content/uploads/2015/09/Why-Kintu-Technology.png
  5. 5. 2. Automate and Orchestrate Image Source: https://www.apicasystem.com/wp-content/uploads/2014/11/automated-testing.png
  6. 6. No matter how small you are One click deployments Automated tests Self healing Humans can focus on improvements Image Source: http://www.nixsolutions.com/uploads//2013/11/12233322.png , https://docs.mulesoft.com/mule-user-guide/v/3.4/_images/orchestrate.png
  7. 7. 3. Maintenance Image Source: http://static.wixstatic.com/media/710180_4d5ee60c6d124a56aa266b478e29a22f~mv2.png
  8. 8. Driven by workflows Fixed maintenance windows Keep all parties updated Upgrades and migrations Image Source: http://vignette2.wikia.nocookie.net/transformice/images/c/c4/Under_maintenance.png/revision/latest?cb=20151016221936 , http://static.wixstatic.com/media/710180_4d5ee60c6d124a56aa266b478e29a22f~mv2.png
  9. 9. 4. Monitoring Image Source: http://www.sberg.net/images-sberg/it-monitoring.png
  10. 10. Monitoring from the end-user’s POV Alerts based on severity No counter-based alerts Dashboards to make faster decisions Postmortem reports Image Source: https://upload.wikimedia.org/wikipedia/commons/thumb/6/65/Monitoring.svg/2000px-Monitoring.svg.png , http://media.spotonsuccess.tv/wp-content/uploads/2012/08/3D-Women-Search-05.png
  11. 11. 5. Security Image Source: http://2.bp.blogspot.com/-4MR-gq62sVs/UX_MluoHraI/AAAAAAAAAH4/k1l8b6qi1lk/s1600/small-business-cyber-security.png
  12. 12. System security and Application security Automated security updates WSO2 Update Manager (WUM) Pen and VA testing Image Source: https://50068.blackbaudhosting.com/50068/view.image?Id=399 , http://icongal.com/gallery/image/200144/policeman_police_women_police_fire_fireman_pilot.png
  13. 13. 6. Backups and DR Image Source: https://www.linuxwolfpack.com/images/db-backup.png
  14. 14. Know your business continuity requirements Backup strategy should align with the BCP DR Strategy should align with Backups RTO (Recovery Time Objective) and RPO (Recovery Point Objective) Frequent drills Image Source: http://www.nyctech.com/wp-content/uploads/2013/01/file-backup.png , http://mysqlbackuponline.com/Content/Bounce/img/cloudbackup.png
  15. 15. 7. Mindset and Culture Image Source: http://www.lutonculture.com/userfiles/images/WTS%20Logo%20-%20PNG%20Transparent%20(For%20Dark%20Backgrounds).png
  16. 16. Image Source: http://www.telogiks.ca/wp-content/uploads/Company-culture-dos-and-donts.png , https://caps.umich.edu/files/caps/field/image/Circle_of_5_People.png Open discussions Don’t ask for permission, ask for forgiveness Trust, but verify Dependability and accountability No blaming or finger-pointing Right attitude
  17. 17. https://cloud.wso2.com http://wso2.com/cloud/managed/ Image Source: http://www.mpccomputer.it/wp-content/uploads/2016/02/cloud-hosting.png , http://uscloud.com/_includes/_images/managed-services-icon.png
  18. 18. chamith@wso2.com Image Source: http://www.drodd.com/images16/thank-you23.png