Forum

Search
Close
AI Search
Classic Search
 Search Phrase:
 Search Type:
Advanced search options
 Search in Forums:
 Search in date period:

 Sort Search Results by:

AI Assistant
Part 2: Implementin...
 
Notifications
Clear all

Part 2: Implementing blue-green deployments with zero downtime

20 Posts
19 Users
0 Reactions
128 Views
(@david.morales35)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

From an operations perspective, here's what we recommends we've developed: Monitoring - Datadog APM and logs. Alerting - PagerDuty with intelligent routing. Documentation - Confluence with templates. Training - certification programs. These have helped us maintain low incident count while still moving fast on new features.

The end result was 99.9% availability, up from 99.5%.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.

For context, we're using Vault, AWS KMS, and SOPS.


 
Posted : 08/04/2025 5:16 am
(@jennifer.bailey132)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

I hear you, but here's where I disagree on the tooling choice. In our environment, we found that Istio, Linkerd, and Envoy worked better because observability is not optional - you can't improve what you can't measure. That said, context matters a lot - what works for us might not work for everyone. The key is to experiment and measure.

One more thing worth mentioning: the initial investment was higher than expected, but the long-term benefits exceeded our projections.

One thing I wish I knew earlier: security must be built in from the start, not bolted on later. Would have saved us a lot of time.


 
Posted : 09/04/2025 11:38 am
(@william.smith189)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

The technical implications here are worth examining. First, compliance requirements. Second, failover strategy. Third, cost optimization. We spent significant time on documentation and it was worth it. Code samples available on our GitHub if anyone wants to take a look. Performance testing showed 2x improvement.

I'd recommend checking out the community forums for more details.

The end result was 50% reduction in deployment time.

The end result was 60% improvement in developer productivity.


 
Posted : 09/04/2025 5:56 pm
(@katherine.edwards302)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

This mirrors what happened to us earlier this year. The problem: scaling issues. Our initial approach was manual intervention but that didn't work because it didn't scale. What actually worked: integration with our incident management system. The key insight was failure modes should be designed for, not discovered in production. Now we're able to scale automatically.

For context, we're using Vault, AWS KMS, and SOPS.

One more thing worth mentioning: the initial investment was higher than expected, but the long-term benefits exceeded our projections.


 
Posted : 09/04/2025 11:36 pm
(@nancy.howard864)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

We went through something very similar. The problem: scaling issues. Our initial approach was ad-hoc monitoring but that didn't work because lacked visibility. What actually worked: chaos engineering tests in staging. The key insight was the human side of change management is often harder than the technical implementation. Now we're able to deploy with confidence.

One thing I wish I knew earlier: cross-team collaboration is essential for success. Would have saved us a lot of time.

The end result was 70% reduction in incident MTTR.


 
Posted : 10/04/2025 9:30 am
Page 2 / 2
Share:
Scroll to Top