I've never truly kept track its probably around 50-60 average. When I am oncall its like 80.How many hours per work are you working, both jobs combined?
The curse of DevOps: Modern developers found operations people annoying to deal and work with, so they wanted to do everything themselves. Now they get to enjoy being on-call 24/7, too.They work on shifts are are available 24/7. But that is their explicit function. They do not have a development workload on top of that.
The curse of DevOps: Modern developers found operations people annoying to deal and work with, so they wanted to do everything themselves. Now they get to enjoy being on-call 24/7, too.
You're welcome! Sure would be a shame if that API had to go behind akamai!Security is necessary, but it goddamn sucks. I can't count how many hoops I've had to jump through because of security. Gawd.
You sound like The Riddler!You're welcome! Sure would be a shame if that API had to go behind akamai!
I have been on both side of the fence, and let me tell you: If you have good developers they understand the inherent responsibility they have, including the dangers that come with that. They also have proper production and testing environments, strict separation, and do proper deployment. Also, documentation.Operations is one of those "jobs" that is relatively new and only exists out of necessity due to regulations like Sarbanes-Oxley forcing companies to remove developer access to production environments. Developers find operations staff "annoying" because they mostly don't understand software or SDLC and just push buttons created for them by us developers while they also try to act like they are our boss.
Like what is the goal of doing this? Even if you're a totally self serving Indian trying to pajeetify the company I don't see the advantage of doing this.
And also not a shitskinThat's because you're thinking about it logically.
Realistically you do indeed want security focused engineers in the process.So, yeah: There are retards on both sides of the fence, but the basic idea of two pairs of eyes on a deployment is sound. We just have to find a way to do it without annoying everyone.
Like what is the goal of doing this? Even if you're a totally self serving Indian trying to pajeetify the company I don't see the advantage of doing this.
So we use stuff like Snyk for secrets in code, dependabot for vuln in code and updating it. it takes legit rockstar devs who like security and you pay them enough to do it. ill be honest it is slow as fuck because we keep alot of security gates in monitor mode not to fuck with our devs to much. we did build a pretty legit AI development and general user guardrails tool that allows you to use it free of worrying about exposing code, secrets or anything. we prechoose what LLMs and tools we want to add to it.Realistically you do indeed want security focused engineers in the process.TomServo having CICD with security gates is appealing to me. As this is the least disruptive way to do it.
The problem I see here is that you need non-retards to do that part. The afterthought pen test retards can't do this. No way they can just read the code and see the security issues directly or properly diagnose those issues within the limited dev environment. The same person capable of that is someone who is already developing whatever it is. This similar to the SDET problem (as I call it).
It is quite ideal to have SDETs on your very dev team. But many places don't have them due to cost. The same is true for skilled and expensive developers who specialize in security.