{"id":300,"date":"2025-06-23T10:22:09","date_gmt":"2025-06-23T10:22:09","guid":{"rendered":"http:\/\/sreschool.com\/blog\/?p=300"},"modified":"2025-06-23T10:22:10","modified_gmt":"2025-06-23T10:22:10","slug":"logging-in-devsecops-a-comprehensive-guide","status":"publish","type":"post","link":"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/","title":{"rendered":"Logging in DevSecOps: A Comprehensive Guide"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Introduction &amp; Overview<\/h1>\n\n\n\n<h3 class=\"wp-block-heading\">What is Logging?<\/h3>\n\n\n\n<p>Logging refers to the <strong>recording of events, processes, and messages<\/strong> generated by software applications, systems, and infrastructure components. In DevSecOps, logs are essential to observe application behavior, detect security threats, debug failures, and meet compliance standards.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">History or Background<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Initially used for <strong>error tracking<\/strong> and <strong>system audits<\/strong> in traditional IT.<\/li>\n\n\n\n<li>Evolved with <strong>DevOps<\/strong> and <strong>cloud-native<\/strong> practices to support observability, real-time monitoring, and distributed systems.<\/li>\n\n\n\n<li>Today, <strong>centralized logging platforms<\/strong> like ELK Stack, Fluentd, or Loki are integral to DevSecOps pipelines.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Why Logging is Relevant in DevSecOps?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security Monitoring:<\/strong> Detect unauthorized access, anomalies, and potential breaches.<\/li>\n\n\n\n<li><strong>Compliance:<\/strong> Meet requirements of regulations like HIPAA, GDPR, SOC 2.<\/li>\n\n\n\n<li><strong>Automation Feedback Loop:<\/strong> Feed logs into automated testing\/security tools.<\/li>\n\n\n\n<li><strong>Troubleshooting:<\/strong> Quickly identify issues during CI\/CD deployment.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Core Concepts &amp; Terminology<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Key Terms<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Term<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td><strong>Log Levels<\/strong><\/td><td>Severity of logs (e.g., INFO, DEBUG, WARN, ERROR, FATAL)<\/td><\/tr><tr><td><strong>Structured Logs<\/strong><\/td><td>Logs in a consistent, machine-readable format (e.g., JSON)<\/td><\/tr><tr><td><strong>Log Aggregator<\/strong><\/td><td>Collects logs from multiple sources (e.g., Fluentd, Logstash)<\/td><\/tr><tr><td><strong>SIEM<\/strong><\/td><td>Security Information &amp; Event Management (e.g., Splunk, QRadar)<\/td><\/tr><tr><td><strong>Retention Policy<\/strong><\/td><td>Duration and rules for storing log data<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Logging in the DevSecOps Lifecycle<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Plan &amp; Develop:<\/strong> Developers include logging logic in code.<\/li>\n\n\n\n<li><strong>Build:<\/strong> Logging frameworks get embedded in builds.<\/li>\n\n\n\n<li><strong>Test:<\/strong> Logs used for test validation and dynamic security scans.<\/li>\n\n\n\n<li><strong>Release &amp; Deploy:<\/strong> CI\/CD tools log deployment actions and configs.<\/li>\n\n\n\n<li><strong>Operate:<\/strong> Observability through log dashboards.<\/li>\n\n\n\n<li><strong>Monitor:<\/strong> Alerting via anomaly detection or SIEM tools.<\/li>\n\n\n\n<li><strong>Secure:<\/strong> Logs help trace attack vectors and investigate breaches.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Architecture &amp; How It Works<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83e\uddf1 Core Components<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Log Generators<\/strong> \u2013 Apps, containers, OS, CI\/CD tools<\/li>\n\n\n\n<li><strong>Log Shippers<\/strong> \u2013 Tools that collect and forward logs (e.g., Filebeat, Fluent Bit)<\/li>\n\n\n\n<li><strong>Log Aggregators<\/strong> \u2013 Central collectors (e.g., Logstash, Fluentd)<\/li>\n\n\n\n<li><strong>Log Storage<\/strong> \u2013 Long-term storage (e.g., Elasticsearch, S3)<\/li>\n\n\n\n<li><strong>Log Analyzer<\/strong> \u2013 Dashboards\/visualization (e.g., Kibana, Grafana)<\/li>\n\n\n\n<li><strong>Alert Engine<\/strong> \u2013 Monitors logs for thresholds\/patterns (e.g., Prometheus alerts)<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Architecture Diagram (Descriptive)<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>&#091; Applications\/Systems ] \u2192 &#091; Log Shipper ] \u2192 &#091; Log Aggregator ] \u2192 &#091; Storage ] \u2192 &#091; Analyzer &amp; Alert ]\n          (App\/OS)              (Fluentd)         (Logstash)      (Elasticsearch)     (Kibana\/AlertMgr)\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Integration Points<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CI\/CD Tools (Jenkins, GitHub Actions):<\/strong>\n<ul class=\"wp-block-list\">\n<li>Log build, test, and deploy stages<\/li>\n\n\n\n<li>Log scan results from security tools<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Cloud Services (AWS CloudWatch, Azure Monitor, GCP Logging):<\/strong>\n<ul class=\"wp-block-list\">\n<li>Native support for application\/infrastructure logs<\/li>\n\n\n\n<li>Integrated alerting and metrics<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Installation &amp; Getting Started<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Prerequisites<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Basic understanding of Linux<\/li>\n\n\n\n<li>Docker installed<\/li>\n\n\n\n<li>Access to an application or microservice<\/li>\n\n\n\n<li>Admin rights to install log agents<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Hands-On Setup: Centralized Logging with ELK Stack<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Step 1: Spin up ELK using Docker Compose<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code># docker-compose.yml\nversion: '3'\nservices:\n  elasticsearch:\n    image: docker.elastic.co\/elasticsearch\/elasticsearch:8.9.0\n    environment:\n      - discovery.type=single-node\n    ports:\n      - \"9200:9200\"\n\n  kibana:\n    image: docker.elastic.co\/kibana\/kibana:8.9.0\n    ports:\n      - \"5601:5601\"\n    depends_on:\n      - elasticsearch\n\n  logstash:\n    image: docker.elastic.co\/logstash\/logstash:8.9.0\n    ports:\n      - \"5044:5044\"\n    volumes:\n      - .\/logstash.conf:\/usr\/share\/logstash\/pipeline\/logstash.conf\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Step 2: Configure <code>logstash.conf<\/code><\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>input {\n  beats {\n    port =&gt; 5044\n  }\n}\n\noutput {\n  elasticsearch {\n    hosts =&gt; &#091;\"http:\/\/elasticsearch:9200\"]\n    index =&gt; \"devsecops-logs\"\n  }\n}\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Step 3: Send Sample Logs with Filebeat or curl<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>curl -X POST \"http:\/\/localhost:9200\/devsecops-logs\/_doc\" -H 'Content-Type: application\/json' -d'\n{\n  \"timestamp\": \"2025-06-23T12:00:00\",\n  \"level\": \"INFO\",\n  \"service\": \"auth-api\",\n  \"message\": \"User login successful\"\n}'\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Step 4: View in Kibana (<a href=\"http:\/\/localhost:5601\/\">http:\/\/localhost:5601<\/a>)<\/h4>\n\n\n\n<h2 class=\"wp-block-heading\">Real-World Use Cases<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd10 1. Security Log Analysis<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tool:<\/strong> Falco + Fluentd + ELK<\/li>\n\n\n\n<li><strong>Use:<\/strong> Monitor container runtime behavior and log suspicious activities.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83e\uddea 2. CI\/CD Log Auditing<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tool:<\/strong> Jenkins with AuditTrail plugin + ELK<\/li>\n\n\n\n<li><strong>Use:<\/strong> Log user actions, changes to pipelines, plugin usage.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83c\udf10 3. Web Application Firewall (WAF) Logs<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tool:<\/strong> AWS WAF + CloudWatch + Lambda parser<\/li>\n\n\n\n<li><strong>Use:<\/strong> Monitor, alert, and block suspicious IPs based on logs.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83c\udfe5 4. HIPAA-compliant healthcare apps<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Log PHI access logs and detect anomalies.<\/li>\n\n\n\n<li>Send logs to Splunk or AWS Security Hub for auditing.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits &amp; Limitations<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Benefits<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Traceability:<\/strong> Complete audit trail of user\/system actions.<\/li>\n\n\n\n<li><strong>Real-Time Alerting:<\/strong> Immediate notification of issues.<\/li>\n\n\n\n<li><strong>Compliance:<\/strong> Easier audit-ready documentation.<\/li>\n\n\n\n<li><strong>Automation:<\/strong> Auto-responses to incidents via SIEM\/SOAR.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Limitations<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Challenge<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Storage Cost<\/td><td>High volume logs can become expensive to store long-term<\/td><\/tr><tr><td>Noise<\/td><td>Too many logs = alert fatigue<\/td><\/tr><tr><td>Performance Impact<\/td><td>Improper logging slows down application performance<\/td><\/tr><tr><td>Privacy Compliance<\/td><td>Logs may capture sensitive data; requires masking or redaction<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Best Practices &amp; Recommendations<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Security Tips<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mask PII in logs using middleware.<\/li>\n\n\n\n<li>Secure log storage with encryption (at rest &amp; in transit).<\/li>\n\n\n\n<li>Use RBAC for log access.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Performance &amp; Maintenance<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Apply retention policies (e.g., delete logs &gt;90 days).<\/li>\n\n\n\n<li>Use log rotation (<code>logrotate<\/code> in Linux).<\/li>\n\n\n\n<li>Aggregate logs centrally for ease of management.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Compliance &amp; Automation<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Integrate logs into GRC dashboards.<\/li>\n\n\n\n<li>Use automated alerts for suspicious login attempts.<\/li>\n\n\n\n<li>Automate compliance reports (PCI-DSS, HIPAA) from logs.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Comparison with Alternatives<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Feature<\/th><th>ELK Stack<\/th><th>Splunk<\/th><th>Loki + Grafana<\/th><th>AWS CloudWatch<\/th><\/tr><\/thead><tbody><tr><td>Cost<\/td><td>Free, but infra heavy<\/td><td>Expensive<\/td><td>Lightweight<\/td><td>Pay-per-use<\/td><\/tr><tr><td>Scalability<\/td><td>Medium to High<\/td><td>Very High<\/td><td>High<\/td><td>Very High<\/td><\/tr><tr><td>Ease of Use<\/td><td>Moderate<\/td><td>High<\/td><td>Moderate<\/td><td>High<\/td><\/tr><tr><td>Security Focus<\/td><td>Customizable<\/td><td>Strong<\/td><td>Limited<\/td><td>Integrated<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">When to Choose Logging?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Choose <strong>structured logging<\/strong> when integrating with <strong>SIEM tools<\/strong>.<\/li>\n\n\n\n<li>Prefer <strong>cloud-native logging<\/strong> for serverless or ephemeral apps.<\/li>\n\n\n\n<li>Use <strong>ELK<\/strong> for on-prem or self-hosted environments.<\/li>\n\n\n\n<li>Use <strong>Loki<\/strong> for Kubernetes-native setups.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p><strong>Logging<\/strong> is the backbone of <strong>DevSecOps observability<\/strong>. It enables security teams to monitor, trace, and act on issues proactively. As systems become more distributed, modern logging solutions must scale, stay compliant, and integrate with security tools.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction &amp; Overview What is Logging? Logging refers to the recording of events, processes, and messages generated by software applications, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-300","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Logging in DevSecOps: A Comprehensive Guide - SRE School<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Logging in DevSecOps: A Comprehensive Guide - SRE School\" \/>\n<meta property=\"og:description\" content=\"Introduction &amp; Overview What is Logging? Logging refers to the recording of events, processes, and messages generated by software applications, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"SRE School\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-23T10:22:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-23T10:22:10+00:00\" \/>\n<meta name=\"author\" content=\"priteshgeek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"priteshgeek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/\",\"url\":\"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/\",\"name\":\"Logging in DevSecOps: A Comprehensive Guide - SRE School\",\"isPartOf\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#website\"},\"datePublished\":\"2025-06-23T10:22:09+00:00\",\"dateModified\":\"2025-06-23T10:22:10+00:00\",\"author\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\"},\"breadcrumb\":{\"@id\":\"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sreschool.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Logging in DevSecOps: A Comprehensive Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sreschool.com\/blog\/#website\",\"url\":\"https:\/\/sreschool.com\/blog\/\",\"name\":\"SRESchool\",\"description\":\"Master SRE. Build Resilient Systems. Lead the Future of Reliability\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sreschool.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\",\"name\":\"priteshgeek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"caption\":\"priteshgeek\"},\"url\":\"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Logging in DevSecOps: A Comprehensive Guide - SRE School","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/","og_locale":"en_US","og_type":"article","og_title":"Logging in DevSecOps: A Comprehensive Guide - SRE School","og_description":"Introduction &amp; Overview What is Logging? Logging refers to the recording of events, processes, and messages generated by software applications, [&hellip;]","og_url":"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/","og_site_name":"SRE School","article_published_time":"2025-06-23T10:22:09+00:00","article_modified_time":"2025-06-23T10:22:10+00:00","author":"priteshgeek","twitter_card":"summary_large_image","twitter_misc":{"Written by":"priteshgeek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/","url":"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/","name":"Logging in DevSecOps: A Comprehensive Guide - SRE School","isPartOf":{"@id":"https:\/\/sreschool.com\/blog\/#website"},"datePublished":"2025-06-23T10:22:09+00:00","dateModified":"2025-06-23T10:22:10+00:00","author":{"@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db"},"breadcrumb":{"@id":"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sreschool.com\/blog\/logging-in-devsecops-a-comprehensive-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sreschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Logging in DevSecOps: A Comprehensive Guide"}]},{"@type":"WebSite","@id":"https:\/\/sreschool.com\/blog\/#website","url":"https:\/\/sreschool.com\/blog\/","name":"SRESchool","description":"Master SRE. Build Resilient Systems. Lead the Future of Reliability","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sreschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db","name":"priteshgeek","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","caption":"priteshgeek"},"url":"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/"}]}},"_links":{"self":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":1,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/300\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}