{"id":304,"date":"2025-06-23T10:29:23","date_gmt":"2025-06-23T10:29:23","guid":{"rendered":"http:\/\/sreschool.com\/blog\/?p=304"},"modified":"2025-06-23T10:29:25","modified_gmt":"2025-06-23T10:29:25","slug":"telemetry-in-devsecops-a-complete-guide","status":"publish","type":"post","link":"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/","title":{"rendered":"Telemetry in DevSecOps: A Complete Guide"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">1. Introduction &amp; Overview<\/h1>\n\n\n\n<h3 class=\"wp-block-heading\">What is Telemetry?<\/h3>\n\n\n\n<p><strong>Telemetry<\/strong> refers to the automated collection, transmission, and analysis of data from remote or distributed systems to monitor and optimize performance, security, and behavior in real-time.<\/p>\n\n\n\n<p>In <strong>DevSecOps<\/strong>, telemetry plays a crucial role in <strong>observability, compliance, threat detection<\/strong>, and <strong>performance tracking<\/strong> throughout the CI\/CD lifecycle.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">History or Background<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Originated in <strong>aerospace and automotive engineering<\/strong> to monitor remote assets.<\/li>\n\n\n\n<li>Adopted in <strong>IT operations (ITOps)<\/strong> for infrastructure monitoring.<\/li>\n\n\n\n<li>Evolved into <strong>observability frameworks<\/strong> (like OpenTelemetry) for <strong>cloud-native<\/strong> and <strong>DevSecOps ecosystems<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Why It\u2019s Relevant in DevSecOps<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensures <strong>continuous visibility<\/strong> into code, infrastructure, and security states.<\/li>\n\n\n\n<li>Supports <strong>shift-left<\/strong> and <strong>shift-right security practices<\/strong>.<\/li>\n\n\n\n<li>Helps maintain <strong>audit trails<\/strong>, <strong>SLAs<\/strong>, and <strong>incident response readiness<\/strong>.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">2. Core Concepts &amp; Terminology<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Key Terms and Definitions<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Term<\/th><th>Definition<\/th><\/tr><\/thead><tbody><tr><td><strong>Metrics<\/strong><\/td><td>Numeric values representing system states (e.g., CPU usage).<\/td><\/tr><tr><td><strong>Logs<\/strong><\/td><td>Time-stamped records of system events.<\/td><\/tr><tr><td><strong>Traces<\/strong><\/td><td>End-to-end paths of a request across distributed systems.<\/td><\/tr><tr><td><strong>OpenTelemetry<\/strong><\/td><td>Open standard to collect, process, and export telemetry data.<\/td><\/tr><tr><td><strong>Instrumentation<\/strong><\/td><td>Code or agent used to emit telemetry data.<\/td><\/tr><tr><td><strong>Observability<\/strong><\/td><td>The ability to measure internal states by examining outputs.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">How Telemetry Fits in the DevSecOps Lifecycle<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>DevSecOps Phase<\/th><th>Telemetry Role<\/th><\/tr><\/thead><tbody><tr><td><strong>Plan<\/strong><\/td><td>Identify telemetry needs for compliance\/security.<\/td><\/tr><tr><td><strong>Develop<\/strong><\/td><td>Instrument code with logging and tracing hooks.<\/td><\/tr><tr><td><strong>Build\/Test<\/strong><\/td><td>Collect telemetry from test runs and vulnerabilities.<\/td><\/tr><tr><td><strong>Deploy<\/strong><\/td><td>Monitor deployments and drift detection.<\/td><\/tr><tr><td><strong>Operate<\/strong><\/td><td>Real-time system monitoring, anomaly detection.<\/td><\/tr><tr><td><strong>Secure<\/strong><\/td><td>Alerting on suspicious behavior, forensics.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">3. Architecture &amp; How It Works<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Components of a Telemetry System<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Instrumented Services<\/strong>: Application code emitting data.<\/li>\n\n\n\n<li><strong>Agents\/Collectors<\/strong>: Tools like Fluentd, Beats, or OpenTelemetry Collector.<\/li>\n\n\n\n<li><strong>Telemetry Backend<\/strong>: Aggregates and stores data (e.g., Prometheus, ELK).<\/li>\n\n\n\n<li><strong>Visualization<\/strong>: Tools like Grafana, Kibana, or Datadog dashboards.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Internal Workflow<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>graph TD\nA&#091;Code\/Application] --&gt; B&#091;Telemetry Agent]\nB --&gt; C&#091;Data Collector]\nC --&gt; D&#091;Storage &amp; Analysis Backend]\nD --&gt; E&#091;Dashboards \/ Alerts \/ Integrations]\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Integration Points with CI\/CD or Cloud Tools<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Tool<\/th><th>Integration Use<\/th><\/tr><\/thead><tbody><tr><td><strong>Jenkins\/GitHub Actions<\/strong><\/td><td>Collect pipeline metrics (e.g., success rate, duration).<\/td><\/tr><tr><td><strong>Terraform<\/strong><\/td><td>Telemetry for drift detection or compliance.<\/td><\/tr><tr><td><strong>Kubernetes<\/strong><\/td><td>Prometheus + OpenTelemetry for pod-level visibility.<\/td><\/tr><tr><td><strong>AWS\/Azure\/GCP<\/strong><\/td><td>Native support for logs, metrics, and traces.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">4. Installation &amp; Getting Started<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Prerequisites<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A containerized or microservices-based application.<\/li>\n\n\n\n<li>Docker\/Kubernetes cluster (optional but common).<\/li>\n\n\n\n<li>Basic Linux and networking knowledge.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Example: Setup OpenTelemetry + Prometheus + Grafana<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Step 1: Run OpenTelemetry Collector<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>docker run -p 4317:4317 \\\n  -v $(pwd)\/otel-config.yaml:\/otel-config.yaml \\\n  otel\/opentelemetry-collector:latest \\\n  --config otel-config.yaml\n<\/code><\/pre>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><code>otel-config.yaml<\/code> should define receivers (like OTLP), processors, and exporters.<\/p>\n<\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\">Step 2: Instrument Application Code<\/h4>\n\n\n\n<p><strong>Example in Python:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>from opentelemetry import trace\nfrom opentelemetry.sdk.trace import TracerProvider\n\ntrace.set_tracer_provider(TracerProvider())\ntracer = trace.get_tracer(__name__)\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Step 3: Setup Prometheus and Grafana<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure Prometheus to scrape metrics.<\/li>\n\n\n\n<li>Import Grafana dashboard (via JSON) to visualize.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">5. Real-World Use Cases<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. <strong>Security Monitoring in Kubernetes<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Track unexpected port changes or container restarts.<\/li>\n\n\n\n<li>Alert if unauthorized SSH traffic detected on pods.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2. <strong>Supply Chain Security<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitor CI pipeline stages and sign telemetry artifacts (SLSA framework).<\/li>\n\n\n\n<li>Trace origin of malicious artifacts using trace ID.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. <strong>Incident Response &amp; Forensics<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use logs + traces to pinpoint origin of DDoS or exploit.<\/li>\n\n\n\n<li>Replay attack using captured telemetry timeline.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">4. <strong>Regulatory Compliance (e.g., HIPAA, SOC 2)<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Telemetry provides auditable trails for security events.<\/li>\n\n\n\n<li>Helps demonstrate control effectiveness and detect anomalies.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">6. Benefits &amp; Limitations<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Key Advantages<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\ud83d\udd0d <strong>End-to-end observability<\/strong> across services.<\/li>\n\n\n\n<li>\u26a1 <strong>Fast root cause analysis<\/strong> using trace correlation.<\/li>\n\n\n\n<li>\ud83d\udcca <strong>Improved performance<\/strong> with real-time tuning.<\/li>\n\n\n\n<li>\ud83d\udd10 <strong>Security insights<\/strong> through behavioral telemetry.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Common Limitations<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\ud83d\udcc9 <strong>Data overload<\/strong> without proper filters.<\/li>\n\n\n\n<li>\u2699\ufe0f <strong>Complex setup<\/strong> for multi-cloud or hybrid infra.<\/li>\n\n\n\n<li>\ud83d\udcb8 <strong>Costly at scale<\/strong> (especially with commercial backends).<\/li>\n\n\n\n<li>\ud83d\udd10 <strong>Sensitive data risks<\/strong> if not anonymized or encrypted.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">7. Best Practices &amp; Recommendations<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Security &amp; Compliance Tips<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use <strong>TLS encryption<\/strong> for all telemetry data.<\/li>\n\n\n\n<li><strong>Anonymize PII<\/strong> before exporting data.<\/li>\n\n\n\n<li>Align with <strong>NIST SP 800-92<\/strong> or <strong>SOC 2<\/strong> standards.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Automation &amp; Maintenance<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automate alerts and anomaly responses.<\/li>\n\n\n\n<li>Rotate log storage and backup regularly.<\/li>\n\n\n\n<li>Monitor telemetry pipeline health itself.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">8. Comparison with Alternatives<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Feature<\/th><th>Telemetry (e.g., OpenTelemetry)<\/th><th>Traditional Monitoring<\/th><th>APM Tools (e.g., New Relic)<\/th><\/tr><\/thead><tbody><tr><td>Custom Instrumentation<\/td><td>\u2705 High<\/td><td>\u274c Limited<\/td><td>\u2705 Medium<\/td><\/tr><tr><td>Cost<\/td><td>\ud83d\udcb2 Open source<\/td><td>\ud83d\udcb2 Free\/OSS<\/td><td>\ud83d\udcb0 Expensive<\/td><\/tr><tr><td>Vendor Lock-in<\/td><td>\u274c No<\/td><td>\u274c No<\/td><td>\u2705 Often<\/td><\/tr><tr><td>Security Use Case<\/td><td>\u2705 Strong<\/td><td>\u26a0\ufe0f Weak<\/td><td>\u2705 Medium<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>When to choose telemetry:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For <strong>custom microservices<\/strong>, <strong>cloud-native<\/strong> apps, or <strong>security-first observability<\/strong>.<\/li>\n\n\n\n<li>When <strong>compliance and traceability<\/strong> are non-negotiable.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">9. Conclusion<\/h2>\n\n\n\n<p>Telemetry is not just about logs\u2014it is the <strong>nervous system of your DevSecOps pipeline<\/strong>. It enables proactive security, observability, and decision-making at scale.<\/p>\n\n\n\n<p>As systems grow more <strong>distributed and complex<\/strong>, telemetry is becoming <strong>indispensable<\/strong> in building secure, compliant, and efficient delivery workflows.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Introduction &amp; Overview What is Telemetry? Telemetry refers to the automated collection, transmission, and analysis of data from remote [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-304","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Telemetry in DevSecOps: A Complete Guide - SRE School<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Telemetry in DevSecOps: A Complete Guide - SRE School\" \/>\n<meta property=\"og:description\" content=\"1. Introduction &amp; Overview What is Telemetry? Telemetry refers to the automated collection, transmission, and analysis of data from remote [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"SRE School\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-23T10:29:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-23T10:29:25+00:00\" \/>\n<meta name=\"author\" content=\"priteshgeek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"priteshgeek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/\",\"url\":\"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/\",\"name\":\"Telemetry in DevSecOps: A Complete Guide - SRE School\",\"isPartOf\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#website\"},\"datePublished\":\"2025-06-23T10:29:23+00:00\",\"dateModified\":\"2025-06-23T10:29:25+00:00\",\"author\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\"},\"breadcrumb\":{\"@id\":\"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sreschool.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Telemetry in DevSecOps: A Complete Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sreschool.com\/blog\/#website\",\"url\":\"https:\/\/sreschool.com\/blog\/\",\"name\":\"SRESchool\",\"description\":\"Master SRE. Build Resilient Systems. Lead the Future of Reliability\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sreschool.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\",\"name\":\"priteshgeek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"caption\":\"priteshgeek\"},\"url\":\"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Telemetry in DevSecOps: A Complete Guide - SRE School","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/","og_locale":"en_US","og_type":"article","og_title":"Telemetry in DevSecOps: A Complete Guide - SRE School","og_description":"1. Introduction &amp; Overview What is Telemetry? Telemetry refers to the automated collection, transmission, and analysis of data from remote [&hellip;]","og_url":"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/","og_site_name":"SRE School","article_published_time":"2025-06-23T10:29:23+00:00","article_modified_time":"2025-06-23T10:29:25+00:00","author":"priteshgeek","twitter_card":"summary_large_image","twitter_misc":{"Written by":"priteshgeek","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/","url":"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/","name":"Telemetry in DevSecOps: A Complete Guide - SRE School","isPartOf":{"@id":"https:\/\/sreschool.com\/blog\/#website"},"datePublished":"2025-06-23T10:29:23+00:00","dateModified":"2025-06-23T10:29:25+00:00","author":{"@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db"},"breadcrumb":{"@id":"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sreschool.com\/blog\/telemetry-in-devsecops-a-complete-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sreschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Telemetry in DevSecOps: A Complete Guide"}]},{"@type":"WebSite","@id":"https:\/\/sreschool.com\/blog\/#website","url":"https:\/\/sreschool.com\/blog\/","name":"SRESchool","description":"Master SRE. Build Resilient Systems. Lead the Future of Reliability","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sreschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db","name":"priteshgeek","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","caption":"priteshgeek"},"url":"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/"}]}},"_links":{"self":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":1,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/304\/revisions"}],"predecessor-version":[{"id":305,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/304\/revisions\/305"}],"wp:attachment":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/media?parent=304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/categories?post=304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/tags?post=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}