{"id":437,"date":"2025-06-24T08:10:22","date_gmt":"2025-06-24T08:10:22","guid":{"rendered":"https:\/\/sreschool.com\/blog\/?p=437"},"modified":"2026-05-05T07:29:42","modified_gmt":"2026-05-05T07:29:42","slug":"redundancy-in-devsecops","status":"publish","type":"post","link":"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/","title":{"rendered":"Redundancy in DevSecOps"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">\ud83d\udcd8 <strong>1. Introduction &amp; Overview<\/strong><\/h1>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd0d What is Redundancy?<\/h3>\n\n\n\n<p>In the context of DevSecOps, <strong>redundancy<\/strong> refers to the strategic duplication of critical components, systems, or data to ensure <strong>reliability, availability, and fault tolerance<\/strong> in an automated, secure development and deployment pipeline.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Goal:<\/strong> Minimize downtime, prevent single points of failure, and ensure uninterrupted DevSecOps operations.<\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd70\ufe0f History or Background<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Early IT Infrastructures<\/strong>: Redundancy was applied mostly to hardware (RAID, power supplies).<\/li>\n\n\n\n<li><strong>Cloud and CI\/CD Evolution<\/strong>: The rise of containerization and cloud-native architectures brought redundancy to software, pipelines, and security.<\/li>\n\n\n\n<li><strong>DevSecOps Era<\/strong>: Redundancy now spans the full software lifecycle, ensuring <strong>secure and resilient delivery<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\ude80 Why Is It Relevant in DevSecOps?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security<\/strong>: Redundant security tools ensure protection even if one fails.<\/li>\n\n\n\n<li><strong>CI\/CD Resilience<\/strong>: Redundant pipeline stages or build runners prevent deployment failures.<\/li>\n\n\n\n<li><strong>Disaster Recovery<\/strong>: Redundant storage ensures recovery from cyberattacks or infrastructure failures.<\/li>\n\n\n\n<li><strong>Compliance<\/strong>: SLAs and regulatory standards (e.g., HIPAA, ISO 27001) often require redundant systems.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udcda <strong>2. Core Concepts &amp; Terminology<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Term<\/th><th>Definition<\/th><\/tr><\/thead><tbody><tr><td><strong>Failover<\/strong><\/td><td>Automatic switching to a redundant system upon failure.<\/td><\/tr><tr><td><strong>High Availability (HA)<\/strong><\/td><td>System design to ensure continuous operation, often via redundancy.<\/td><\/tr><tr><td><strong>Load Balancer<\/strong><\/td><td>Distributes traffic across redundant systems to prevent overload.<\/td><\/tr><tr><td><strong>Active-Active vs Active-Passive<\/strong><\/td><td>Modes of redundancy where systems are either all active or one is standby.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83e\udde9 How It Fits Into the DevSecOps Lifecycle<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>DevSecOps Phase<\/th><th>Redundancy Role<\/th><\/tr><\/thead><tbody><tr><td><strong>Plan<\/strong><\/td><td>Plan redundancy for critical resources (e.g., secrets manager, Git repo).<\/td><\/tr><tr><td><strong>Develop<\/strong><\/td><td>Use redundant code reviews, repositories (e.g., Git mirror).<\/td><\/tr><tr><td><strong>Build<\/strong><\/td><td>Redundant build servers\/runners (e.g., Jenkins agents).<\/td><\/tr><tr><td><strong>Test<\/strong><\/td><td>Redundant security scanners (e.g., multiple SAST tools).<\/td><\/tr><tr><td><strong>Release<\/strong><\/td><td>Redundant artifact repositories (e.g., Artifactory + Nexus).<\/td><\/tr><tr><td><strong>Deploy<\/strong><\/td><td>Multi-zone deployments with load balancers.<\/td><\/tr><tr><td><strong>Operate<\/strong><\/td><td>Redundant monitoring (e.g., Prometheus + Datadog).<\/td><\/tr><tr><td><strong>Monitor<\/strong><\/td><td>Alerting from multiple redundant systems (e.g., PagerDuty + Opsgenie).<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83c\udfd7\ufe0f <strong>3. Architecture &amp; How It Works<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd27 Components of Redundant DevSecOps Architecture<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Infrastructure Redundancy<\/strong>: VMs, networks, storage (multi-region, multi-AZ).<\/li>\n\n\n\n<li><strong>Tool Redundancy<\/strong>: Jenkins + GitHub Actions, SonarQube + Snyk.<\/li>\n\n\n\n<li><strong>Data Redundancy<\/strong>: Backups, replication (S3, EBS snapshots, etc).<\/li>\n\n\n\n<li><strong>Service Redundancy<\/strong>: Redundant microservices and API gateways.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd01 Internal Workflow<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>graph TD\n    Dev&#091;Developer] --&gt; CI\/CD&#091;CI\/CD Pipeline]\n    CI\/CD --&gt; SAST&#091;Redundant SAST Tools]\n    CI\/CD --&gt; Build&#091;Redundant Build Agents]\n    Build --&gt; Deploy&#091;Multi-zone Deployment]\n    Deploy --&gt; Monitor&#091;Redundant Monitoring]\n    Monitor --&gt; Alert&#091;Multi-channel Alerts]\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd0c Integration Points with CI\/CD or Cloud Tools<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Tool\/Service<\/th><th>Redundancy Strategy<\/th><\/tr><\/thead><tbody><tr><td><strong>GitHub Actions<\/strong><\/td><td>Self-hosted runners in multiple regions<\/td><\/tr><tr><td><strong>Jenkins<\/strong><\/td><td>Master-slave setup with HA failover<\/td><\/tr><tr><td><strong>Kubernetes<\/strong><\/td><td>ReplicaSets and multi-zone node pools<\/td><\/tr><tr><td><strong>AWS<\/strong><\/td><td>Auto Scaling, Multi-AZ RDS, S3 replication<\/td><\/tr><tr><td><strong>Azure DevOps<\/strong><\/td><td>Geo-redundant pipeline agents and artifact storage<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee0\ufe0f <strong>4. Installation &amp; Getting Started<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udccb Prerequisites<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Basic knowledge of CI\/CD tools like Jenkins or GitHub Actions<\/li>\n\n\n\n<li>Cloud platform access (AWS, Azure, GCP)<\/li>\n\n\n\n<li>Infrastructure as Code (IaC) experience (Terraform, Ansible)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u270d\ufe0f Hands-On Setup: Jenkins + HAProxy for Redundant Build Agents<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Step 1: Setup 2 Jenkins Build Agents<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code># On both VMs\nsudo apt update &amp;&amp; sudo apt install openjdk-11-jdk\nwget http:\/\/mirrors.jenkins.io\/war\/latest\/jenkins.war\njava -jar jenkins.war --httpPort=8080\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Step 2: Install HAProxy as a Load Balancer<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt install haproxy\n<\/code><\/pre>\n\n\n\n<p><strong>HAProxy config (<code>\/etc\/haproxy\/haproxy.cfg<\/code>):<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>frontend jenkins_front\n   bind *:8080\n   default_backend jenkins_nodes\n\nbackend jenkins_nodes\n   balance roundrobin\n   server jenkins1 192.168.1.10:8080 check\n   server jenkins2 192.168.1.11:8080 check\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Step 3: Access Jenkins via HAProxy<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visit <code>http:\/\/&lt;load-balancer-ip&gt;:8080<\/code><\/li>\n\n\n\n<li>HAProxy will distribute load across agents<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83c\udf0d <strong>5. Real-World Use Cases<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83c\udfed Use Case 1: Redundant Build System (CI\/CD Resilience)<\/h3>\n\n\n\n<p><strong>Company<\/strong>: E-commerce<br><strong>Setup<\/strong>: GitHub Actions + Jenkins (parallel)<br><strong>Benefit<\/strong>: One tool down? The other ensures delivery.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Use Case 2: Redundant Security Scanners (Shift Left Security)<\/h3>\n\n\n\n<p><strong>Company<\/strong>: FinTech<br><strong>Tools<\/strong>: SonarQube (code quality) + Snyk (vulnerability detection)<br><strong>Purpose<\/strong>: Security scanner failure won\u2019t impact releases.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udce1 Use Case 3: Redundant Monitoring &amp; Alerting<\/h3>\n\n\n\n<p><strong>Company<\/strong>: SaaS Monitoring Service<br><strong>Tools<\/strong>: Prometheus + Grafana + Datadog<br><strong>Redundancy Goal<\/strong>: Zero blind spots in observability.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83c\udfe5 Use Case 4: Healthcare Compliance<\/h3>\n\n\n\n<p><strong>Scenario<\/strong>: HIPAA-compliant redundant backups<br><strong>Tools<\/strong>: AWS S3 (primary) + Glacier (redundant)<br><strong>Reason<\/strong>: Meet medical data retention regulations.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\u2705 <strong>6. Benefits &amp; Limitations<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 Key Benefits<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>High Availability (HA)<\/li>\n\n\n\n<li>Risk Mitigation (e.g., attacks, outages)<\/li>\n\n\n\n<li>Improved Security &amp; Compliance<\/li>\n\n\n\n<li>Seamless CI\/CD pipelines<\/li>\n\n\n\n<li>Enhanced Disaster Recovery (DR)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u26a0\ufe0f Common Challenges<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Challenge<\/th><th>Mitigation Strategy<\/th><\/tr><\/thead><tbody><tr><td>Cost Overhead<\/td><td>Use auto-scaling and serverless options where possible<\/td><\/tr><tr><td>Complexity in Maintenance<\/td><td>Automate using IaC and centralized config management<\/td><\/tr><tr><td>Synchronization Issues<\/td><td>Use distributed databases with ACID compliance<\/td><\/tr><tr><td>Monitoring Multiple Layers<\/td><td>Use observability stacks with correlation capabilities<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 <strong>7. Best Practices &amp; Recommendations<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd10 Security Tips<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use <strong>redundant secrets managers<\/strong> (e.g., Vault + AWS Secrets Manager)<\/li>\n\n\n\n<li>Encrypt all backups and replicated data<\/li>\n\n\n\n<li>Enable logging on both primary and redundant systems<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u2699\ufe0f Performance &amp; Maintenance<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regularly test failovers and DR scenarios<\/li>\n\n\n\n<li>Automate redundancy setup with <strong>Terraform modules<\/strong><\/li>\n\n\n\n<li>Use <strong>immutable infrastructure<\/strong> for fast re-provisioning<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83e\uddfe Compliance &amp; Automation Ideas<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use compliance-as-code (e.g., OPA\/Gatekeeper)<\/li>\n\n\n\n<li>Automate backups and audits using cron jobs in CI\/CD<\/li>\n\n\n\n<li>Document redundant paths in change management workflows<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd04 <strong>8. Comparison with Alternatives<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Feature \/ Approach<\/th><th>Redundancy<\/th><th>Auto-Scaling<\/th><th>Clustering<\/th><\/tr><\/thead><tbody><tr><td><strong>Goal<\/strong><\/td><td>Fault Tolerance<\/td><td>Performance Optimization<\/td><td>Load Distribution<\/td><\/tr><tr><td><strong>Setup Complexity<\/strong><\/td><td>Medium<\/td><td>Medium<\/td><td>High<\/td><\/tr><tr><td><strong>Failure Recovery<\/strong><\/td><td>Automatic (with failover)<\/td><td>Not guaranteed<\/td><td>Depends on setup<\/td><\/tr><tr><td><strong>Example Tools<\/strong><\/td><td>HAProxy, Route53 Failover<\/td><td>Kubernetes HPA, AWS ASG<\/td><td>Kafka, Redis Cluster<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd0d When to Choose Redundancy<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>When <strong>system uptime<\/strong> is critical<\/li>\n\n\n\n<li>When handling <strong>sensitive or regulated data<\/strong><\/li>\n\n\n\n<li>When requiring <strong>geographic resilience<\/strong> (multi-region)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd1a <strong>9. Conclusion<\/strong><\/h2>\n\n\n\n<p>Redundancy is <strong>not just a DevOps best practice\u2014it\u2019s a DevSecOps necessity<\/strong>. From safeguarding build pipelines to ensuring secure and continuous operations, redundancy improves reliability, security, and compliance.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udcd8 1. Introduction &amp; Overview \ud83d\udd0d What is Redundancy? In the context of DevSecOps, redundancy refers to the strategic duplication [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-437","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Redundancy in DevSecOps - SRE School<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Redundancy in DevSecOps - SRE School\" \/>\n<meta property=\"og:description\" content=\"\ud83d\udcd8 1. Introduction &amp; Overview \ud83d\udd0d What is Redundancy? In the context of DevSecOps, redundancy refers to the strategic duplication [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/\" \/>\n<meta property=\"og:site_name\" content=\"SRE School\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T08:10:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T07:29:42+00:00\" \/>\n<meta name=\"author\" content=\"priteshgeek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"priteshgeek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/\",\"url\":\"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/\",\"name\":\"Redundancy in DevSecOps - SRE School\",\"isPartOf\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#website\"},\"datePublished\":\"2025-06-24T08:10:22+00:00\",\"dateModified\":\"2026-05-05T07:29:42+00:00\",\"author\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\"},\"breadcrumb\":{\"@id\":\"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sreschool.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Redundancy in DevSecOps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sreschool.com\/blog\/#website\",\"url\":\"https:\/\/sreschool.com\/blog\/\",\"name\":\"SRESchool\",\"description\":\"Master SRE. Build Resilient Systems. Lead the Future of Reliability\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sreschool.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\",\"name\":\"priteshgeek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"caption\":\"priteshgeek\"},\"url\":\"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Redundancy in DevSecOps - SRE School","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/","og_locale":"en_US","og_type":"article","og_title":"Redundancy in DevSecOps - SRE School","og_description":"\ud83d\udcd8 1. Introduction &amp; Overview \ud83d\udd0d What is Redundancy? In the context of DevSecOps, redundancy refers to the strategic duplication [&hellip;]","og_url":"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/","og_site_name":"SRE School","article_published_time":"2025-06-24T08:10:22+00:00","article_modified_time":"2026-05-05T07:29:42+00:00","author":"priteshgeek","twitter_card":"summary_large_image","twitter_misc":{"Written by":"priteshgeek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/","url":"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/","name":"Redundancy in DevSecOps - SRE School","isPartOf":{"@id":"https:\/\/sreschool.com\/blog\/#website"},"datePublished":"2025-06-24T08:10:22+00:00","dateModified":"2026-05-05T07:29:42+00:00","author":{"@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db"},"breadcrumb":{"@id":"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sreschool.com\/blog\/redundancy-in-devsecops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sreschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Redundancy in DevSecOps"}]},{"@type":"WebSite","@id":"https:\/\/sreschool.com\/blog\/#website","url":"https:\/\/sreschool.com\/blog\/","name":"SRESchool","description":"Master SRE. Build Resilient Systems. Lead the Future of Reliability","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sreschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db","name":"priteshgeek","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","caption":"priteshgeek"},"url":"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/"}]}},"_links":{"self":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/comments?post=437"}],"version-history":[{"count":1,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/437\/revisions"}],"predecessor-version":[{"id":438,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/437\/revisions\/438"}],"wp:attachment":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/media?parent=437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/categories?post=437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/tags?post=437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}