{"id":445,"date":"2025-06-24T08:51:50","date_gmt":"2025-06-24T08:51:50","guid":{"rendered":"https:\/\/sreschool.com\/blog\/?p=445"},"modified":"2026-05-05T07:29:42","modified_gmt":"2026-05-05T07:29:42","slug":"load-shedding-in-devsecops-a-complete-tutorial","status":"publish","type":"post","link":"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/","title":{"rendered":"Load Shedding in DevSecOps: A Complete Tutorial"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\"><strong>1. Introduction &amp; Overview<\/strong><\/h1>\n\n\n\n<h3 class=\"wp-block-heading\">What is Load Shedding?<\/h3>\n\n\n\n<p><strong>Load Shedding<\/strong> in software systems refers to the <strong>intentional dropping of lower-priority requests or workloads<\/strong> to protect the overall system from overload or failure. This approach ensures that <strong>critical operations remain functional<\/strong>, even when system resources are heavily constrained.<\/p>\n\n\n\n<p>In the context of <strong>DevSecOps<\/strong>, load shedding helps ensure system <strong>resilience<\/strong>, <strong>security under stress<\/strong>, and <strong>compliance with SLAs (Service Level Agreements)<\/strong>, particularly during high load or attacks such as DDoS.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">History or Background<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Origin<\/strong>: Originally a power grid concept, &#8220;load shedding&#8221; was adapted into distributed computing for <strong>gracefully degrading service<\/strong> during load spikes.<\/li>\n\n\n\n<li><strong>Adopted by cloud platforms<\/strong> (e.g., Netflix OSS, Google SRE) to <strong>prevent system crashes<\/strong> during scaling events or cyberattacks.<\/li>\n\n\n\n<li>Became a key technique in <strong>modern reliability engineering<\/strong> and <strong>DevSecOps resilience strategies<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Why Is It Relevant in DevSecOps?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Prevents <strong>resource starvation attacks<\/strong><\/li>\n\n\n\n<li>Ensures <strong>continuous security checks<\/strong> even under pressure<\/li>\n\n\n\n<li>Maintains <strong>compliance SLAs<\/strong> for high-priority users<\/li>\n\n\n\n<li>Avoids <strong>data corruption<\/strong> by dropping unsafe requests under pressure<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2. Core Concepts &amp; Terminology<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Key Terms and Definitions<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Term<\/th><th>Definition<\/th><\/tr><\/thead><tbody><tr><td>Load Shedding<\/td><td>Intentionally rejecting requests to protect system health<\/td><\/tr><tr><td>Circuit Breaker<\/td><td>A pattern that stops traffic flow to failing components<\/td><\/tr><tr><td>Rate Limiting<\/td><td>Controls how many requests a client can send<\/td><\/tr><tr><td>Graceful Degradation<\/td><td>Maintaining core functionality while limiting others<\/td><\/tr><tr><td>Backpressure<\/td><td>Technique to control data flow to prevent overload<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">How it Fits into the DevSecOps Lifecycle<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Phase<\/th><th>Role of Load Shedding<\/th><\/tr><\/thead><tbody><tr><td><strong>Plan<\/strong><\/td><td>Design for failure<\/td><\/tr><tr><td><strong>Develop<\/strong><\/td><td>Code fallback logic<\/td><\/tr><tr><td><strong>Build<\/strong><\/td><td>Automate stress tests<\/td><\/tr><tr><td><strong>Test<\/strong><\/td><td>Include performance + chaos scenarios<\/td><\/tr><tr><td><strong>Release<\/strong><\/td><td>Deploy with feature flags<\/td><\/tr><tr><td><strong>Deploy<\/strong><\/td><td>Configure load-shedding thresholds<\/td><\/tr><tr><td><strong>Operate<\/strong><\/td><td>Monitor real-time health<\/td><\/tr><tr><td><strong>Secure<\/strong><\/td><td>Prevent overload-based denial-of-service<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. Architecture &amp; How It Works<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Components<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Load Monitor<\/strong>: Monitors CPU, memory, latency<\/li>\n\n\n\n<li><strong>Load Shedding Policy<\/strong>: Defines when and what to shed<\/li>\n\n\n\n<li><strong>Priority Queue Manager<\/strong>: Decides which requests to drop<\/li>\n\n\n\n<li><strong>Fallback Services<\/strong>: Optional degraded services<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Internal Workflow<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>flowchart LR\nA&#091;Incoming Requests] --&gt; B{Check System Load}\nB --&gt;|Healthy| C&#091;Process Request]\nB --&gt;|Overloaded| D{Request Priority}\nD --&gt;|Low| E&#091;Drop Request]\nD --&gt;|High| F&#091;Route to Fallback or Retry]\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Integration Points with CI\/CD or Cloud Tools<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Tool<\/th><th>Integration<\/th><\/tr><\/thead><tbody><tr><td><strong>Kubernetes<\/strong><\/td><td>HPA + Istio + Retry Budget with Load Shedding filters<\/td><\/tr><tr><td><strong>Istio \/ Envoy<\/strong><\/td><td>Built-in load shedding via outlier detection<\/td><\/tr><tr><td><strong>AWS \/ GCP \/ Azure<\/strong><\/td><td>Auto-scaling, throttling policies, App Gateway<\/td><\/tr><tr><td><strong>GitHub Actions<\/strong><\/td><td>Can trigger load tests during CI<\/td><\/tr><tr><td><strong>Prometheus + Alertmanager<\/strong><\/td><td>Monitoring CPU\/mem to trigger actions<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>4. Installation &amp; Getting Started<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Basic Setup or Prerequisites<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Kubernetes cluster or microservice architecture<\/li>\n\n\n\n<li>Istio or Envoy proxy setup<\/li>\n\n\n\n<li>Observability: Prometheus, Grafana<\/li>\n\n\n\n<li>CI\/CD pipeline for test\/deploy automation<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Step-by-Step: Load Shedding with Envoy Proxy (Basic)<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Install Envoy<\/strong><\/li>\n\n\n\n<li><strong>Configure a basic filter<\/strong> in your Envoy YAML:<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code>overload_manager:\n  refresh_interval: 0.25s\n  resource_monitors:\n    - name: \"envoy.resource_monitors.fixed_heap\"\n      typed_config:\n        \"@type\": type.googleapis.com\/envoy.extensions.resource_monitors.fixed_heap.v3.FixedHeapConfig\n        max_heap_size_bytes: 2147483648\n  actions:\n    - name: \"envoy.overload_actions.shed_load\"\n      triggers:\n        - name: \"envoy.resource_monitors.fixed_heap\"\n          threshold:\n            value: 0.95\n<\/code><\/pre>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Test with Load Generator<\/strong> like <code>hey<\/code> or <code>wrk<\/code>:<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code>hey -n 100000 -c 100 http:\/\/your-service-url\n<\/code><\/pre>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><strong>Observe behavior<\/strong> in logs and dashboards.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>5. Real-World Use Cases<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Use Case 1: Security Under Load<\/h3>\n\n\n\n<p>During a penetration test, <strong>load spikes<\/strong> occur. Load shedding ensures authentication and logging services remain live while rate-limiting low-priority scan traffic.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use Case 2: Multi-Tenant SaaS<\/h3>\n\n\n\n<p>SaaS app for enterprise users gives <strong>SLAs<\/strong> to premium customers. Load shedding deprioritizes free-tier users during resource contention.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use Case 3: Healthcare System<\/h3>\n\n\n\n<p>A hospital management system during a pandemic sees traffic spikes. Non-critical features like report download are temporarily shed to maintain <strong>EMR updates<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use Case 4: E-commerce DDoS Mitigation<\/h3>\n\n\n\n<p>During a flash sale, bot traffic causes overload. System uses <strong>load shedding + CAPTCHA + rate limiting<\/strong> to ensure genuine user access.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>6. Benefits &amp; Limitations<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Key Advantages<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Maintains <strong>system stability under stress<\/strong><\/li>\n\n\n\n<li>Supports <strong>zero-downtime availability goals<\/strong><\/li>\n\n\n\n<li>Improves <strong>QoS<\/strong> for premium users<\/li>\n\n\n\n<li>Easy to integrate with <strong>SRE, DevSecOps<\/strong>, and <strong>Zero Trust<\/strong><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Common Challenges<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Risk of <strong>unintended service denial<\/strong> to legit users<\/li>\n\n\n\n<li>Requires <strong>accurate priority definition<\/strong><\/li>\n\n\n\n<li>Needs careful <strong>testing in staging\/stress environments<\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>7. Best Practices &amp; Recommendations<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Security &amp; Performance<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Always <strong>log<\/strong> shed requests for audit<\/li>\n\n\n\n<li>Add <strong>fallback services<\/strong> where possible<\/li>\n\n\n\n<li>Integrate with <strong>WAF or API gateway rules<\/strong><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Maintenance<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use <strong>feature flags<\/strong> to enable\/disable policies<\/li>\n\n\n\n<li>Regularly <strong>update thresholds<\/strong> based on metrics<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Compliance<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Avoid shedding <strong>audit<\/strong>, <strong>encryption<\/strong>, or <strong>PII access services<\/strong><\/li>\n\n\n\n<li>Ensure <strong>logs are preserved<\/strong> for compliance audits<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Automation Ideas<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Auto-enable shedding when <strong>latency &gt; 500ms<\/strong><\/li>\n\n\n\n<li>Send <strong>alerts<\/strong> if load shedding exceeds 5% of total traffic<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>8. Comparison with Alternatives<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Feature<\/th><th>Load Shedding<\/th><th>Rate Limiting<\/th><th>Circuit Breaker<\/th><\/tr><\/thead><tbody><tr><td>Focus<\/td><td>System health<\/td><td>Per-client fairness<\/td><td>Service isolation<\/td><\/tr><tr><td>Granularity<\/td><td>Request-level<\/td><td>IP\/user-level<\/td><td>Service-level<\/td><\/tr><tr><td>Priority Support<\/td><td>\u2705<\/td><td>\u274c<\/td><td>\u274c<\/td><\/tr><tr><td>Stateful Decisions<\/td><td>\u2705<\/td><td>\u274c<\/td><td>\u2705<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">When to Choose Load Shedding<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You need <strong>smart shedding<\/strong> based on <strong>system health<\/strong><\/li>\n\n\n\n<li>You want to <strong>preserve core security services<\/strong><\/li>\n\n\n\n<li>You&#8217;re dealing with <strong>burst attacks or Black Friday events<\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>9. Conclusion<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Final Thoughts<\/h3>\n\n\n\n<p>Load shedding is a <strong>critical reliability and security feature<\/strong> in DevSecOps for ensuring that your systems remain <strong>available, secure, and compliant<\/strong> even under extreme load.<\/p>\n\n\n\n<p>Incorporating load shedding into your pipeline and runtime can <strong>save your application<\/strong> from downtime, <strong>protect your users<\/strong>, and <strong>preserve trust<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Future Trends<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>AI-driven shedding policies<\/strong><\/li>\n\n\n\n<li><strong>Dynamic SLA-aware routing<\/strong><\/li>\n\n\n\n<li><strong>Integration with service mesh security contexts<\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Introduction &amp; Overview What is Load Shedding? Load Shedding in software systems refers to the intentional dropping of lower-priority [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-445","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Load Shedding in DevSecOps: A Complete Tutorial - SRE School<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Load Shedding in DevSecOps: A Complete Tutorial - SRE School\" \/>\n<meta property=\"og:description\" content=\"1. Introduction &amp; Overview What is Load Shedding? Load Shedding in software systems refers to the intentional dropping of lower-priority [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/\" \/>\n<meta property=\"og:site_name\" content=\"SRE School\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T08:51:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T07:29:42+00:00\" \/>\n<meta name=\"author\" content=\"priteshgeek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"priteshgeek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/\",\"url\":\"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/\",\"name\":\"Load Shedding in DevSecOps: A Complete Tutorial - SRE School\",\"isPartOf\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#website\"},\"datePublished\":\"2025-06-24T08:51:50+00:00\",\"dateModified\":\"2026-05-05T07:29:42+00:00\",\"author\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\"},\"breadcrumb\":{\"@id\":\"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sreschool.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Load Shedding in DevSecOps: A Complete Tutorial\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sreschool.com\/blog\/#website\",\"url\":\"https:\/\/sreschool.com\/blog\/\",\"name\":\"SRESchool\",\"description\":\"Master SRE. Build Resilient Systems. Lead the Future of Reliability\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sreschool.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\",\"name\":\"priteshgeek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"caption\":\"priteshgeek\"},\"url\":\"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Load Shedding in DevSecOps: A Complete Tutorial - SRE School","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/","og_locale":"en_US","og_type":"article","og_title":"Load Shedding in DevSecOps: A Complete Tutorial - SRE School","og_description":"1. Introduction &amp; Overview What is Load Shedding? Load Shedding in software systems refers to the intentional dropping of lower-priority [&hellip;]","og_url":"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/","og_site_name":"SRE School","article_published_time":"2025-06-24T08:51:50+00:00","article_modified_time":"2026-05-05T07:29:42+00:00","author":"priteshgeek","twitter_card":"summary_large_image","twitter_misc":{"Written by":"priteshgeek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/","url":"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/","name":"Load Shedding in DevSecOps: A Complete Tutorial - SRE School","isPartOf":{"@id":"https:\/\/sreschool.com\/blog\/#website"},"datePublished":"2025-06-24T08:51:50+00:00","dateModified":"2026-05-05T07:29:42+00:00","author":{"@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db"},"breadcrumb":{"@id":"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sreschool.com\/blog\/load-shedding-in-devsecops-a-complete-tutorial\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sreschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Load Shedding in DevSecOps: A Complete Tutorial"}]},{"@type":"WebSite","@id":"https:\/\/sreschool.com\/blog\/#website","url":"https:\/\/sreschool.com\/blog\/","name":"SRESchool","description":"Master SRE. Build Resilient Systems. Lead the Future of Reliability","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sreschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db","name":"priteshgeek","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","caption":"priteshgeek"},"url":"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/"}]}},"_links":{"self":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/comments?post=445"}],"version-history":[{"count":1,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/445\/revisions"}],"predecessor-version":[{"id":446,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/445\/revisions\/446"}],"wp:attachment":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/media?parent=445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/categories?post=445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/tags?post=445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}