Operations Anti-patterns, DevOps Solutions by Jeffery D. Smith
Author:Jeffery D. Smith [Smith, Jeffery D.]
Language: eng
Format: epub
Publisher: Manning Publications Co.
Published: 0101-01-01T00:00:00+00:00
7.7.3 Complexity in tasks
All problems and their subsequent tasks have varying levels of complexity. Cooking is a perfect example. Iâm a lousy cook. But depending on what Iâm cooking, various levels of complexity may exist. Cooking chicken tenders is much simpler than cooking raw chicken.
Being able to order and categorize the complexity of a task has value because it gives us a starting point to think about how the task is approached. You donât need a ton of prep work to cook chicken tenders, but you might add a little extra time when cooking raw chicken for the first time.
To understand these issues a bit better, it often helps to use a framework of some sort to understand and give language to concepts. For this case, Iâll borrow from David Snowdenâs Cynefin framework.1
NOTE The Cynefin framework, used as a decision-making tool, offers various domains. The definitions for his domains apply to this complexity conversation.
The Cynefin framework allows you to place the complexity of the problem into one of four contexts. The names for these contexts are simple, complicated, complex, and chaotic. For teaching purposes, Iâm going to limit my usage to the first three contexts because addressing the chaotic is probably worth its own book and not something that general automation tips could reliably reason about.
Simple tasks
Simple tasks are those that have a handful of variables, but those variables are well-known and well understood. The way the values of the variables impact the necessary steps is also well understood.
An example might be installing a new piece of software. The variables might be your operating system type and the version of the operating system youâre running. Both variables, when changed, might impact the steps that you need to take to get the software installed. But because these values and their impact are well understood, they can be enumerated and documented ahead of time to help someone install the software for all supported operating system types.
As an example, the steps to download database software differ based on your operating system. If youâre using the RedHat-based operating system, you might need to download and install the software via an RPM package. If youâre using Windows Server, you might download an MSI installer. Despite these being two different methods to get the software installed, their steps are still well understood and can be detailed ahead of time.
Complicated tasks
Complicated tasks have numerous steps that are not easy or straightforward. They require various levels of expertise, but once youâve done it, the task is often repeatable. An example might be manually promoting a database server from a secondary to the primary. Several steps require gathering more information as input to later tasks, so distilling the steps into simple tasks can be somewhat difficult.
Using the database server promotion example, you might have several decision points. If the slave database server you intend to promote is not fully in sync with the master, you might need to take a series of actions that then alter the steps necessary to perform the database promotion.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6815)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6815)
Running Windows Containers on AWS by Marcio Morales(6332)
Kotlin in Action by Dmitry Jemerov(5089)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5055)
Combating Crime on the Dark Web by Nearchos Nearchou(4630)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4585)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4319)
The Age of Surveillance Capitalism by Shoshana Zuboff(3978)
Python for Security and Networking - Third Edition by José Manuel Ortega(3881)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3539)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3501)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3355)
Blockchain Basics by Daniel Drescher(3322)
