A. Specific error budgets for services
B. Alerting based on SLO breaches
C. SLOs based on infrastructure metrics only
D. Time windows for SLO evaluation
A. Separate retention settings for high-frequency endpoints
B. Uniform retention period for all traces
C. Retention duration for error traces
D. Increased retention for traces linked to incidents
A. Upgrading all components simultaneously to save time
B. Ignoring deprecated features and compatibility warnings
C. Developing a comprehensive rollback plan in case of issues
D. Immediately implementing the upgrade in production without testing
A. To centralize all code in a single location
B. To decrease network transparency
C. To ensure all services use the same programming language
D. To enhance traceability and debugging across services
A. Set overly stringent SLOs to ensure high performance at all times, regardless of actual load, to account for unexpected spikes in demand and ensure that real-time processing requirements are always met.
B. Maintain static SLOs throughout, ignoring variable load patterns and focusing only on maintaining a consistent baseline for performance and availability.
C. Establish tiered SLOs that define different levels of service expectations during identified peak and off-peak periods, with stricter SLOs applied during peak times to address real-time processing needs and more relaxed SLOs during off-peak times to optimize resource usage.
D. Adjust SLOs dynamically based on predicted load patterns, using historical data to forecast high-load periods and relaxing SLOs during low-load times to allow for system maintenance and updates.
A. Integrating SLOs with incident management systems
B. Utilizing AI to adjust SLOs based on learning patterns
C. Establishing separate SLOs for each team within an organization
D. Regularly reviewing and adjusting SLOs to reflect changing business needs
A. Rebooting the entire network infrastructure
B. Uninstalling and reinstalling all software
C. Verifying network connectivity
D. Ignoring the issue, hoping it resolves itself
A. To reduce the system's memory usage
B. To ensure user convenience
C. To increase network bandwidth
D. To prevent unauthorized access from outdated passwords
A. To slow down the development process
B. To automate building, testing, and deployment processes
C. To limit communication between development and operations teams
D. To decrease code quality
A. If all other connectivity checks and configurations are correct but issues persist
B. To ensure the agent experiences as much downtime as possible
C. As a first response to any complaint without diagnosis
D. Reinstallation is never necessary in any circumstance