温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ibm.com/fr-fr/think/architectures/well-architected/resiliency
点击访问原文链接

Resiliency in the IBM Well-Architected Framework

HomeThinkArchitecturesIBM Well-Architected Frameworkpatterns and techniquesCircuit breakerEvent-driven architectureBuild for reliabilityservice level objects (SLOs)Measure your service level objectivesIBM Cloud service level objectivesdisaster recovery (DR) architectureDesigning an architecture for your application resiliency objectivesResiliency for cloud-native applications on Red Hat OpenShiftHow IBM Cloud ensures high availability and disaster recoveryCyber resiliencethreat actorsWORM/immutable storage technologiesWhat is cyber resilience?Immutable object storageIBM Storage DefenderChaos engineeringchaos-engineering-principlesIBM's principles of Chaos Engineeringautomate operationsautomated alertsTerraformIBM Cloud SchematicsTerraform code for building resilient infrastructure on IBM CloudIBM Cloud SchematicsIBM Instana ObservabilityIBM Cloud Pak for AIOpsIBM Instana ObservabilityIBM Cloud Pak for AIOpsWhat is observability?Monitor your applications by using the Golden Signalsnon-functional requirements (NFRs)NIST 800-34NIST 800-39NIST 800-160NIST 800-53Operational ResilienceIBM Cloud Framework for Financial Servicesbusiness continuity and disaster recovery (BCDR)high availabilityEuropean Financial Regulatory GuideIBM Cloud Pak for AIOps Innovate faster, reduce operational cost and transform IT operations (ITOps) across a changing landscape with an AIOps platform that delivers visibility into performance data and dependencies across environments. Embrace artificial intelligence, machine learning and automation to help ITOps managers and Site Reliability Engineers (SREs) address incident management and remediation.Instana IBM® Instana® Observability is the gold standard of incident prevention with automated full-stack visibility, 1-second granularity and 3 seconds to notify.IBM Storage Defender Detect threats such as ransomware, exfiltration and insider attacks, leveraging intelligent software from IBM and its ecosystem partners. These tools can help you identify the safest recovery points. And because IBM Storage Defender integrates with your existing security operations tools and processes, you can recover a minimally viable company sooner.IBM Solution Tutorials

智能索引记录