| ▲ | tptacek 3 hours ago | |||||||||||||||||||||||||||||||
I don't think this system is best thought of as "deployment" in the sense of CI/CD; it's a control channel for a distributed bot detection system that (apparently) happens to be actuated by published config files (it has a consul-template vibe to it, though I don't know if that's what it is). | ||||||||||||||||||||||||||||||||
| ▲ | EvanAnderson 3 hours ago | parent | next [-] | |||||||||||||||||||||||||||||||
That's why I likened it Crowdstrike. It's a signature database that blew up the consumer of said database. (You probably caught my post mid-edit, too. You may be replying to the snarky paragraph I felt better of and removed.) Edit: Similar to Crowdstrike, the bot detector should have fallen-back to its last-known-good signature database after panicking, instead of just continuing to panic. | ||||||||||||||||||||||||||||||||
| ▲ | eastdakota 3 hours ago | parent | prev [-] | |||||||||||||||||||||||||||||||
That’s correct. | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||