Configure service mesh (Istio, Linkerd, Consul) with traffic routing, mTLS, observability, and advanced traffic...
cat ~/热门
浏览按 GitHub 星标排序的热门技能
JMX metrics, lag alerts, consumer group health checks
Design RabbitMQ architectures with exchanges, quorum queues, routing patterns, clustering, dead letter exchanges,...
Apply microservices patterns (Saga, CQRS, Event Sourcing, Circuit Breaker, API Gateway, Service Discovery) with...
Manage ML model lifecycle from development to deployment with experiment tracking, versioning, monitoring, and...
Required CI secrets and environment variables
Configure Prometheus with alerting, recording rules, service discovery (K8s, Consul, EC2), federation, PromQL...
Alert rules based on error budget consumption
Grafana or CloudWatch dashboard definitions
SLO compliance report with error budget burn rate
Evaluate code quality across 8+ languages using language-agnostic principles and language-specific best practices.
Generate incident response playbooks for security incidents, outages, and disaster recovery with NIST SP 800-61...
Review Rust code for memory safety, concurrency patterns, performance optimization, and ecosystem tooling (cargo,...
Integrate secrets management (Vault, AWS, Azure, GCP) with rotation policies, access controls, and Kubernetes/CI/CD...
Validate application security using OWASP Top 10 2021 and API Security Top 10 guidelines with injection prevention...
Comprehensive security assessment across application, cloud, container, IAM, network, OS, supply chain, and zero...
Evaluate cloud security posture across AWS, Azure, and GCP with storage exposure checks, IAM policy review, and...
Validate container and Kubernetes security using CIS benchmarks with pod security standards, RBAC review, and image...
Validate cryptographic implementations using NIST standards with TLS configuration, cipher suite analysis, and...
Review identity and access management using NIST SP 800-63B guidelines with MFA enforcement, password policy, and...
Validate network security architecture with firewall rule analysis, segmentation verification, and defense-in-depth...
Verify operating system hardening using CIS benchmarks with patch management, kernel hardening, and host-based...
Validate software supply chain security with SBOM generation, dependency scanning, provenance verification, and SLSA...
Design zero-trust architectures with identity-centric security, micro-segmentation, continuous verification, and...