DevOps Downside: Middle of the Night Support Calls

 I met with a client today who is trying to move to a DevOps model for software delivery. One question they asked caught me off guard: how do you deal with having to wake developers up in the middle of the night?

The challenge they faced was the DevOps requirement that instead of supporting production code with a separate support team, each developer would be responsible for supporting their own code – even if the problem cropped up after hours.

I saw their point, although I’m not aware of any organizations who have this requirement (if you have this policy, please post a comment to that effect). It did seem to me that such a policy would be a disincentive to put buggy code into production, which would be a good thing. On the other hand, it would also encourage developers to play it safe, and perhaps not be as bold with their code as they otherwise would be, which might limit their creativity.

But then the client informed me that they actually paid developers who were on call a bonus for every week they served in this support role. Cold hard cash, of course, changes the incentive picture completely. Now the question is whether the cash more than compensates for the hassle of middle-of-the-night support calls, and in the extreme case, might actually lead to intentional sloppiness.

The challenge with such governance questions is making sure that you are incentivizing the behavior you desire. In the case of DevOps, you not only want to incentivize writing bug-free, creative code, you also want to encourage the proper configuration of the operational environment – which means in part automated recovery from failure. Sure, bugs still crop up, but if you can automate your way around them, then fixing them can likely wait until morning.

It’s no mistake that Cloud and DevOps go hand in hand in most organizations moving to a DevOps model, since automating the operational environment is an essential enabler of successful DevOps. But this automation is not just about streamlining deployment and the proper running of code in production. It’s also about automating responses to failure.

Share the Post:
Share on facebook
Share on twitter
Share on linkedin

Overview

The Latest

positive contribution tech

Technology’s Positive Contributions to Society

Technology has and continues to improve our lives. From the business world to the world of medicine, and our day-to-day lives, you can’t go a day without interacting with at least one form of technology. While some fear technology may be going too far, there are many ways in which

How to Choose From The Best Big Data Platforms in 2023

How to Choose From The Best Big Data Platforms in 2023

As big data continues to become increasingly popular in the business world, companies are always looking for better ways to process and analyze complex data. The process critically depends on the platform that manages and analyzes the data. In this article, we will provide a guide to help you choose

Why transparent code is a good idea

Why Transparent Code is a Good Idea

Code is used to make up the apps and software we use every day. From our favorite social media platforms to our online banking services, code is the framework used to build these tools that help make our lives easier. Code is complex. Software today requires large teams of programmers

The Role of WordPress Hosting in Website Speed and Performance

The Role of WordPress Hosting in Website Performance

The term “WordPress hosting” refers to a specific type of web hosting service that offers hardware and software configurations tailored to the needs of WP sites. It’s important to remember that a WP hosting package is not required to host WordPress webpages. WP web pages are also compatible with standard

Data Privacy vs. Data Security: What you Should Know

Data Privacy vs. Data Security: What you Should Know

Data privacy and data security are often used interchangeably, but they are two completely different things. It’s important to understand the difference for anyone who handles sensitive information, such as personal data or financial records. In this article, we’ll take a closer look at data privacy vs. data security. We’ll