• iammike
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    Similarly, you can leverage this to wire traffic to DB replicas for instance. This if you need to handle traffic to DBs under specific scenarios (DB problems, burst of traffic, bugs, etc). So basically a purely technical feature flag (paying attention to authorization as always)