1.1. Introduction
1.2. Design Considerations
1.2.1. Decision Overview
< Describe the system design in broad terms . Consider benefits, costs and schedule and technical risks. Describe how the proposed solution aligns with the enterprise architecture. >
1.2.2. Other Considerations (DAR)
<Alternative designs considered and why one was chosen>
1.3. Architecture
1.3.1. Layout
eyJleHRTcnZJbnRlZ1R5cGUiOiIiLCJnQ2xpZW50SWQiOiIiLCJjcmVhdG9yTmFtZSI6IlotWW9nb21heWEgTWFoYXJhbmEiLCJvdXRwdXRUeXBlIjoiYmxvY2siLCJsYXN0TW9kaWZpZXJOYW1lIjoiWi1Zb2dvbWF5YSBNYWhhcmFuYSIsImxhbmd1YWdlIjoiZW4iLCJ1aUNvbmZpZyI6Int9IiwiZGlhZ3JhbURpc3BsYXlOYW1lIjoiIiwic0ZpbGVJZCI6IiIsImF0dElkIjoiMTQ0OTAwODkwIiwiZGlhZ3JhbU5hbWUiOiJSREtCIEVtdWxhdG9yIFJhY2sgVGVzdCBGcmFtZXdvcmsuZHJhd2lvIiwiYXNwZWN0IjoiIiwibGlua3MiOiJhdXRvIiwiY2VvTmFtZSI6IlRlc3QgZnJhbWV3b3JrIGZvciBSREstQiBFbXVsYXRvciBSYWNrIFRlc3RpbmcgLSBEZXNpZ24iLCJ0YnN0eWxlIjoidG9wIiwiY2FuQ29tbWVudCI6ZmFsc2UsImRpYWdyYW1VcmwiOiIiLCJjc3ZGaWxlVXJsIjoiIiwiYm9yZGVyIjp0cnVlLCJtYXhTY2FsZSI6IjEiLCJvd25pbmdQYWdlSWQiOjk4OTYyMTQzLCJlZGl0YWJsZSI6ZmFsc2UsImNlb0lkIjo5ODk2MjE0MywicGFnZUlkIjoiIiwibGJveCI6dHJ1ZSwic2VydmVyQ29uZmlnIjp7ImVtYWlscHJldmlldyI6IjEifSwib2RyaXZlSWQiOiIiLCJyZXZpc2lvbiI6MSwibWFjcm9JZCI6ImUwNjgwMzkwLTA0NjktNDNkOC04ZmY3LWZkNDNmZDI5ODQwNyIsInByZXZpZXdOYW1lIjoiUkRLQiBFbXVsYXRvciBSYWNrIFRlc3QgRnJhbWV3b3JrLmRyYXdpby5wbmciLCJsaWNlbnNlU3RhdHVzIjoiT0siLCJzZXJ2aWNlIjoiIiwiaXNUZW1wbGF0ZSI6IiIsIndpZHRoIjoibnVsbCIsInNpbXBsZVZpZXdlciI6ZmFsc2UsImxhc3RNb2RpZmllZCI6MTYxNDY5NDU0NDAwMCwiZXhjZWVkUGFnZVdpZHRoIjpmYWxzZSwib0NsaWVudElkIjoiIn0=
1.3.2. Communication
<Describe the communication between the sub-systems. (Diagrams may be used to illustrate communications). >
1.4.1. Build Trigger and Generation
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
1.4.2. Build VM Deploy and Sanity Test Execution
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
1.4.3. Report Management
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
< Identify input interfaces, function call protocol, and the nature of the data structures passed across the interface between the sub-modules>
< Identify output interfaces, function call protocol, and the nature of the data structures passed across the interface. >
1.5. Data Model
<Provide a description of the data model>
1.6. Limitations
< Describe the cases that are identified as problem but unable to report to it due to various factors. Describe the factors >
1.7. Future Enhancements
< Describe how the current design is suitable for future enhancement without completely modifying existing design . >