Monitoring in DevOps: IT Resources
DevOps
| Intermediate
- 14 Videos | 1h 5s
- Includes Assessment
- Earns a Badge
A fundamental duty of a technical support engineer is to implement effective DevOps continuous monitoring. In this course, you'll identify the key components and patterns used to implement DevOps monitoring systems, the KPIs for analyzing the state of in-use IT systems, the best practices for defining effective outcomes with monitoring and alerting mechanisms, and how to monitor diversified applications. You'll also name the key components of multi-tier applications, the metrics to monitor for tracking an applications' overall performance, and prominent tools for adopting a flow monitoring strategy. Additionally, you'll identify information system security risks and outline techniques for defense in depth implementation, data-center monitoring, and security monitoring and comprehensive reporting. Finally, you'll learn to use commands to monitor server CPU, memory, disk usage, network, and load statistics.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedefine the concept and role of continuous monitoring in DevOps and recognize the benefits afforded by adopting the right monitoring practiceslist the essential components and patterns used to set up monitoring systems for IT applications and platformsspecify the resources and KPIs that need to be monitored to analyze the state of in-use IT systemslist the best practices that need to be adopted by DevOps practitioners to define effective outcomes with monitoring and alerting mechanismsdescribe the prominent application monitoring approaches with a focus on the tools and logs that can help monitor applications of diversified types, including FaaS and microservicesdemonstrate the use of commands to monitor CPU, memory, disk usages, network, and load statistics of the servers installed on Linux where applications are to be deployed
-
recall the critical components of multi-tier applications and their metrics that need to be monitored to track the overall applications' performance and usabilityidentify the challenges associated with configuring network monitoring and name the prominent tools used to adopt a flow monitoring strategyrecognize the security risks associated with information systems and outline the recommended approaches that can be utilized to implement defense in depth for information systemsdefine the concept of security information monitoring (SIM) and security event monitoring (SEM) and describe the techniques used to monitor security and build comprehensive reportsdefine the concept of SLA, SLO, and SLI and name the prominent tools used to set up monitoring systems powered by SLA and SLOspecify the recommended approaches for monitoring data center compute, storage, network, and applicationssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 16sUP NEXT
-
2.Continuous Monitoring Benefits4m 26s
-
3.Monitoring System Components and Patterns4m 33s
-
4.Monitoring Resources and KPIs7m 33s
-
5.Defining Effective Monitoring Outcomes4m 11s
-
6.Application Monitoring Approaches5m 23s
-
7.Using Commands to Monitor Servers4m 46s
-
8.Metric Monitoring to Track Performance5m 27s
-
9.Network Monitoring Challenges4m 22s
-
10.Security Risks and Defense in Depth Implementation3m 55s
-
11.Security Information and Security Event Monitoring4m 20s
-
12.SLA, SLO, and SLI in Monitoring4m 2s
-
13.Data Centre Monitoring4m 24s
-
14.Course Summary1m 27s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.