Monitoring in DevOps: IT Resources

DevOps
  • 14 Videos | 1h 6m 5s
  • Includes Assessment
  • Earns a Badge
A fundamental duty of a technical support engineer is to implement effective DevOps continuous monitoring. In this course, you'll identify the key components and patterns used to implement DevOps monitoring systems, the KPIs for analyzing the state of in-use IT systems, the best practices for defining effective outcomes with monitoring and alerting mechanisms, and how to monitor diversified applications. You'll also name the key components of multi-tier applications, the metrics to monitor for tracking an applications' overall performance, and prominent tools for adopting a flow monitoring strategy. Additionally, you'll identify information system security risks and outline techniques for defense in depth implementation, data-center monitoring, and security monitoring and comprehensive reporting. Finally, you'll learn to use commands to monitor server CPU, memory, disk usage, network, and load statistics.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    define the concept and role of continuous monitoring in DevOps and recognize the benefits afforded by adopting the right monitoring practices
    list the essential components and patterns used to set up monitoring systems for IT applications and platforms
    specify the resources and KPIs that need to be monitored to analyze the state of in-use IT systems
    list the best practices that need to be adopted by DevOps practitioners to define effective outcomes with monitoring and alerting mechanisms
    describe the prominent application monitoring approaches with a focus on the tools and logs that can help monitor applications of diversified types, including FaaS and microservices
    demonstrate the use of commands to monitor CPU, memory, disk usages, network, and load statistics of the servers installed on Linux where applications are to be deployed
  • recall the critical components of multi-tier applications and their metrics that need to be monitored to track the overall applications' performance and usability
    identify the challenges associated with configuring network monitoring and name the prominent tools used to adopt a flow monitoring strategy
    recognize the security risks associated with information systems and outline the recommended approaches that can be utilized to implement defense in depth for information systems
    define the concept of security information monitoring (SIM) and security event monitoring (SEM) and describe the techniques used to monitor security and build comprehensive reports
    define the concept of SLA, SLO, and SLI and name the prominent tools used to set up monitoring systems powered by SLA and SLO
    specify the recommended approaches for monitoring data center compute, storage, network, and applications
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 16s
    UP NEXT
  • Playable
    2. 
    Continuous Monitoring Benefits
    4m 26s
  • Locked
    3. 
    Monitoring System Components and Patterns
    4m 33s
  • Locked
    4. 
    Monitoring Resources and KPIs
    7m 33s
  • Locked
    5. 
    Defining Effective Monitoring Outcomes
    4m 11s
  • Locked
    6. 
    Application Monitoring Approaches
    5m 23s
  • Locked
    7. 
    Using Commands to Monitor Servers
    4m 46s
  • Locked
    8. 
    Metric Monitoring to Track Performance
    5m 27s
  • Locked
    9. 
    Network Monitoring Challenges
    4m 22s
  • Locked
    10. 
    Security Risks and Defense in Depth Implementation
    3m 55s
  • Locked
    11. 
    Security Information and Security Event Monitoring
    4m 20s
  • Locked
    12. 
    SLA, SLO, and SLI in Monitoring
    4m 2s
  • Locked
    13. 
    Data Centre Monitoring
    4m 24s
  • Locked
    14. 
    Course Summary
    1m 27s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE