Monitoring in DevOps: IT Resources

DevOps    |    Intermediate
  • 14 videos | 1h 5s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 56 users Rating 4.4 of 56 users (56)
A fundamental duty of a technical support engineer is to implement effective DevOps continuous monitoring. In this course, you'll identify the key components and patterns used to implement DevOps monitoring systems, the KPIs for analyzing the state of in-use IT systems, the best practices for defining effective outcomes with monitoring and alerting mechanisms, and how to monitor diversified applications. You'll also name the key components of multi-tier applications, the metrics to monitor for tracking an applications' overall performance, and prominent tools for adopting a flow monitoring strategy. Additionally, you'll identify information system security risks and outline techniques for defense in depth implementation, data-center monitoring, and security monitoring and comprehensive reporting. Finally, you'll learn to use commands to monitor server CPU, memory, disk usage, network, and load statistics.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define the concept and role of continuous monitoring in devops and recognize the benefits afforded by adopting the right monitoring practices
    List the essential components and patterns used to set up monitoring systems for it applications and platforms
    Specify the resources and kpis that need to be monitored to analyze the state of in-use it systems
    List the best practices that need to be adopted by devops practitioners to define effective outcomes with monitoring and alerting mechanisms
    Describe the prominent application monitoring approaches with a focus on the tools and logs that can help monitor applications of diversified types, including faas and microservices
    Demonstrate the use of commands to monitor cpu, memory, disk usages, network, and load statistics of the servers installed on linux where applications are to be deployed
  • Recall the critical components of multi-tier applications and their metrics that need to be monitored to track the overall applications' performance and usability
    Identify the challenges associated with configuring network monitoring and name the prominent tools used to adopt a flow monitoring strategy
    Recognize the security risks associated with information systems and outline the recommended approaches that can be utilized to implement defense in depth for information systems
    Define the concept of security information monitoring (sim) and security event monitoring (sem) and describe the techniques used to monitor security and build comprehensive reports
    Define the concept of sla, slo, and sli and name the prominent tools used to set up monitoring systems powered by sla and slo
    Specify the recommended approaches for monitoring data center compute, storage, network, and applications
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 16s
  • 4m 26s
    Find out how to define the concept and role of continuous monitoring in DevOps and recognize the benefits of adopting the right monitoring practices. FREE ACCESS
  • Locked
    3.  Monitoring System Components and Patterns
    4m 33s
    Upon completion of this video, you will be able to list the essential components and patterns used to set up monitoring systems for IT applications and platforms. FREE ACCESS
  • Locked
    4.  Monitoring Resources and KPIs
    7m 33s
    After completing this video, you will be able to specify the resources and KPIs that need to be monitored to analyze the state of in-use IT systems. FREE ACCESS
  • Locked
    5.  Defining Effective Monitoring Outcomes
    4m 11s
    After completing this video, you will be able to list the best practices that need to be adopted by DevOps practitioners to define effective outcomes with monitoring and alerting mechanisms. FREE ACCESS
  • Locked
    6.  Application Monitoring Approaches
    5m 23s
    After completing this video, you will be able to describe the prominent application monitoring approaches with a focus on the tools and logs that can help monitor applications of diversified types, including FaaS and microservices. FREE ACCESS
  • Locked
    7.  Using Commands to Monitor Servers
    4m 46s
    In this video, you will learn about the use of commands to monitor CPU, memory, disk usage, network, and load statistics of the servers installed on Linux where applications are to be deployed. FREE ACCESS
  • Locked
    8.  Metric Monitoring to Track Performance
    5m 27s
    Upon completion of this video, you will be able to recall the critical components of multi-tier applications and their metrics that need to be monitored to track the overall applications' performance and usability. FREE ACCESS
  • Locked
    9.  Network Monitoring Challenges
    4m 22s
    In this video, you will learn how to identify the challenges associated with configuring network monitoring and name the prominent tools used to adopt a flow monitoring strategy. FREE ACCESS
  • Locked
    10.  Security Risks and Defense in Depth Implementation
    3m 55s
    After completing this video, you will be able to recognize the security risks associated with information systems and outline the recommended approaches that can be utilized to implement defense in depth for information systems. FREE ACCESS
  • Locked
    11.  Security Information and Security Event Monitoring
    4m 20s
    Learn how to define the concepts of security information monitoring (SIM) and security event monitoring (SEM), and describe the techniques used to monitor security and build comprehensive reports. FREE ACCESS
  • Locked
    12.  SLA, SLO, and SLI in Monitoring
    4m 2s
    Find out how to define the concepts of SLA, SLO, and SLI and name the prominent tools used to set up monitoring systems powered by SLA and SLO. FREE ACCESS
  • Locked
    13.  Data Centre Monitoring
    4m 24s
    Upon completion of this video, you will be able to specify the recommended approaches for monitoring data center compute, storage, network, and applications. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 27s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 21 users Rating 4.5 of 21 users (21)
Rating 4.5 of 139 users Rating 4.5 of 139 users (139)
Rating 5.0 of 5 users Rating 5.0 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 1244 users Rating 4.6 of 1244 users (1244)
Rating 4.3 of 6 users Rating 4.3 of 6 users (6)
Rating 4.6 of 2641 users Rating 4.6 of 2641 users (2641)