Monitoring in DevOps: IT Resources
DevOps
| Intermediate
- 14 videos | 1h 5s
- Includes Assessment
- Earns a Badge
A fundamental duty of a technical support engineer is to implement effective DevOps continuous monitoring. In this course, you'll identify the key components and patterns used to implement DevOps monitoring systems, the KPIs for analyzing the state of in-use IT systems, the best practices for defining effective outcomes with monitoring and alerting mechanisms, and how to monitor diversified applications. You'll also name the key components of multi-tier applications, the metrics to monitor for tracking an applications' overall performance, and prominent tools for adopting a flow monitoring strategy. Additionally, you'll identify information system security risks and outline techniques for defense in depth implementation, data-center monitoring, and security monitoring and comprehensive reporting. Finally, you'll learn to use commands to monitor server CPU, memory, disk usage, network, and load statistics.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine the concept and role of continuous monitoring in devops and recognize the benefits afforded by adopting the right monitoring practicesList the essential components and patterns used to set up monitoring systems for it applications and platformsSpecify the resources and kpis that need to be monitored to analyze the state of in-use it systemsList the best practices that need to be adopted by devops practitioners to define effective outcomes with monitoring and alerting mechanismsDescribe the prominent application monitoring approaches with a focus on the tools and logs that can help monitor applications of diversified types, including faas and microservicesDemonstrate the use of commands to monitor cpu, memory, disk usages, network, and load statistics of the servers installed on linux where applications are to be deployed
-
Recall the critical components of multi-tier applications and their metrics that need to be monitored to track the overall applications' performance and usabilityIdentify the challenges associated with configuring network monitoring and name the prominent tools used to adopt a flow monitoring strategyRecognize the security risks associated with information systems and outline the recommended approaches that can be utilized to implement defense in depth for information systemsDefine the concept of security information monitoring (sim) and security event monitoring (sem) and describe the techniques used to monitor security and build comprehensive reportsDefine the concept of sla, slo, and sli and name the prominent tools used to set up monitoring systems powered by sla and sloSpecify the recommended approaches for monitoring data center compute, storage, network, and applicationsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 16s
-
4m 26sFind out how to define the concept and role of continuous monitoring in DevOps and recognize the benefits of adopting the right monitoring practices. FREE ACCESS
-
4m 33sUpon completion of this video, you will be able to list the essential components and patterns used to set up monitoring systems for IT applications and platforms. FREE ACCESS
-
7m 33sAfter completing this video, you will be able to specify the resources and KPIs that need to be monitored to analyze the state of in-use IT systems. FREE ACCESS
-
4m 11sAfter completing this video, you will be able to list the best practices that need to be adopted by DevOps practitioners to define effective outcomes with monitoring and alerting mechanisms. FREE ACCESS
-
5m 23sAfter completing this video, you will be able to describe the prominent application monitoring approaches with a focus on the tools and logs that can help monitor applications of diversified types, including FaaS and microservices. FREE ACCESS
-
4m 46sIn this video, you will learn about the use of commands to monitor CPU, memory, disk usage, network, and load statistics of the servers installed on Linux where applications are to be deployed. FREE ACCESS
-
5m 27sUpon completion of this video, you will be able to recall the critical components of multi-tier applications and their metrics that need to be monitored to track the overall applications' performance and usability. FREE ACCESS
-
4m 22sIn this video, you will learn how to identify the challenges associated with configuring network monitoring and name the prominent tools used to adopt a flow monitoring strategy. FREE ACCESS
-
3m 55sAfter completing this video, you will be able to recognize the security risks associated with information systems and outline the recommended approaches that can be utilized to implement defense in depth for information systems. FREE ACCESS
-
4m 20sLearn how to define the concepts of security information monitoring (SIM) and security event monitoring (SEM), and describe the techniques used to monitor security and build comprehensive reports. FREE ACCESS
-
4m 2sFind out how to define the concepts of SLA, SLO, and SLI and name the prominent tools used to set up monitoring systems powered by SLA and SLO. FREE ACCESS
-
4m 24sUpon completion of this video, you will be able to specify the recommended approaches for monitoring data center compute, storage, network, and applications. FREE ACCESS
-
1m 27s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.