5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Aspire     Infrastructure Support Engineer to CloudOps Engineer     CloudOps Engineer Track 2: DevOps Support Practitioner

A fundamental duty of a technical support engineer is to implement effective DevOps continuous monitoring.


In this course, you'll identify the key components and patterns used to implement DevOps monitoring systems, the KPIs for analyzing the state of in-use IT systems, the best practices for defining effective outcomes with monitoring and alerting mechanisms, and how to monitor diversified applications. You'll also name the key components of multi-tier applications, the metrics to monitor for tracking an applications' overall performance, and prominent tools for adopting a flow monitoring strategy.


Additionally, you'll identify information system security risks and outline techniques for defense in depth implementation, data-center monitoring, and security monitoring and comprehensive reporting. Finally, you'll learn to use commands to monitor server CPU, memory, disk usage, network, and load statistics.



Objectives

Monitoring in DevOps: IT Resources

  • discover the key concepts covered in this course
  • define the concept and role of continuous monitoring in DevOps and recognize the benefits afforded by adopting the right monitoring practices
  • list the essential components and patterns used to set up monitoring systems for IT applications and platforms
  • specify the resources and KPIs that need to be monitored to analyze the state of in-use IT systems
  • list the best practices that need to be adopted by DevOps practitioners to define effective outcomes with monitoring and alerting mechanisms
  • describe the prominent application monitoring approaches with a focus on the tools and logs that can help monitor applications of diversified types, including FaaS and microservices
  • demonstrate the use of commands to monitor CPU, memory, disk usages, network, and load statistics of the servers installed on Linux where applications are to be deployed
  • recall the critical components of multi-tier applications and their metrics that need to be monitored to track the overall applications' performance and usability
  • identify the challenges associated with configuring network monitoring and name the prominent tools used to adopt a flow monitoring strategy
  • recognize the security risks associated with information systems and outline the recommended approaches that can be utilized to implement defense in depth for information systems
  • define the concept of security information monitoring (SIM) and security event monitoring (SEM) and describe the techniques used to monitor security and build comprehensive reports
  • define the concept of SLA, SLO, and SLI and name the prominent tools used to set up monitoring systems powered by SLA and SLO
  • specify the recommended approaches for monitoring data center compute, storage, network, and applications
  • summarize the key concepts covered in this course