Subcribe and Access : 5200+ FREE Videos and 21+ Subjects Like CRT, SoftSkills, JAVA, Hadoop, Microsoft .NET, Testin5g Tools etc..
Batch
Date: Apr
28th @8:00PM
Faculty: Mr. Maha (15+ Yrs of Exp,..)
Duration: 5 Months
Venue
:
DURGA SOFTWARE SOLUTIONS,
Flat No : 202,
2nd Floor,
HUDA Maitrivanam,
Ameerpet, Hyderabad - 500038
Ph.No: +91 - 9246212143, 80 96 96 96 96
Syllabus:
DEVOPS
Why DevOps:
• Business Perspective
• IT Perspective
• Developer Perspective
• Tester Perspective
• Operations Perspective
What is DevOps:
- Definition
- Stakeholders of DevOps
What is SDLC:
• Phases of SDLC
• Role of Dev in SDLC
• Role of Ops in SDLC
Introduction to DevOps Automation:
• Introduction
• Tools
• DevOps Technology Categories
• Collaboration
• Planning
• Issue Tracking
• Configuration Management
• Source Control
• Dev Environments
• Continuous Integration
• Continuous Testing
• Continuous Deployment
• Monitoring
Linux Essentials:
• History
• Types of OS
• Flavours
• OS Structure
• File system
• All Linux basic commands
• File & directorys persmisions
• User & groups administration
• Accessing Servers with ssh
• How multi user works in Linux
• How make normal user as sudo user.
Shell Script:
• Introduction
• Type of shells
• Variables
• Types of variables
• Operators
• Input arguments
• String comparison
• Athematic comparison
• File conditions
• If, loops, case, functions
• Examples
Virtualization:
• Introduction
• What is Virtualization
• Server Virtualization
• Desktop Virtualization
• Application Virtualization
Apache Webserver:
• Installations
• Configuration
Tomcat Application Server:
• Installation, configuration
• Tomcat Manager
• Application Management
• Application Deployment
DevOps Tools
Model 1: Continues Integration and Continues Delivery by AZURE
Source Code Management:
What is Version Control System?
Git:
• Source Code Management
• SCM Tools
• What is Git
• Installation
• Work space/ work dir/ work tree
• Configuration
• Commit/check-in
• Version/version-ID/commit-ID,
• Work space, staging area, buffer area
• Local Repo/remote repo
• Customer Branching
• Release Branching
• Merge, stash, fast-forwarding, rebase
• Chery-pick, cat-file and hocks
• Repositories and Tracking
• Git Commands: add, commit, log, push, status, ignore, branch, checkout merge, confict, stash, reset, revert
• Git GUI
Automate Build Process:
Maven:
• Introduction, Maven Structure
• Maven Dependenciess
• Maven Repositories
• Maven Plugins and goals
• Integrated Maven Build
• Maven project
Jenkins:
What is Jenkins?
Installation and configuration
• Prerequisitesd
• Download and installation
• Configuration.
Managing Jenkins
• Securing Jenkins, Managing Credentials, Plugin Management
• Jenkins Backup, Create a Build Slave
Creating Application Builds
• Manual compilation with Maven
• Manually Testing, Packaging and Running the App
• Creating a Jenkins Job and configuring a Git Repo
• Compiling in Jenkins
• App Packaging in Jenkins
• Archiving artifacts
• Cleaning up Past Builds
• Build time trend
• The jenkins Dashboard
• Troubleshooting build failures
• Build linking upstream and downstream
Plugins
• Introduction
• Plugin Architecture
• Extension Points
• Getting Plugins
• Useful Plugins Overview
• Build Tool Plugins
• Installing a plugin
• Plugin configuration
• Security Overview
Continuous Testing and Continuous Integration and Testing
• Adding steps to Freestyle Project
• Creating a Pipeline job to execute Maven
• Archiving in a Pipeline
• Checking out git repository in pipeline
• The Master Agent Model
• Allocating a node and workspace in Pipeline
• Triggering Automated Builds
• Configuring an Email Server
• Notifications when a build fails
• Executing unit tests
Finding and Managing Plugins
• The need for plugins
• Integrated Code Coverage
• Assessing a plugin
• Testing Plugins and Plugin Types
Building Continuous Delivery Pipeline
• Continuous Delivery
• Backup and Restore
• A Second Node Allocation
• Adding an Agent Node
• Setup parallel integration testing in a pipeline
• Executing and Monitoring Parallel pipelines
• Setup Deployment to staging
• Executing a Deployment pipeline
• Checkin pipeline script to Git
Master and Slave Configuration
Integrating Jenkins with jfrog and sonarqube
Model 2: Configuration / Provisioning
Ansible:
Introduction
• What is Ansible
• Change Management
• Provisioning
• Automation
• Orchestration
• Why use Ansible
• YAML
• Built in Security
• Extendable
• Conclusion
Architecture and Process Flow
• Architecture Introduction
• System Requirement
• Components Overview
• Process of Execution
• Conclusion
Setup and Configuration
• Test Environment Setup
• Download and Installation
• Ansible Configuration File
• The HOSTS File
• Overriding the Default HOSTS File
• Overriding the Default System Ansible.Cfg File
• Overriding the Default Roles Path
• Understanding the core components of Ansible
• Ad-hoc commands in Ansible
Ansible Inventory and Configuration
• Introduction to Inventory &Configuration
• Inventory Fundamentals
• Scaling out with Multiple Files
• Ansible Configuration Basics
Ansible Playbooks
• Ansible Command Line
• Our First Playbook
• Variables: Inclusion Types
• Target Section
• Variable Section
• Task Section
• Handler Section
• Outlining Playbook
• Create a Playbook from Outline
• Optimizing Playbook
• Taking Playbook for a Dry Run
• Simple Variable Substitution
• Loops
• Conditionals
• Vault
• Basic Include Statements
• Tags
• Basic Error Handling
• Includes - Breaking Your Playbook Into Discrete Plays
• Starting At Task or Stepping Through All Tasks
• Passing Variables Into Playbooks at the Command Line
• Using Jinja2 Templates
• Use a playbook to copy a program and customize it for the target host.
• Wiring Play books for java, webservers and applications server
Ansible Modules
• Introduction
• Ansible Modules Fundamentals
• Module Docs
• Yum Module
• Setup Module
• Other modules
Create and use templates to create customized configuration files
• Introduction
• Templates
Working with Ansible facts and variables.
• Let see how we get ansible facts and how we use facts
• Using Ansible facts
• Using variables to gather server info
Roles
• Introduction to Roles
• Role Basics
• Creating Role
• Ansible Galaxy
• Roles - The Directory Structure
• Role Based Tasks
• Task Order - Pre and Post Tasks
• Roles - Conditional Execution
• Roles - Variable Substitution
• Roles - Handlers
• Roles - Configuring Alternate Roles Paths
• Roles - Conditional Include Statements
• Roles - Waiting For Events
• Roles - Executing a Task Until
• Roles - Using Tags
• Roles - Breaking a Playbook Into a Role
• Roles - Passing Variables from Command Line
• Roles - Using Jinja2 Templates
• Roles - LocalAction
• Roles - Lets create a role to install apache.
• Lets use the previous role and add a new one.
• Lets build on the previous role
• Create Role for installing tomcat on multiple nodes
• Create Role for deployapplication on multiple nodes
Model 3: Containerization
Docker:
• Introduction
• What is Docker
• Docker Life Cycle
• How Docker Containers working
Installing Docker
• Installing Docker on Linux
Working with Containers
• How to create the containers
• Docker commands
• Theory of pulling and Running Containers
• Working with images
• Container Life cycle
• Dockerfile
• Build Docker images
• Docker push
• Docker compose
• Docker volumes
• Docker cpu
• Docker memory
• Docker Networking
Kubernetes
• What is kubernets
• Purpose of Kubernets
• How kubernets works
• Master components, how works
• Node Compenents, how works
• How pods works
• Installations and configuration kubernets cluster
• Pod lifecycle
• Work with pods
• Work with Services
• Work with Replica controller
• Work with Deployment
• How to Releases java application by using RC and Deploy
• AKS
Model 4: Terraform
Infrastructure Automation
• What is Infrastructure as Code and why is it needed?
• Declarative vs Procedural tools for Infrastructure as Code
• Infrastructure as Code in the Cloud
• Requirements for infrastructure provisioner
• Deploying First Server
• Preparing work environment
• Terraform providers
• Configuring AWS provider e. Creating EC2 instance with Terraform
• Working with state
• Handling resource updates
Resource Dependencies and Modules
• Creating AWS Virtual Private Cloud
• Controlling dependencies with depends_on and ignore_changes
• Making sense of our template
Storing and Supplying Configuration
• Understanding variables
• Configuring data sources
• Exploring Terraform configuration resources
Model 5: Monitoring
System Monitoring: Nagios
• Installation of Nagios
• Configuring Nagios
• Monitoring with Nagios
Application Monitoring: ELK
• Installation of Elasticsearch, logstash, Kiban stack
• Configuring the ELK Stack
• Monitoring logs with ELK
Amazon Web Services
Model 1: Elastic Compute Cloud (EC2)
- EC2 Basics
- Amazon Machine Images (AMIs)
- Instance types
- Elastic Block Store (EBS)
- Security Groups
- IP Addressing
- Launching and using an EC2 instance
- EC2 Essentials
- Understanding Reserved Instances
- Selecting and Building EC2 Instances
- Working with public and private IP Addresses
- Cloud-init User data and Metadata
- Cloud Watch and EC2
- EC2 Placement Groups o Serving Traffic to Private Web Servers
EBS (Elastic Block Storage)
- Hard disk Basics
- EBS Types
- EBS vs Instance Storage
EBS Volumes And Snapshots:
- Working with Elastic Block Storage
- Understanding AWS Storage Types
- Increasing IOPS Performance
- Configuring Optimized Instances
- EBS Snapshots and Replication
- EBS Snapshots Characteristics
- Working with Snapshots in the AWS Management Console
- AWS Command Line Interface
- Working with EC2 using CLI
- EC2 Troubleshooting Scenarios
Elastic File Storage
- Demonstrate ability to create backups for different services
- Overview of Backup Services on AWS and Services that Include Backups
- Creating and Scripting Automation for EC2 Snapshots
Load Balancing Basics
- OSI Network Layer
- Load Balancing
- Classic Load Balancer
- Application Load Balancer
- Auto Scaling Groups
- Target Groups
- Health Checks
Simple Notification Service (SNS)
- Introduction
- SNS Topics
- SNS Subscriptions and SNS Subscription Protocols
- SNS Push Notifications
Cloudwatch
- Creating Cloud Watch Alarms for EC2 Monitoring
- Creating custom cloudwatch metrics
- Configuring Alarms
Monitoring and Metrics
- Understanding AWS Instance types, Utilization and Performance
- EC2 Instance and System Status Checks
- Creating Cloud Watch Alarms
- Installing and Configuring Monitoring Scripts for EC2 Instances
- Dedicating an instance to monitoring
- Monitoring EBS for performance and availability
Auto Scaling:
- Basics
- Using Auto Scaling
- Auto Scaling Troubleshooting scenarios
- Auto Scaling Features
- How Auto Scaling Works
- Configuring Auto Scaling
Route 53:
- Route 53 Basics
- Using Route 53
- Route 53 and DNS Failover
- Weighted Routing Policies In Route 53
- Configuring DNS with Route 53
- Where we are in the reference architecture
- The role of DNS in a distributed cloud system
- Using Route 53 with ELB
- Configuring Route 53
- Route 53 Best Practices
Billing:
- AWS Billing and linking AWS Accounts
- AWS Billing Dimensions and metrics for Cloud Watch
- Cost Optimizing
- Using the AWS Price List API and Cost Explorer
AWS EC2 CLI:
- Creation and management of EC2 resources using CLI
Model 2: Virtual Private Cloud (VPC)
- AWS Global Infrastructure
- VPC Basics
- Internet Gateways (IGW)
- Route Tables (RTs)
- Security Groups
- Network Access Control Lists (NACLs)
- Subnets o Availability Zones
- Introduction to VPC and AWS Networking o Building A VPC From Scratch
- VPC Networking
- VPC Security
- Configuring a NAT Instance
- DB Subnet Groups
- Elastic IP Addresses and Elastic Network Interfaces
- Configure a Web Application In VPC
- Extending the VPC to On-Premise Networks
- VPC Peering
Extending On-Premise Networks with VPN:
- Using Directory Service to Connect Hybrid Architectures
- Security Zones
- Understanding AWS IP Subnet Reservations
- Hybrid Cloud AWS
- Overview
- AWS Hybrid Cloud Scenario
- Network Integration in to AWS VPC
- Best Practices
- Creating an OpenVPN Instance for Client Connections
Cloud Formation:
- Cloud Formation Essentials
- Creation and deployment of VPC Using Cloud Formation
Billing:
AWS VPC CLI:
- Creation and management of VPC resources using CLI
Model 3: S3, IAM
Simple Storage Service (S3)
- S3 Basics
- Buckets and objects
- Storage Classes
- Object Lifecycles
- Permissions
- Object Versioning
- S3 Essentials
- S3 Bucket/Object Versioning and Policies
- Website Hosting with S3
- AWS Command Line Interface
- Working with S3 using CLI
- Introduction To S3 Developer Requirements
- Creating a static hosting Website with S3
- S3 IAM & Bucket Policies
Glacier:
- Overview
- Introduction to Glacier
- Creating a Glacier Vault
- Storing Archives in Glacier
- Understanding Glacier's Retrieval Pricing
- Restoring Archives from Glacier
Billing:
AWS S3 CLI:
- Creation and management of s3 resources using CLI
Identity Access Management (IAM)
- What is IAM
- Create User
- Create Groups
- Roles
- Polices
- Custom polices
- Create/Set an IAM Policy for an IAM User
Model 4: Relational Database Service (RDS) Dynamo DB
RDS:
- Overview
- Essentials
- Working with RDS
- Subnet Groups
- Security Options
- RDS Security Groups and Connecting to RDS from EC2
- Monitoring RDS for performance and availability
- MySQL and Maria DB on RDS
- Replica & MAZ
- Private RDS
Amazon Dynamo DB:
- Getting Started with Dynamo DB
- Local and Global Secondary Indexes
- Dynamo DB overview and Limits
- Dynamo DB Multi-Region Replication
Elastic Cache
- Caching Overview
- Memcached
- Redis
- Clusters
- Backups
Billing:
- AWS Billing and linking AWS Accounts
- AWS Billing Dimensions and metrics for Cloud Watch
- Cost Optimizing o Using the AWS Price List API and Cost Explorer
AWS CLI
- Creation & Managing EBS & EFS using CLI
- Creation and Management of DB Services using CLI
Microsoft Azure
Working with Azure Virtual Machines
- Designing solutions for virtual machines
- Virtual machine series and sizes
- Available VM series and sizes
- Availability Sets
- Fault domains and update domains
- Managed Disks
- Creating highly available virtual machines
- Creating highly available virtual machines from the Azure Portal
- Creating highly available virtual machines from PowerShell& Azure CLI
- VM Scale Sets
- Creating a VM Scale Set from the Azure Portal
- Creating a VM Scale Set from the Azure PowerShell& Azure CLI
- Accessing your VM Scale Sets
- VM Scale Set templates.
- Disaster recovery
- Backup and recovery
- Replication
- Administration:
- Identify Workloads That Can And Cannot Be Deployed
- Create VMs
- Connect to a Windows/Linux VM
- PowerShell Basics – Create a Virtual Machine
- “VM Workloads” Resources
- ARM Templates and Automation
Working with ARM Templates
- What is Resource Manager?
- Resource Provider & Types
- Resource Manager & Classic Deployment
- Subscription Governance
- Organizing resources with management groups
- Create & deploy ARM Template
- IDE: using VS Code to Create the ARM Template
- Deploy Templates using
- Portal
- PowerShell
- Azure CLI
- Configure Multiple ARM VMs in an Availability Set for Redundancy
- Configure Each Application Tier Into Separate Availability Sets
- Combine the Load Balancer with Availability Sets
Configuring Compute-Intensive Applications
- High-performance compute virtual machines
- Microsoft HPC Pack
- Cloud-native HPC solutions
- Hybrid HPC architecture
- Azure Batch
- Creating an Azure Batch service
- Stateless components
- Containers on Azure Batch
Robust Networking implementations
- Azure Virtual Network
- IP addresses
- Public IP address
- Private IP address
- Creating a public IP address
- DNS
- Creating a VNet with two subnets
- Azure Load Balancer
- Azure Traffic Manager
- Azure Application Gateway
- External connectivity for Azure Virtual Networks
- Azure VPN
- Site-to-site VPN
- VNet-to-VNet VPN
- Point-to-site VPN
- ExpressRoute
- Network security strategies
- DMZ
- Network Security Groups
- User Defined Routes
- Virtual network service tunneling
- Web Application Firewall
- Administration:
- Deploy a VM into a Virtual Network
- Configure External and Internal Load Balancing
- Implement Application Gateway
- Design Subnets
- Configure Static, Public, and Private IP Addresses
- Set Up Network Security Groups (NSGs), DNS at the Virtual Network Level
- User Defined Routes (UDRs)
- Firewall Rules
- Modify Network Configuration
- Modify a Subnet
- Import and Export a Network Configuration
- Multi-Site or Hybrid Network
- Choose the Between ExpressRoute, Site-to-site, and Point-to-site
- Choose the Appropriate Gateway
- Identify Supported Devices and Software VPN Solutions
Storage Solutions
- Azure Storage and replication types
- Storage account types
- General-purpose v1 (GPv1)
- Blob storage
- General-purpose v2 (GPv2)
- Storage replication types
- Locally Redundant Storage
- Zone Redundant Storage
- Geo-redundant Storage
- Azure Blob Storage
- Access tiers
- Hot
- Cool
- Archive
- Azure Table Storage
- Creating a storage account
- Uploading data to Azure Table Storage
- Azure Queue Storage
- Azure File Storage
- Azure Disk Storage
- Standard Disk Storage
- Premium Disk Storage
- Unmanaged versus Managed Disks
- STORSIMPLE
- STORSIMPLE Virtual Array
- STORSIMPLE 8000 Series
- Cosmos DB Storage
- Azure Search
- Azure SQL Database
- SQL Server Stretch Database
- High availability
- Active geo-replication
- Failover groups
- Configuring active geo-replication and failover groups
- Backup and recovery
- Azure Database for MySQL
- Azure Database for PostgreSQL
- Administration:
- VM storage
- Configure Disk Caching
- Plan Storage Capacity
- Configure Operating System Disk Redundancy
- Configure Shared Storage Using Azure File Service
- Encrypt Disks
- Azure Storage Blobs and Azure Files
- Read Data, Change Data, Set Metadata On A Container
- Store Data Using Block And Page Blobs
- Stream Data Using Blobs
- Access Blobs Securely
- Implement A sync Blob Copy
- Configure a Content Delivery Network (CDN)
- Design Blob Hierarchies
- Configure Custom Domains
- Scale Blob Storage
- Azure SQL Databases
- Choose the Appropriate Database Tier and Performance Level
- Configure Point-in-time Recovery, Geo-replication, and Data Sync
- Import and Export Data and Schema
- Design a Scaling Strategy
Securing your Resources
- List comprehensions
- Lambda functions
Third-Party Libraries
- Azure Active Directory
- Microsoft Graph
- Azure AD Connect
- Azure Active Directory password hash synchronization
- Azure Active Directory pass-through authentication
- Active Directory Federation Services
- Multi-Factor Authentication
- Enabling MFA in the Azure Portal
- Azure Active Directory Business to Business
- Azure Active Directory Business to Consumer
- Administration:
- Manage access
- Create and Manage Shared Access Signatures
- Use Stored Access Policies
- Regenerate Keys
- Azure Active Directory (Azure AD) with Existing Directories
- Implement Azure AD Connect and Single Sign-on
- Setup Azure Active Directory
- Add Custom Domains
- Implement Azure AD Connect
- Monitor Azure AD
- Azure AD B2C and Azure B2B
- Create an Azure AD B2C Directory
- Link a Subscription to a B2C Tenant
- Register an Application
- Implement Social Identity Provider Authentication
- Enable Multi-Factor Authentication
- Set Up Self-Service Password Reset
- Implement B2B Collaboration
Secure your Data
- Azure Key Vault
- Azure Storage Service Encryption
- Azure Disk Encryption
- Azure SQL Database Security
- Azure Active Directory Managed Service Identity
Life Cycle of Machine Learning Model Development.
- Data Extraction
- Data Cleansing & Transformations
- Data Preparations
- Model Selection
- Train the Model
- Test the Model
- Validate the Model
- Measure the accuracy of the model
- Deploy the model
- Tune/Rebuild the model
Governance and Policies:
- Azure Role-Based Access Control
- Built-in Roles
- Custom Roles
- Creating a Custom Role
- Azure Resource Policies
- Azure AD Privileged Identity Management
- Azure AD Identity Protection
- Azure Security Center
- Advanced Threat Detection
- Azure Endpoint Protection
Implementing Messaging Solutions
- Azure Queue Storage
- Azure Service Bus
- Azure Event Grid
- Routing Events with Azure Event Grid
- Notification Hubs
- Designing an effective messaging architecture
Application Monitoring and Alerting Strategies
- Azure Log Analytics
- Creating a Log Analytics Workspace
- Azure Monitor
- Application Insights
- Azure Service Health
- Azure Advisor
- Address Recommendation from Azure Advisor
- Azure Network Watcher
Designing an Operations Automation Strategy
- Azure PowerShell
- Desired State Configuration
- Azure Automation
Deploy Azure Web Apps
- Overview of Azure Web Apps
- Deployment Slots
- Roll Back Deployments
- Pre- and Post-Deployment Actions
- Implement Packages
- App Service Plans
- Migrating to Another App Service Plan
- Create an App Under an App Service Plan
- Configure Web Apps
- Configure Azure Web Apps
- General Settings
- Auto Swap and Debugging Settings
- App Settings and Connection Strings
- Handlers and Virtual Directories
- Custom Domains
- Binding the SSL and Runtime Configuration
- Scaling Web Apps
- Web App Scaling – Changing the Size of an Instance
- Web App Scaling – Enable Auto scaling
- Configure Traffic Manager