Lesson 1Backup strategies: full vs incremental, logical vs physical DB backups, filesystem vs application backups, retention policiesDesign backup strategies fi servers an' databases, comparin' full an' incremental backups, logical an' physical methods, an' filesystem versus application-level approaches. Define retention, encryption, an' verification practices. No lose data, mon.
Full versus incremental backup plansLogical versus physical DB backupsFilesystem an' application-level backupsBackup encryption an' access controlRetention schedules an' legal needsLesson 2Centralized loggin': syslog vs logstash vs fluentd, log rotation, retention, index strategies, an' sizin' fi an internal appLearn how fi centralize logs fi an internal app usin' syslog, Logstash, or Fluentd. We cover log collection, rotation, retention, indexin' strategies, an' capacity sizin' fi support troubleshootin' an' compliance needs. Keep track a everyting.
Choosin' log shippers an' collectorsDesignin' log formats an' metadataLog rotation an' retention policiesIndexin' strategies fi fast searchSizin' storage an' ingestion ratesLesson 3Designin' a 4-node architecture: roles an' separation (2 web servers, 1 app worker, 1 DB, optional central log/monitor)Design a practical four-node architecture wid clear role separation. Yuh will place two web servers, one application worker, an' one database node, an' consider addin' centralized loggin' an' monitorin' fi observability an' resilience. Simple an' strong.
Definin' roles fi each server nodeWeb tier design an' reverse proxiesApplication worker patterns an' queuesDatabase placement an' connectivityAddin' shared loggin' an' monitorin'Lesson 4Network design: private networks, security groups, firewall rules, NAT, an' routin' between on-prem an' cloudLearn how fi design secure, resilient networks fi hybrid environments. We cover private subnets, security groups, firewall policies, NAT patterns, an' routin' between on-premises an' cloud fi support scalable server deployments. Keep it locked down.
Designin' private an' public subnetsSecurity groups an' firewall rule designNAT gateways an' outbound internet accessRoutin' between on-prem an' cloud VPCsNetwork segmentation fi app tiersLesson 5Patch management: OS package lifecycle, configuration management tools (Ansible, Puppet, Salt), scheduled windows an' rollback plansPlan an' operate patch management fi operatin' systems an' applications. Learn package lifecycles, usin' Ansible, Puppet, or Salt, schedulin' maintenance windows, testin' updates, an' preparin' rollback an' communication plans. Stay up to date safe.
OS an' package lifecycle conceptsUsin' Ansible, Puppet, or SaltPatch testin' an' stagin' environmentsSchedulin' maintenance windowsRollback strategies an' communicationLesson 6Access control an' authentication: SSH key management, bastion host patterns, jumpboxes, VPN placement, MFA considerationsDesign secure access control fi servers usin' SSH keys, bastion hosts, an' VPNs. Learn key lifecycle management, jumpbox patterns, MFA integration, an' loggin' a administrative access fi compliance an' incident response. No unauthorized entry.
SSH key generation an' rotationBastion hosts an' jumpbox patternsVPN placement an' traffic flowsIntegratin' MFA fi admin accessAudit an' loggin' remote sessionsLesson 7Restore testin': recovery drills, point-in-time restore fi databases, RTO/RPO concepts an' how fi validate restoresUnderstand how fi prove backups are usable through structured restore testin'. Yuh will practice recovery drills, database point-in-time restores, an' validation steps aligned wid RTO an' RPO targets fi critical internal services. Test it fi real.
Definin' RTO an' RPO objectivesPlannin' an' runnin' recovery drillsTestin' database point-in-time restoresValidatin' application-level restoresDocumentin' an' reviewin' test resultsLesson 8Runbooks an' operational playbooks: creatin' an' storin' runbooks, change management, runbook examples fi common tasksCreate effective runbooks an' operational playbooks fi routine an' emergency tasks. Learn structure, storage, an' change control, an' review concrete examples fi deployments, restarts, incident triage, an' rollback steps. Guide fi every situation.
Runbook structure an' required detailsVersionin' an' storin' runbooksChange management an' approvalsRunbooks fi common maintenance tasksIncident response an' escalation playbooksLesson 9Basic monitorin' an' alertin' architecture: metrics, logs, traces; choosin' a monitorin' stack (Prometheus, Grafana, Alertmanager, Nagios, Zabbix)Build a basic monitorin' an' alertin' architecture usin' metrics, logs, an' traces. Compare Prometheus, Grafana, Alertmanager, Nagios, an' Zabbix, an' design alert rules, dashboards, an' escalation paths fi internal services. Watch everyting close.
Key metrics, logs, an' tracin' signalsSelectin' a monitorin' tool stackDesignin' dashboards fi operatorsAlert rules, thresholds, an' noise controlEscalation policies an' on-call flowsLesson 10High-availability an' redundancy tradeoffs fi a mid-size internal app (load balancin', sticky sessions, session stores)Explore high-availability patterns an' redundancy tradeoffs fi a mid-size internal app. Learn load balancin' options, handlin' sticky sessions, external session stores, an' failure scenarios fi balance cost, complexity, an' uptime. Keep it runnin'.
Identifyin' availability requirementsLoad balancer types an' health checksSticky sessions versus stateless designExternal session stores an' cachin'Failure modes an' graceful degradation