SirGod Posted October 22, 2014 Report Posted October 22, 2014 Spor la citit. Content:[LIST][*]Introduction[LIST][*]Goals and Focus[*]Syllabus layout[/LIST][*]Contributions[LIST][*]How we’ll organize work[*]How to contribute[*]Rewards for contributions[*]Ops School Videos[*]How to write sections[*]Overwriting existing content[*]Credits[/LIST][*]Guidelines[*]Careers in Operations[LIST][*]Deciding a career path[*]Generalized career paths[*]Specialized career paths[*]How to become an operations engineer[/LIST][*]Sysadmin 101[LIST][*]What is Systems Administration?[*]What is Development?[*]Contrasting Development and Operations[*]History of Development and Operations[*]What System Administration Isn’t[/LIST][*]Unix fundamentals 101[LIST][*]File systems[*]Shells[*]Package management[*]The Boot Process[*]Useful shell tools[*]Crontab[/LIST][*]Unix fundamentals 201[LIST][*]Kernel tuning[*]Signals[*]Syscalls[*]Booting over the network[*]/bin/init and its descendants[*]Looking at system metrics[/LIST][*]MS Windows fundamentals 101[*]Text Editing 101[LIST][*]A little history[*]vi basics[/LIST][*]Text Editing 201[LIST][*]Vim[*]Emacs[/LIST][*]Tools for productivity[LIST][*]Terminal emulators[*]SSH[*]SSH Use Cases[*]Multiplexers[*]Shell customisations[*]Mosh[*]Ticketing systems[*]Note-taking[/LIST][*]Security 101[LIST][*]Authentication in unix[*]Adding and deleting users and groups[*]Standard unix filesystem permissions[*]PAM[*]Chroot, jails and containers[*]Sudo (or, “Why you should not log in as root”)[*]History and Lore[/LIST][*]Security 201[LIST][*]Centralised accounts[*]Firewalls and packet filters[*]Public Key Cryptography[*]Two factor authentication[*]Building systems to be auditable[*]Network Intrusion Detection[*]Host Intrusion Detection[*]Defense practices[*]Risk and risk management[*]Compliance: The bare minimum[*]Dealing with security incidents[*]ACLs and extended attributes (xattrs)[*]SELinux[*]Data placement[*]Additional reading[/LIST][*]Troubleshooting[LIST][*]Methodologies[*]Working effectively during a crisis[/LIST][*]Networking 101[LIST][*]The RFC Documents[*]OSI 7-layer model (OSI Reference Model)[*]TCP/IP (ARPA) 4-layer model[*]IP Addressing[*]TCP vs UDP[*]Subnetting, netmasks and CIDR[*]Private address space (RFC 1918)[*]Static routing[*]NAT[*]Networking cable[/LIST][*]Networking 201[LIST][*]VLANs, 802.1q tagging[*]Spanning Tree[*]Static Routing[*]Dynamic routing protocols (RIP, OSPF, BGP)[*]ACLs[*]Network Bonding (802.3ad / LACP link aggregation)[*]IOS switch configuration[*]GRE and other tunnels[*]Multi-homed hosts[*]Similarities and differences between IPv4 and IPv6 networking[*]Implications of dual-stack firewalls (especially under Linux)[*]Multicast uses and limitations[*]Latency vs. Bandwidth[*]VPNs[/LIST][*]Common services[LIST][*]System daemons 101[*]DNS 101[*]DNS 201[*]DHCP[*]HTTP 101 (Core protocol)[*]HTTP 201 (Application Servers & Frameworks)[*]SMTP 101[*]SMTP 201[/LIST][*]Identity Management 101[LIST][*]LDAP[*]NIS[/LIST][*]Active Directory 101[LIST][*]What is Active Directory?[*]What is Active Directory used for?[*]You mention “separate components”; what is Active Directory composed of?[*]What specific services does Active Directory provide?[*]Best Practices for managing an Active Directory installation[/LIST][*]Active Directory 201[LIST][*]Detailed Breakdown of Active Directory Components/Services[*]Advanced Active Directory Maintenance[/LIST][*]Remote Filesystems 101[LIST][*]NFSv3[*]iSCSI[*]SAMBA/CIFS[/LIST][*]Remote Filesystems 201[LIST][*]GlusterFS[*]NFSv4[*]Netatalk / AFP[*]S3[/LIST][*]Programming 101[LIST][*]Shell scripting basics[*]Regular Expressions[*]Sed & awk[*]GIGO[/LIST][*]Programming 201[LIST][*]Common elements in scripting, and what they do[*]C (A very basic overview)[*]Ruby[*]Python[*]Version Control[*]API design fundamentals[*]Continuous Integration[/LIST][*]Hardware 101[LIST][*]Hardware Types[*]Basic server architecture[*]Disk management[*]Performance/Redundancy[*]Troubleshooting[/LIST][*]Datacenters 101[LIST][*]Power budgets[*]Cooling budgets[*]You will be judged by the tidiness of your rack[*]Machine and cable labeling[*]Traditional naming conventions[/LIST][*]Datacenters 201[LIST][*]Networking many racks[*]Power[*]Cooling[*]Physical security and common security standards compliance requirements[*]Suggested practices[/LIST][*]Datacenters 301[LIST][*]Power[*]Increasing cooling efficiency[*]Design Options[/LIST][*]Virtualization 101[LIST][*]Intro to virtualization technologies[*]The Cloud[/LIST][*]Virtualization 201[LIST][*]Managing virtualized infrastructures (Private clouds)[*]Leveraging virtualization for development[*]Leveraging virtualization for production[*]Security implications of virtualization[/LIST][*]Logs 101[LIST][*]Common system logs & formats[*]Standard Error[*]Log files[*]Syslog[*]Log rotation, append, truncate[*]Retention and archival[/LIST][*]Logs 201[LIST][*]Centralized logging[*]Log parsing[*]Search & Correlation[/LIST][*]Databases 101 (Relational Databases)[LIST][*]What is a Database?[*]What is a Relational Database?[*]Why We Use Databases?[*]What is SQL?[*]SQL shell[*]Creating databases[*]Creating users[*]Create Tables[*]Alter Table[*]Drop Table[*]Data Type[*]Granting privileges[*]Removing Privileges[*]Basic normalized schema design[*]Select, Insert, Update and Delete[*]Pro Tips[/LIST][*]Databases 201[LIST][*]Database Theory[*]Document Databases[*]Key-value Stores[*]Graph Databases[/LIST][*]Application Components 201[LIST][*]Message Brokers[*]Memory Caches[*]Specialized Caches[/LIST][*]Load Balancing[LIST][*]Why do we use load balancers?[*]Application implications[*]Non-HTTP use cases[*]Software[*]Hardware[*]Multi-dc[/LIST][*]Monitoring, Notifications, and Metrics 101[LIST][*]History: How we used to monitor, and how we got better (monitors as tests)[*]Perspective (end-to-end) vs Introspective monitoring[*]Metrics: what to collect, what to do with them[*]Common tools[/LIST][*]Monitoring, Notifications, and Metrics 201[LIST][*]Dataviz & Graphing[*]Graphite, StatsD[*]Dashboard: Info for ops and info for the business[*]Third-party tools[/LIST][*]Business Continuity Planning[LIST][*]Backups[*]Outages[*]Postmortems[*]Disaster Recovery[/LIST][*]Architecture 101[LIST][*]How to make good architecture decisions[*]Patterns and anti-patterns[*]Introduction to availability[*]Introduction to scalability[/LIST][*]Architecture 201[LIST][*]Service Oriented Architectures[*]Fault tolerance, fault protection, masking, dependability fundamentals[*]Caching Concerns[*]Crash only[*]Synchronous vs. Asynchronous[*]Business continuity vs. Disaster Recovery[*]Designing for Scalability: Horizontal, Vertical[*]Simplicity[*]Performance[*]Tiered architectures[*]MTTR > MTBF[/LIST][*]Configuration Management 101[LIST][*]A Brief History of Configuration Management[*]Idempotence[*]Convergent and Congruent systems[*]Direct and Indirect systems: ansible, capistrano[*]Chef[/LIST][*]Configuration Management 201[LIST][*]Ansible[*]Puppet[*]Cfengine 3[*]SaltStack[/LIST][*]Capacity Planning[LIST][*]Fundamentals of capacity planning[*]Forecasting[*]Diagonal scaling[/LIST][*]Statistics For Engineers[LIST][*]Normal distributions[*]Percentiles, histograms, averages, mean, medians[/LIST][*]Software Deployment 101[LIST][*]Software deployment vs configuration management[*]Running services[*]Package management[/LIST][*]Software Deployment 201[LIST][*]Running services[/LIST][*]Soft Skills 101[LIST][*]Communication basics[*]Communication Modes[*]Special cases for operations[*]Time Management[*]Project Management[*]The Tao of DevOps[*]The importance of Documentation[*]Working with other teams[/LIST][*]Soft Skills 201[LIST][*]Business Acumen in Operations[*]Understanding the role of operations[*]Thinking broadly[*]Promoting Change[*]Building basic business skills[*]Specific Examples[/LIST][*]Labs exercises[LIST][*]Bare-Metal Provisioning 101[*]Bare-Metal Provisioning 201[*]Cloud Provisioning 101[*]Cloud Provisioning 201[*]Database 101[*]Database 201[*]Database 301[*]Automation 101[*]Automation - Chef 201[*]Automation - Chef 301[*]Automation - Chef 302[*]Automation - Puppet 201[*]Automation - Puppet 301[*]Package Management 101[*]Package Management 201[*]Build automation fleets[*]Version Control with Git 101[*]DNS 101[*]HTTP 101[/LIST][*]Learning and the Community[LIST][*]Learning and strategies for improvement[*]Things to keep in mind as you learn how to be an engineer[*]Golden rules for careers in ops[*]Where to look for help in the community[/LIST][*]See also[*]Contributions[LIST][*]How we’ll organize work[*]How to contribute[*]Rewards for contributions[*]Ops School Videos[*]How to write sections[*]Overwriting existing content[*]Credits[/LIST][*]Conventions[LIST][*]Style Guide[*]Sample Network[/LIST][*]Style Guide[LIST][*]Editing[/LIST][*]Glossary[/LIST]Link:http://www.opsschool.org/en/latest/index.html 1 Quote