• [email protected]
  • Call/WhatsApp: +91 95131 83270
  • Newsletter
  • [email protected]
  • Call/WhatsApp: +91 95131 83270
  • HOME
  • ABOUT ME
  • CONTACT US
BUY NOW
Login / Register
Sign inCreate an Account

Lost your password?
4 items / ₹8,000.00
Menu
Login / Register
Sign inCreate an Account

Lost your password?
4 items / ₹8,000.00
View cart “Pay for Content” has been added to your cart.
View cart “Pay for Content” has been added to your cart.
View cart “Pay for Content” has been added to your cart.
View cart “Pay for Content” has been added to your cart.
-43%
Click to enlarge

Pay for Content

₹3,500.00 ₹2,000.00

Copyright SRE University 2024, All Rights Reserved.
payments
  • Observability – Monitoring and Dashboard -Chapter 1
    • Observability – Monitoring and Dashboard -Chapter 2
    • Observability – Monitoring and Dashboard -Chapter 3
    • Observability – Monitoring and Dashboard – Practical Session – Chapter 4
    • Obsevability Collection- Chapter 5
    • Observability Pipeline- Chapter 6
    • Sensu Observability Pipeline – Chapter 7
    • Monitoring as code– Chapter 8
    • Observability – Data pipeline – Chapter 9
    • Chapter 10 – Jaeger
    • Chapter 11 – Prometheus and Grafana Errors & Solutions
  • Health Checks
    • Linux SysOps Handbook – Chapter 2
    • Health Checks – Chapter 3
  • Distributed Tracing – Open Telemetry
  • Alert Standardization – Chapter 1
    • Alert Standardization – Chapter 2
    • Alert Standardization – Chapter 3
    • Alert Standardization – Chapter 4
    • Alert Standardization – Chapter 5
    • Alert Standardization – Chapter 6
    • Alert Standardization – Chapter 7
  • Capacity Validation – Chapter 1
    • Capacity Validation – Chapter 2
    • Capacity Validation – Chapter 3
  • Incident Management – Chapter 1
    • Incident Management – Chapter 2
    • Incident Management – Chapter 3
  • Logging Standards -Chapter 1
    • Logging Standards – Chapter 2
    • Logging Standards – Chapter 3
    • Logging Standards – Chapter 4
    • Logging Standards – Chapter 5
  • Performance Testing and Engineering – Chapter 1
    • SRE vs Performance Testing – Chapter 2
    • Best Practices – Chapter 3
    • Performance Testing – Chapter 4
    • Best Practices – Chapter 5
  • Toil Automation – Ansible – Chapter 1
    • Ansible – Chapter 2
    • Terraform – Chapter 3
  • Chaos Engineering – Resiliency Testing – Chapter 1
    • Chaos Engineering – Resiliency Testing – Chapter 2
    • Chaos Engineering – Resiliency Testing – Chapter 3
    • Chaos Engineering – Resiliency Testing – Chapter 4
    • Chaos Engineering – Resiliency Testing – Practical Hands on
  • Disaster recovery and Failover strategy – Chapter 1
    • Failover vs disaster recovery – Chapter 2
    • Difference Between Failover and Disaster Recovery – Chapter 3
    • Azure storage disaster recovery planning and failover – Chapter 4
    • Failover vs Disaster Recovery – Chapter 5
  • Post-mortem Analysis
  • Run book Evaluation and best practice standardization
  • SRE KPI – Latency , throughput , Error budget and Saturation [ Golden signals]
    • SRE KPI – Chapter 2
  • Aiops – Production outage proactive solutions – Chapter 1
    • Aiops – Production outage proactive solutions – Chapter 2
    • Aiops – Production outage proactive solutions – Chapter 3
    • Aiops – Production outage proactive solutions – Chapter 4
    • Aiops – Production outage proactive solutions – Chapter 5
    • Aiops – Production outage proactive solutions – Chapter 6
  • SLA , SLO , SLI
    • SLI , SLO , SLA- Chapter 2
  • High Availability , Reliability , Fault tolerance , circuit breaker – Chapter 1
    • Fault Tolerance in Microservices- Chapter 2
    • High Availability vs. Fault Tolerance vs. Disaster Recovery – Chapter 3
    • High availability versus fault tolerance- Chapter 4
  • Storage
    • Data Storage- Chapter 1
    • File and Block Storage Deployment – Chapter 2
    • Chapter 3
    • Data Storage Fundamentals – Chapter 4
    • Object storage vs. block storage- Chapter 5
    • SAN vs. NAS vs. DAS- Chapter 6
    • DAS vs NAS vs SAN- Chapter 7
    • SAN vs. NAS vs. DAS- Chapter 8
    • DAS, NAS & SAN – Chapter 9
    • NAS, SAN and DAS – Chapter 10
  • Data Center
    • Data center best practices- Chapter 1
    • Data Center Best Practice Security – Chapter 2
    • Data Center Design – Chapter 3
    • Guide to Data Center Design – Chapter 4
    • Data Center Architecture Essentials – Chapter 5
    • Data Center Design – Chapter 6
    • Data Center Design Guides – Chapter 7
    • Data Center Design Guides – Chapter 8
    • Data center consolidation- Chapter 9
  • Best Practice
    • Best Practice – Terraform – Chapter 1
      • Best Practice – Terraform – Chapter 2
      • Best Practice – Terraform – Chapter 3
      • Best Practice – Terraform – Chapter 4
      • Best Practice – Terraform – Chapter 5
      • Best Practice – Terraform – Hands on
    • Best Practice – Ansible – Chapter 1
      • Best Practice – Ansible – Chapter 2
      • Best Practice – Ansible – Chapter 3
      • Best Practice – Ansible – Chapter 4
      • Best Practice – Ansible – Chapter 5
      • Best Practice – Ansible – Chapter 6
      • Best Practice – Ansible – Chapter 7
      • Best Practice – Ansible – Chapter 8
      • Best Practice – Ansible – Hands on
      • Ansible – Automation – Chapter 9
      • Ansible – Automation – Chapter 10
    • Best Practice – Kubernetes- Chapter 1
      • Best Practice – Kubernetes- Chapter 2
      • Best Practice – Kubernetes- Chapter 3
      • Best Practice – Kubernetes- Chapter 4
      • Best Practice – Kubernetes- Chapter 5
      • Kubernetes best practice – Chapter 6
    • Best Practice – docker – Chapter 1
      • Best Practice – docker – Chapter 2
      • Best Practice – docker – Chapter 3
      • Best Practice – docker – Chapter 4
      • Best Practice – docker – Chapter 5
      • Best Practice – docker – Chapter 6
    • Jenkins Best Practices – Chapter 1
      • Best Practices for Jenkins Pipeline – Chapter 2
  • Security
    • Chapter 1 – Top 7 web application security
    • Chapter 2 – Trivy
    • Chapter 3 – Sealed Secrets
    • Chapter 4 – Terrascan
    • Chapter 5 – KubeArmor
    • Chapter 6 – kube-bench
    • Chapter 7 – Goldilocks
    • Chapter 11- OPA
    • Chapter 8 – Flagger
    • Chapter 12- OpenCost
    • Chapter 9 – Cilium
    • Chapter 13- Pluto
    • Chapter 10- Falco
    • Chapter 14- Keda
    • Chapter 15- k9s
    • Chapter 16- Headlamp
    • Chapter 17- Kube Linter
  • Cyber Security
    • Cyber Security- Chapter 2
  • Network Reliability
    • Network Reliability – Chapter 2
    • Network Reliability- Chapter 3
  • Large Language Models (LLMs) in SRE
    • Enhanced troubleshooting for SREs -Chapter 2
    • Large Language Models (LLMs) in SRE – Chapter 3
    • GEN AI how it will help for SRE – Chapter 4
    • Gen AI – Chapter 5
  • Build own Private Cloud
    • Private Cloud Openstack RDO – Chapter 2
    • Private cloud openstack RDO – Chapter 3
    • AWS : Trouble shooting guide -Chapter 4
    • Terraform Guide
    • LInux || Cheat sheet
  • GEN AI
    • GEN AI TOOL – Chapter 2
  • Finops
  • DevSecOps
    • Maturity Assessment Factors – Chapter 1
    • OWASP DevSecOps Guideline – Chapter 2
    • Chapter 3 – The 5 phases of DevOps maturity
    • Chapter 4 – OWASP DevSecOps Guideline
    • Chapter 5 – Devsecops – Assessment and Maturity
    • Chapter 6 – Devsecops University
    • Chapter 7 – DevOps Metrics
    • Chapter 8 – DORA Metrics
  • SRE Maturity Model
    • Chapter 1 – SRE Maturity Model
  • SRE – Case Study
    • SRE – Collection
    • SRE Cheat Sheet
    • SRE – Documentation
  • Chief Technology Officer
  • Strategy and leadership -Scope 1
    • Scope 2
  • About Me
  • Contact us
  • Buy Now
  • Login / Register
Shopping cart
close

Chat With Us