• [email protected]
  • Call/WhatsApp: +91 95131 83270
  • Newsletter
  • [email protected]
  • Call/WhatsApp: +91 95131 83270
  • HOME
  • ABOUT ME
  • CONTACT US
BUY NOW
Login / Register
Sign inCreate an Account

Lost your password?
0 items / ₹0.00
Menu
Login / Register
Sign inCreate an Account

Lost your password?
0 items / ₹0.00
-33%
Click to enlarge

Pay for Content

₹1,500.00 ₹1,000.00

Copyright SRE University 2024, All Rights Reserved.
payments
  • Observability – Monitoring and Dashboard -Chapter 1
    • Observability – Monitoring and Dashboard -Chapter 2
    • Observability – Monitoring and Dashboard -Chapter 3
    • Observability – Monitoring and Dashboard – Practical Session – Chapter 4
    • Obsevability Collection- Chapter 5
    • Observability Pipeline- Chapter 6
    • Sensu Observability Pipeline – Chapter 7
    • Monitoring as code– Chapter 8
    • Observability – Data pipeline – Chapter 9
    • Chapter 10 – Jaeger
    • Chapter 11 – Prometheus and Grafana Errors & Solutions
  • Health Checks
    • Linux SysOps Handbook – Chapter 2
    • Health Checks – Chapter 3
  • Distributed Tracing – Open Telemetry
  • Alert Standardization – Chapter 1
    • Alert Standardization – Chapter 2
    • Alert Standardization – Chapter 3
    • Alert Standardization – Chapter 4
    • Alert Standardization – Chapter 5
    • Alert Standardization – Chapter 6
    • Alert Standardization – Chapter 7
  • Capacity Validation – Chapter 1
    • Capacity Validation – Chapter 2
    • Capacity Validation – Chapter 3
  • Incident Management – Chapter 1
    • Incident Management – Chapter 2
    • Incident Management – Chapter 3
  • Logging Standards -Chapter 1
    • Logging Standards – Chapter 2
    • Logging Standards – Chapter 3
    • Logging Standards – Chapter 4
    • Logging Standards – Chapter 5
  • Performance Testing and Engineering – Chapter 1
    • SRE vs Performance Testing – Chapter 2
    • Best Practices – Chapter 3
    • Performance Testing – Chapter 4
    • Best Practices – Chapter 5
  • Toil Automation – Ansible – Chapter 1
    • Ansible – Chapter 2
    • Terraform – Chapter 3
  • Chaos Engineering – Resiliency Testing – Chapter 1
    • Chaos Engineering – Resiliency Testing – Chapter 2
    • Chaos Engineering – Resiliency Testing – Chapter 3
    • Chaos Engineering – Resiliency Testing – Chapter 4
    • Chaos Engineering – Resiliency Testing – Practical Hands on
  • Disaster recovery and Failover strategy – Chapter 1
    • Failover vs disaster recovery – Chapter 2
    • Difference Between Failover and Disaster Recovery – Chapter 3
    • Azure storage disaster recovery planning and failover – Chapter 4
    • Failover vs Disaster Recovery – Chapter 5
  • Post-mortem Analysis
  • Run book Evaluation and best practice standardization
  • SRE KPI – Latency , throughput , Error budget and Saturation [ Golden signals]
    • SRE KPI – Chapter 2
  • Aiops – Production outage proactive solutions – Chapter 1
    • Aiops – Production outage proactive solutions – Chapter 2
    • Aiops – Production outage proactive solutions – Chapter 3
    • Aiops – Production outage proactive solutions – Chapter 4
    • Aiops – Production outage proactive solutions – Chapter 5
    • Aiops – Production outage proactive solutions – Chapter 6
  • SLA , SLO , SLI
    • SLI , SLO , SLA- Chapter 2
  • High Availability , Reliability , Fault tolerance , circuit breaker – Chapter 1
    • Fault Tolerance in Microservices- Chapter 2
    • High Availability vs. Fault Tolerance vs. Disaster Recovery – Chapter 3
    • High availability versus fault tolerance- Chapter 4
  • Storage
    • Data Storage- Chapter 1
    • File and Block Storage Deployment – Chapter 2
    • Chapter 3
    • Data Storage Fundamentals – Chapter 4
    • Object storage vs. block storage- Chapter 5
    • SAN vs. NAS vs. DAS- Chapter 6
    • DAS vs NAS vs SAN- Chapter 7
    • SAN vs. NAS vs. DAS- Chapter 8
    • DAS, NAS & SAN – Chapter 9
    • NAS, SAN and DAS – Chapter 10
  • Data Center
    • Data center best practices- Chapter 1
    • Data Center Best Practice Security – Chapter 2
    • Data Center Design – Chapter 3
    • Guide to Data Center Design – Chapter 4
    • Data Center Architecture Essentials – Chapter 5
    • Data Center Design – Chapter 6
    • Data Center Design Guides – Chapter 7
    • Data Center Design Guides – Chapter 8
    • Data center consolidation- Chapter 9
  • Best Practice
    • Best Practice – Terraform – Chapter 1
      • Best Practice – Terraform – Chapter 2
      • Best Practice – Terraform – Chapter 3
      • Best Practice – Terraform – Chapter 4
      • Best Practice – Terraform – Chapter 5
      • Best Practice – Terraform – Hands on
    • Best Practice – Ansible – Chapter 1
      • Best Practice – Ansible – Chapter 2
      • Best Practice – Ansible – Chapter 3
      • Best Practice – Ansible – Chapter 4
      • Best Practice – Ansible – Chapter 5
      • Best Practice – Ansible – Chapter 6
      • Best Practice – Ansible – Chapter 7
      • Best Practice – Ansible – Chapter 8
      • Best Practice – Ansible – Hands on
      • Ansible – Automation – Chapter 9
      • Ansible – Automation – Chapter 10
    • Best Practice – Kubernetes- Chapter 1
      • Best Practice – Kubernetes- Chapter 2
      • Best Practice – Kubernetes- Chapter 3
      • Best Practice – Kubernetes- Chapter 4
      • Best Practice – Kubernetes- Chapter 5
      • Kubernetes best practice – Chapter 6
    • Best Practice – docker – Chapter 1
      • Best Practice – docker – Chapter 2
      • Best Practice – docker – Chapter 3
      • Best Practice – docker – Chapter 4
      • Best Practice – docker – Chapter 5
      • Best Practice – docker – Chapter 6
    • Jenkins Best Practices – Chapter 1
      • Best Practices for Jenkins Pipeline – Chapter 2
  • Security
    • Chapter 1 – Top 7 web application security
    • Chapter 2 – Trivy
    • Chapter 3 – Sealed Secrets
    • Chapter 4 – Terrascan
    • Chapter 5 – KubeArmor
    • Chapter 6 – kube-bench
    • Chapter 7 – Goldilocks
    • Chapter 11- OPA
    • Chapter 8 – Flagger
    • Chapter 12- OpenCost
    • Chapter 9 – Cilium
    • Chapter 13- Pluto
    • Chapter 10- Falco
    • Chapter 14- Keda
    • Chapter 15- k9s
    • Chapter 16- Headlamp
    • Chapter 17- Kube Linter
  • Cyber Security
    • Cyber Security- Chapter 2
  • Network Reliability
    • Network Reliability – Chapter 2
    • Network Reliability- Chapter 3
  • Large Language Models (LLMs) in SRE
    • Enhanced troubleshooting for SREs -Chapter 2
    • Large Language Models (LLMs) in SRE – Chapter 3
    • GEN AI how it will help for SRE – Chapter 4
    • Gen AI – Chapter 5
  • Build own Private Cloud
    • Private Cloud Openstack RDO – Chapter 2
    • Private cloud openstack RDO – Chapter 3
    • AWS : Trouble shooting guide -Chapter 4
    • Terraform Guide
    • LInux || Cheat sheet
  • GEN AI
    • GEN AI TOOL – Chapter 2
  • Finops
  • DevSecOps
    • Maturity Assessment Factors – Chapter 1
    • OWASP DevSecOps Guideline – Chapter 2
    • Chapter 3 – The 5 phases of DevOps maturity
    • Chapter 4 – OWASP DevSecOps Guideline
    • Chapter 5 – Devsecops – Assessment and Maturity
    • Chapter 6 – Devsecops University
    • Chapter 7 – DevOps Metrics
    • Chapter 8 – DORA Metrics
  • SRE Maturity Model
    • Chapter 1 – SRE Maturity Model
  • SRE – Case Study
    • SRE – Collection
    • SRE Cheat Sheet
    • SRE – Documentation
  • Chief Technology Officer
  • Strategy and leadership -Scope 1
    • Scope 2
  • About Me
  • Contact us
  • Buy Now
  • Login / Register
Shopping cart
close

Chat With Us