AAA in AWS
Authentication, Authorization, and Access Control
Authentication, Authorization, and Access Control
Using Access Control List (ACL) Plugin in Kong
Kubernetes plugins enforcing API policies
Accelerate Digital Transformation
Aggregation Examples
Aggregation Operators in PromQL
Aggregations
Artificial Intelligence and Machine Learning
Using AI Prompt Decorator Plugin in Kong
Using AI Prompt Plugin in Kong
Using AI Prompt Template Plugin in Kong
Using AI Proxy Plugin in Kong
CloudWatch Alarms and EventBridge
Alertmanager Architecture
Alerting in Prometheus
Fully managed 'front-door' for applications
Serverless, interactive analytics service
Fully managed and scalable IAM
Fully managed NoSQL database
Intelligent threat detection
Automated and continual vulnerability management
Real-time streaming data at a large scale
Protecting sensitive data
Fully managed, open-source message brokers
Amazon Opensearch
Relational database service
Securing your Amazon RDS Databases
Amazon Simple Storage Service (Amazon S3)
Fully managed Pub/Sub service
Distributed message queuing service
First things you need to know
Azure Analytics
Apache Hadoop
Apache Kafka
Apache Spark
Linux security module for application access control.
Deploying Cloud Native Applications
Layer 7 LoadBalancer for your applications
Application Lifecycle Management
Elasticsearch Archietcture
ArgoCD
Attach and detaching from containers
Audit Logs for Access Monitoring
Authentication and Authorization
Authentication and Encryption in Prometheus
Authentication Mechanisms
Authorization Mechanisms
Basics of AWS Compute
What good automation looks like
Compliance Management with Artifact and Macie
Provision and manage SSL/TLS certificates
Using CLI and SDK
Infrastructure As Code by AWS
Fully managed continuous integration
Private Git repositories in AWS
AWS CodeDeploy
Fully managed continuous delivery
Basics of AWS Compute
Assess, audit, and evaluate configurations
Running containers in AWS
Different database options in AWS
Disaster Recovery Methods
Managed application deployment
Using CLI and SDK
Create and control your cryptographic keys
AWS Logs
Build and deploy serverless applications
Centrally manage your secrets
Resources for the exam
Migrate petabyte-scale data to AWS
Use cloud storage with on-prem applications
Optimize costs, performance, etc.
Active Directory in Azure
Fully managed platform as a service (PaaS)
Architecting solutions in Azure
Scalable and secure object storage in the cloud
Virtual machines in Azure
Analyze all your data in a single place
Integration with Azure over a private connection
Managed File Shares and Storage
Azure's Content Delivery Network (CDN)
Serverless compute in Azure
Identity and Access Management
Distributign traffic across backend resources
Serverless workflow integration platform
Block storage for Azure Virtual Machines
Secure yoru Azure resources with MFA.
Migrating applications to Azure
Durable queues for large-volume cloud services.
Azure Security
Highly available storage in the cloud
Storage for non-relational structured data in the cloud
Private networks in Azure
Centralized protection of your web applications
Using Basic Authentication in Kong
Being Cloud Native
Notes for the Microsoft Azure Security Technologies (AZ-500)
Changing deprecated API versions
Cheatsheet: Kubernetes Commands
Chrome DevTools
Set up CI/CD pipelines in AWS
CIS Security Benchmarks
Passing an Argument
Using Client Libraries
Overview
Public Cloud
Being Cloud Native
Software as a Service - SaaS
Amazon CloudTrail
Amazon CloudWatch
Cluster Maintenance
Defining default commands on containers
CNCF Projects
Common Log Formats
Overview
Communications between networks and resources
Etsy
Components of an Azure LoadBalancer
Dealing with Concurrency in Elasticsearch
Storing non-sensitive data
Alertmanager Configuration
Visualization using Console Templates
Consumers, Plugins, and Upstreams
Container Best Practices
Container Metrics
Container Resource Requirements
Isolating containers for enhanced security
Container Security
Containerized Kong and Other Applications
Container Management Challenges
Containers in Azure
CRUD Operations
Custom Kuberenetes resource types
Container Management Challenges
Datacenters
Data Modelling and Parent-Child Relationships in Elasticsearch
Data Processing in Azure
Ways to protect your data in AWS
Database Security
A 10,000 ft view of Microsoft Azure
Distributed Denial of Service (DDoS)
Dependencies in Docker Compose
Deployments
In a Nutshell
Disable open ports
Dead-Letter Queue Plugin
Docker Architecture
Docker Cheatsheet
Managing multiple containers
Docker Compose Issues
Layers for containers
Networking for containers
Docker Objects
Running Docker on Windows
Where you store and share container images
Cluster of nodes working together
Dynamic Data Masking in Azure SQL
Based on naming convention, pricing, and purpose.
ENIs, ENAs, and the sorts
EBS and EFS
Elastic Cloud
How ELB Works
Elastic Stack
Basics of Elasticsearch
Elasticsearch SQL
Securing your Loadbalacers
Enabling API versions
Environment Variables
Error Guides
Error: Failing to Delete CloudFormation Stack
etcd Default Server Port
Exporters in Prometheus
Kubernetes visibility through Falco
Using security groups in Azure
Securing your AWS Account
A guide in designing and running workloads in the cloud
Flattened Data Type in Elasticsearch
Amazon FSx and AWS DataSync
Using Analyzers to Cotrol Full-Text Search
Functions in PromQL
Fuzzy Matching in Elasticsearch
Pre-requisites
Generator Plugin
GitOps Basics
Introduction to GitOps
Go Cheatsheet
Heartbeat Plugin
Helm Chart and Templates
Helm Cheat Sheet
Helm Package Manager
Using HMAC Authentication in Kong
VirtualBox NOtes
Easy to follow checklists for helpful automations
Prometheus HTTP API
HTTP Get Client Application
HTTP Poller Plugin
Identity and Access Management
Setting up VS Code for Development
Importing CSV Data
Importing JSON Data
Search Indexing
Securing your AWS Infrastructure
Ingesting Logs from S3
Inputs and Port Mapping
Install Docker Compose
Install Docker Desktop
Install Docker on RHEL/CentOS
Install Docker on Ubuntu
Install Docker on WSL2 without Docker Desktop
Install Kong
Installation
Installing Logstash on a Virtual Machine
Installing Prometheus on virtual machines
Introduction to Kong
Introduction to Observability
Jobs and CronJobs
JSON Search
Using JWT Authentication in Kong
Using Key Authentication in Kong
Kibana by Example
Kibana Canvas
Kibana Lens
Kibana Management
Kubeconfig File
Kubelet Security
Container Management Challenges
Kubernetes API Objects
Container Management Challenges
Kubernetes Ecosystem
Kubernetes in the Cloud
Kubernetes Ingress
Kubernetes Networking
Kubernetes Patterns for Application Developers
Services, ClusterIP, NodePort, and LoadBalancers
Labels, Selectors, and Annotations
Run code without provisioning servers
Improving Lead Time
Least Privilege Principle
Using a plugin to limit and terminate requests
Limit Node Access
Leveraging linux features
The Linux kernel enhances resource management.
Linux Privilege Escalation
Container Logging
Logging and monitoring options in AWS
CloudWatch Logs and Insights
Logstash with MySQL
Tools for managing Azure resources
Detecting and remediating incidents
Configuration file for resources
Mapping Exceptions in Elasticsearch
Mappings
Metrics
Metrics in Prometheus
A 10,000 ft view of Microsoft Azure
Best practices for securing container images
Minimize IAM Roles
Multi-Line Logs
Multi-Stage Builds
Mutable and Immutable Infrastructure
Indexing with N-grams in Elasticsearch
Network Policy
Networking Security
New Subscription shows Zero Credit
nodeSelectors and nodeAffinity
Lessons learned from 'The DevOps Handbook'
Offline Install
Authenticating client and server communication
Enforcing policies across systems
Operators in PromQL
Pagination
Parsing and Filtering with Grok
Partial Matching in Elasticsearch
Persisting Data
Phrase Search
Placeholder
Placeholder
Planning your costs in Azure
Container Management Challenges
Container Management Challenges
Security rules for pod deployments
The building blocks of Kubernetes
Product is live. What's next?
Pre-requisites for Container Labs
Connecting privately through a network interface
Probes and Multi-Container Pods
Basics of Prometheus
Using Prometheus Plugin in Kong
Prometheus Query Language
Kubectl Proxy and Port Forwarding
Using Proxy Caching plugin in Kong
Batch Jobs and PushGateways
Query Lite Interface
Setup Go in Minutes
Receiver and Notifiers in Prometheus
Recording Rules in PromQL
Reducing costs in your Azure solutions
From locally-redundant to geo-zone-redundant storage
Remove Obsolete Packages and Services
ReplicaSets and Scaling
Resources, bookmarks
Restrict Kernel Modules
Restrict Network Access
Limiting the access on your S3 Buckets
Role-Based Access Control
Rollouts and Rollbacks
Methods to encrypt S3
Optimize your S3 Buckets
Securing your S3 Bucket
S3 Storage Classes
Sample Pipeline
Detect security vulnerabilities in container images.
Scheduling Pods
Schema and Handler
Search as you type in Elasticsearch
Filter system calls to enhance application security
Storing sensitive information
Securing each step of the automation
Securing Azure Solutions with Azure Active Directory
Securing Control Plane Communications with Ciphers
Securing the Docker Daemon
Security Contexts
Using Security Plugins in Kong
Security Primitives
Server management done by the Cloud
Server management done by the Cloud
Service Accounts
Service Discovery
Use Github Profile README to showcase your portfolio
Container Management Challenges
Steps to setup development laptop for new work projects.
Setting up Prometheus Exporters
Sharing Data in Docker Compose
Service Level Agreement and Lifecycle Policy
Sorting in Elasticsearch
Difference between the three services
SSH Hardening
SSL/TLS Configuration
Stateless and Stateful
Inspect container images for security issues.
Pods managed directly by the kubelet
Status Codes and Restart Policies
Comparing AWS Storage Options
Storage Security
Subqueries and Histograms in PromQL
Syslog with Logstash
Adding tags to container images
Influencing the scheduling of Pods
Notes on Terminal and CLI Tools
Testing Alerts in Prometheus
Testing Grok Patterns
Testing with FastAPI Endpoints
A guide to successful cloud adoption
Cloud Computing
Thinking like a Developer
TLS Basics
TLS in Kubernetes
Record of my current setup
Tracing Linux Syscalls
Using Transformer Plugins in Kong
Troubleshooting Basics
Tools for troubleshooting, governance, and ensuring compliance
Twitter Input Plugin
UDP Logs and ELK Stack Integration
Uninstall Docker
Uninstall Elasticsearch
Uninstall Kibana
Updating Data in Elasticsearch
Cloud Migration
Importing data using Client Libraries into Elasticsearch
Using Docker without Root Permission
Importing data using Scripts into Elasticsearch
Using the Kong Admin API
Setting up Elastic Stack using Vagrant
Checking and enforcing policies with Admission Controllers
Vector Matching in PromQL
VirtualBox NOtes
Visual Studio Code Extensions
Visualization in Prometheus
Peering between virtual networks
Volumes and StorageClass
Seamless integration between on-premise and the cloud
Issues encountered on VSCode Source Control Extension
Security through Managed Firewall and API Gateway features
Webhooks for validation and modification policies.
Docker containers
Limit image sources to trusted registries only.
WSL suddenly stopped working on both Command Prompt and Powershell
Zero Trust Concepts
Using Zipkin Plugin in Kong