Muutke küpsiste eelistusi

E-raamat: Modern System Administration

  • Formaat: 328 pages
  • Ilmumisaeg: 16-Nov-2022
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9781492055181
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 47,96 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 328 pages
  • Ilmumisaeg: 16-Nov-2022
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9781492055181
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Early system administration required in-depth knowledge of a variety of services on individual systems. Now, the job is increasingly complex and different from one company to the next with an ever-growing list of technologies and third-party services to integrate. How does any one individual stay relevant in systems and services? This practical guide helps anyone in operations&;sysadmins, automation engineers, IT professionals, and site reliability engineers&;understand the essential concepts of the role today.

Collaboration, automation, and the evolution of systems change the fundamentals of operations work. No matter where you are in your journey, this book provides you the information to craft your path to advancing essential system administration skills. Author Jennifer Davis provides examples of modern practices and tools with recommended materials to advance your skills.

Topics include:

    Development and testing: Version control, fundamentals of virtualization and containers, testing, and architecture reviewDeploying and configuring services: Infrastructure management, networks, security, storage, serverless, and release managementScaling administration: Monitoring and observability, capacity planning, log management and analysis, and security and compliance
Foreword xi
Preface xiii
Introducing Modern System Administration xix
Part I Reasoning About Systems
1 Patterns and Interconnections
1(10)
How to Connect Things
2(3)
How Things Communicate
5(1)
Application Layer
6(1)
Transport Layer
6(2)
Network Layer
8(1)
Data Link Layer
8(1)
Physical Layer
9(1)
Wrapping Up
9(2)
2 Computing Environments
11(12)
Common Workloads
11(2)
Choosing the Location of Your Workloads
13(1)
On-Prem
13(1)
Cloud Computing
14(1)
Compute Options
15(1)
Serverless
15(1)
Containers
16(2)
Virtual Machines
18(1)
Guidelines for Choosing Compute
19(2)
Wrapping Up
21(2)
3 Storage
23(16)
Why Care About Storage?
24(1)
Key Characteristics
25(2)
Storage Categories
27(1)
Block Storage
27(1)
File Storage
28(1)
Object Storage
28(1)
Database Storage
29(2)
Considerations for Your Storage Strategy
31(2)
Anticipate Your Capacity and Latency Requirements
33(1)
Retain Your Data as Long as Is Reasonably Necessary
33(1)
Respect the Privacy Concerns of Your Users
34(1)
Defend Your Data
35(1)
Be Prepared to Handle Disaster Recovery Situations
36(1)
Wrapping Up
37(2)
4 Network
39(12)
Caring About Networks
39(1)
Key Characteristics of Networks
40(1)
Build a Network
41(1)
Virtualization
42(1)
Software-Defined Networks
43(1)
Content Distribution Networks
44(2)
Guidelines to Your Network Strategy
46(1)
Wrapping Up
47(4)
Part II Practices
5 Sysadmin Toolkit
51(10)
What Is Your Digital Toolkit?
51(2)
The Components of Your Toolkit
53(1)
Choosing an Editor
53(2)
Choosing Programming Languages
55(2)
Frameworks and Libraries
57(1)
Other Helpful Utilities
57(3)
Wrapping Up
60(1)
6 Version Control
61(6)
What Is Version Control?
62(1)
Benefits of Version Control
63(1)
Organizing Infra Projects
64(2)
Wrapping Up
66(1)
7 Testing
67(12)
You're Already Testing
67(1)
Common Types of Testing
68(1)
Linting
68(2)
Unit Tests
70(1)
Integration Tests
71(1)
End-to-End Tests
71(1)
Explicit Testing Strategy
72(3)
Improving Your Tests; Learning from Failure
75(2)
Next Steps
77(1)
Wrapping Up
77(2)
8 Infrastructure Security
79(10)
What Is Infrastructure Security?
79(1)
Share Security Responsibilities
80(2)
Borrow the Attacker Lens
82(2)
Design for Security Operability
84(2)
Categorize Discovered Issues
86(1)
Wrapping Up
87(2)
9 Documentation
89(8)
Know Your Audience
89(2)
Dimensions of Documentation
91(1)
Organization Practices
92(1)
Organizing a Topic
92(1)
Organizing a Site
93(1)
Recommendations for Quality Documentation
93(2)
Wrapping Up
95(2)
10 Presentations
97(22)
Know Your Audience
97(3)
Choose Your Channel
100(1)
Choose Your Story Type
101(1)
Storytelling in Practice
102(1)
Case #1 Charts Are Worth a Thousand Words
103(1)
Case #2 Telling the Same Story with a Different Audience
104(4)
The Key Takeaways
108(1)
Know Your Visuals
108(1)
Visual Cues
109(1)
Chart Types
109(4)
Recommended Visualization Practices
113(1)
Wrapping Up
114(5)
Part III Assembling the System
11 Scripting Infrastructure
119(10)
Why Script Your Infrastructure?
119(2)
Three Lenses to Model Your Infrastructure
121(2)
Code to Build Machine Images
123(1)
Code to Provision Infrastructure
124(2)
Code to Configure Infrastructure
126(1)
Getting Started
127(1)
Wrapping Up
128(1)
12 Managing Your Infrastructure
129(14)
Infrastructure as Code
129(5)
Treating Your Infrastructure as Data
134(1)
Getting Started with Infrastructure Management
135(3)
Linting
138(1)
Writing Unit Tests
138(1)
Writing Integration Tests
139(1)
Writing End-to-End Tests
139(1)
Wrapping Up
140(3)
13 Securing Your Infrastructure
143(18)
Assessing Attack Vectors
144(1)
Manage Identity and Access
145(1)
How Should You Control Access to Your System?
146(1)
Who Should Have Access to Your System?
147(1)
Manage Secrets
148(1)
Password Managers and Secret Management Software
149(1)
Defending Secrets and Monitoring Usage
150(1)
Securing Your Computing Environment
151(2)
Securing Your Network
153(2)
Security Recommendations for Your Infrastructure Management
155(1)
Wrapping Up
156(5)
Part IV Monitoring the System
14 Monitoring Theory
161(10)
Why Monitor?
161(2)
How Do Monitoring and Observability Differ?
163(1)
Monitoring Building Blocks
164(1)
Events
164(1)
Monitors
164(1)
Data: Metrics, Logs, and Tracing
165(1)
First-Level Monitoring
165(1)
Event Detection
166(1)
Data Collection
166(1)
Data Reduction
167(1)
Data Analysis
167(1)
Data Presentation
168(1)
Second-Level Monitoring
168(1)
Wrapping Up
169(2)
15 Compute and Software Monitoring in Practice
171(14)
Identify Your Desired Outputs
171(2)
What Should You Monitor?
173(1)
Do What You Can Now
173(1)
Monitors That Matter
174(1)
Plan for a Monitoring Project
175(3)
What Alerts Should You Set?
178(2)
Examine Monitoring Platforms
180(1)
Choose a Monitoring Tool or Platform
181(2)
Wrapping Up
183(2)
16 Managing Monitoring Data
185(8)
What Is Monitoring Data?
186(1)
Metrics
186(1)
Logs
187(1)
Structured Logs
187(1)
Tracing
188(1)
Distributed Tracing
188(1)
Choose Your Data Types
189(1)
Retain Log Data
190(1)
Analyze Log Data
190(1)
Monitoring Data at Scale
191(1)
Wrapping Up
192(1)
17 Monitor Your Work
193(12)
Why Should You Monitor Your Work?
193(2)
Manage Your Work with Kanban
195(3)
Choose a Platform
198(2)
Find the Interesting Information
200(1)
Wrapping Up
201(4)
Part V Scaling the System
18 Capacity Management
205(14)
What Is Capacity?
205(1)
The Capacity Management Model
206(1)
Resource Procurement
207(1)
Justification
208(1)
Management
209(5)
Monitoring
214(1)
The Framework for Capacity Planning
214(2)
Do You Need Capacity Planning with Cloud Computing?
216(1)
Wrapping Up
217(2)
19 Developing On-Call Resilience
219(16)
What Is On-Call?
219(1)
Humane On-Call Processes
220(1)
Check Your On-Call Policies
221(1)
Preparing for On-Call
222(2)
One Week Out
224(1)
The Night Before
225(1)
Your On-Call Rotation
226(1)
On-Call Handoff
227(2)
The Day After On-Call
229(1)
Monitor the On-Call Experience
230(3)
Wrapping Up
233(2)
20 Managing Incidents
235(16)
What Is an Incident?
236(1)
What Is Incident Management?
237(1)
Planning and Preparing for Incidents
238(1)
Set Up and Document Communication Channels
238(1)
Train for Effective Communication
239(1)
Create Templates
240(1)
Maintain Documentation
240(1)
Document the Risks
240(1)
Practice Failure
241(1)
Understand Your Tools
241(1)
Clearly Define Roles and Responsibilities
241(1)
Understand Severity Levels and Escalation Protocols
242(1)
Responding to Incidents
243(1)
Learning from the Incident
244(1)
How Deep Should You Dig?
244(2)
Aiding Discovery
246(1)
Documenting Incidents Effectively
246(1)
Distributing the Information
247(1)
Next Steps
248(1)
Wrapping Up
248(3)
21 Leading Sustainable Teams
251(16)
Collective Leadership
251(2)
Adopt a Whole-Team Approach
253(1)
Build Resilient On-Call Teams
253(2)
Update On-Call Processes
255(1)
Monitor the Team's Work
256(1)
Why Monitor the Team?
256(2)
What Should You Monitor?
258(3)
Measure Impact on the Team
261(2)
Support Team Infrastructure with Documentation
263(1)
Budget a Learning Culture
264(1)
Adapt to Challenges
265(1)
Wrapping Up
266(1)
Conclusion 267(2)
A Protocols in Practice 269(8)
B Resolving Test Failures 277(6)
Index 283
Jennifer Davis is an experienced operations engineer, international speaker, and author. Her books include Modern System Administration, Effective DevOps, and Collaborating in DevOps Culture. Jennifer has worked with a variety of companies, from startups to large enterprises, improving operability practices and encouraging sustainable work.