0% found this document useful (0 votes)
25 views4 pages

Azure DevOps Course Plan

Uploaded by

Rahul Cric
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views4 pages

Azure DevOps Course Plan

Uploaded by

Rahul Cric
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Azure DevOps Course Plan

Week 1: Linux Basics


 Introduction to Linux, Basic Linux commands, File and directory management
 User and group management, File permissions and ownership
 Linux networking,
Week 2-3: Azure Cloud Fundamentals
 Introduction to Azure Azure Services Overview (VM's, Storage, IAM, VNet, Backup etc.)
 Azure Functions, App Services and CLI
 Azure Load Balancer, Application Gateway and Monitor.
Week 4: Infrastructure as Code with Terraform
 Introduction to Infrastructure as Code, Terraform Basics
 Terraform CLI, Writing and organizing Terraform code.
 Terraform modules and Workspaces.
Week 5: Version Control with Git
 Introduction to Git, Git Basics (add, commit, push, pull)
 Branching and Merging
 Git Workflows, Collaboration with GitHub.
Week 6: Continuous Integration/Deployment with Azure DevOps
 Introduction to Azure Pipelines
 Classic and YAML Pipelines
 Azure DevOps Extensions and Integrations
Week 7: Containerization with Docker
 Introduction to Docker, Docker Images and Containers
 Docker CLI
 Dockerfile and Docker Compose
 Docker Networking and Storage
Week 8: Orchestration with Kubernetes
 Introduction to Kubernetes, Kubernetes Architecture
 Kubernetes Objects (Pods, Services, Deployments, Replica Sets)
 Kubernetes CLI (kubectl), Kubernetes Networking and Storage.
Week 9: Scripting with Python
 Introduction to Python, Python Basics (variables, data types, control structures)
 Python Functions and Modules, Python Libraries for Azure and DevOps
 Python for Automation.

Wildcard domain *.Example.com - root domain name

name.example.com – I wil be having all the names

Result. Example.com - I wil be having all the

resource "azurerm_resource_group" "example" {


name = "test2970"
location = "Central India"
}

resource "azurerm_storage_account" "example" {


name = "demo2983y9g"
resource_group_name = azurerm_resource_group.example.name
location = azurerm_resource_group.example.location
account_tier = "Standard"
account_replication_type = "GRS"

tags = {
environment = "staging"
}
}

terraform {

required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "=3.0.0"
}
}
}

# Configure the Microsoft Azure Provider


provider "azurerm" {
features {}

client_id = "8c5906e2-6de1-46ac-97b0-9173f809b61b"
client_secret = "44ae67ec-067f-4f57-8413-308fecba22c4"
tenant_id = "8c4858b5-f020-483a-b7ef-71ded6e81767"
subscription_id = "d7362f78-3fd1-413c-8adc-149b8f3446c8"
}
Plan of action

1.IAM Access Key Discussion with Elastic observability Team to remove user
2.Create new Lamda function for Secret rotation for Project: Instrumentation-ev-dev and
Instrumentation -ev-prod
3.Created terraform Module for memcache GCP
4.Create terraform Module for rediscache GCP
5.Exploring AFT
6.Created lamda function to send S3 daily report to the email using SNS topics
7.Installed all the prerequisites AFT upgradation
8. Added 4 members to the SNS topic. Project: CloudflareS3 Bucket
9.Created new Secret Manager for IM EV Production account and Dev account
10. Created user For IM EV Production account and Dev account
11. Deleted Unused Elastic IAM User from AWS Account
12.Rotated the Access Key and Secret ID of currently used Elastic User
13. Discussion with Siva and Gopinath for AWS Security FIndings
14. Enabled the Password Policy for all AWS Account
15. AWS AFT UPgradation call with AWS expert
16. Walkthrough the changes of AFT new upgrade
17.Created AWS Security Findings Excel For DMS
18. Walthrough of LZ2.0
19.Checked and Attached SCP to the AWS test module Account
20.Security Findings Closed for SSH and RDP

You might also like