Azure DevOps Course Plan
Week 1: Linux Basics
Introduction to Linux, Basic Linux commands, File and directory management
User and group management, File permissions and ownership
Linux networking,
Week 2-3: Azure Cloud Fundamentals
Introduction to Azure Azure Services Overview (VM's, Storage, IAM, VNet, Backup etc.)
Azure Functions, App Services and CLI
Azure Load Balancer, Application Gateway and Monitor.
Week 4: Infrastructure as Code with Terraform
Introduction to Infrastructure as Code, Terraform Basics
Terraform CLI, Writing and organizing Terraform code.
Terraform modules and Workspaces.
Week 5: Version Control with Git
Introduction to Git, Git Basics (add, commit, push, pull)
Branching and Merging
Git Workflows, Collaboration with GitHub.
Week 6: Continuous Integration/Deployment with Azure DevOps
Introduction to Azure Pipelines
Classic and YAML Pipelines
Azure DevOps Extensions and Integrations
Week 7: Containerization with Docker
Introduction to Docker, Docker Images and Containers
Docker CLI
Dockerfile and Docker Compose
Docker Networking and Storage
Week 8: Orchestration with Kubernetes
Introduction to Kubernetes, Kubernetes Architecture
Kubernetes Objects (Pods, Services, Deployments, Replica Sets)
Kubernetes CLI (kubectl), Kubernetes Networking and Storage.
Week 9: Scripting with Python
Introduction to Python, Python Basics (variables, data types, control structures)
Python Functions and Modules, Python Libraries for Azure and DevOps
Python for Automation.
Wildcard domain *.Example.com - root domain name
name.example.com – I wil be having all the names
Result. Example.com - I wil be having all the
resource "azurerm_resource_group" "example" {
name = "test2970"
location = "Central India"
}
resource "azurerm_storage_account" "example" {
name = "demo2983y9g"
resource_group_name = azurerm_resource_group.example.name
location = azurerm_resource_group.example.location
account_tier = "Standard"
account_replication_type = "GRS"
tags = {
environment = "staging"
}
}
terraform {
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "=3.0.0"
}
}
}
# Configure the Microsoft Azure Provider
provider "azurerm" {
features {}
client_id = "8c5906e2-6de1-46ac-97b0-9173f809b61b"
client_secret = "44ae67ec-067f-4f57-8413-308fecba22c4"
tenant_id = "8c4858b5-f020-483a-b7ef-71ded6e81767"
subscription_id = "d7362f78-3fd1-413c-8adc-149b8f3446c8"
}
Plan of action
1.IAM Access Key Discussion with Elastic observability Team to remove user
2.Create new Lamda function for Secret rotation for Project: Instrumentation-ev-dev and
Instrumentation -ev-prod
3.Created terraform Module for memcache GCP
4.Create terraform Module for rediscache GCP
5.Exploring AFT
6.Created lamda function to send S3 daily report to the email using SNS topics
7.Installed all the prerequisites AFT upgradation
8. Added 4 members to the SNS topic. Project: CloudflareS3 Bucket
9.Created new Secret Manager for IM EV Production account and Dev account
10. Created user For IM EV Production account and Dev account
11. Deleted Unused Elastic IAM User from AWS Account
12.Rotated the Access Key and Secret ID of currently used Elastic User
13. Discussion with Siva and Gopinath for AWS Security FIndings
14. Enabled the Password Policy for all AWS Account
15. AWS AFT UPgradation call with AWS expert
16. Walkthrough the changes of AFT new upgrade
17.Created AWS Security Findings Excel For DMS
18. Walthrough of LZ2.0
19.Checked and Attached SCP to the AWS test module Account
20.Security Findings Closed for SSH and RDP