Exam Objectives
1 Compare authentication methods
1a Describe authentication methods
1b Choose an authentication method based on use case
1c Differentiate human vs. system auth methods
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| groups: | |
| - name: node_exporter_alerts | |
| rules: | |
| - alert: Node down | |
| expr: up{job="monitoring-pi"} == 0 | |
| for: 2m | |
| labels: | |
| severity: warning | |
| annotations: | |
| title: Node {{ $labels.instance }} is down |
#Introduction to Devops Resources:
##Chapter 1
2015 State of DevOps Report https://puppet.com/resources/white-paper/2015-state-of-devops-report
Knight Capital https://en.wikipedia.org/wiki/Knight_Capital_Group