DevOps(Document Repository) – Telegram
DevOps(Document Repository)
10.4K subscribers
55 photos
689 files
736 links
🌀🌀🌀🌀🌀🌀🌀🌀🌀🌀
The first Devops documentary community on Telegram🚀
🌀🌀🌀🌀🌀🌀🌀🌀🌀🌀

🟡 لینک گروه جهت تبادل:
https://news.1rj.ru/str/DevopsDocGP
Download Telegram
DevOps(Document Repository)
Photo
Please open Telegram to view this post
VIEW IN TELEGRAM
👍53👌2
⚙️ #SystemDesign 📈📊📊

Forward proxy Vs Reverse proxy


A forward proxy is a server that sits between user devices and the internet. A forward proxy is commonly used for:

- Protect clients
- Avoid browsing restrictions
- Block access to certain content


A reverse proxy is a server that accepts a request from the client, forwards the request to web servers, and returns the results to the client as if the proxy server had processed the request. A reverse proxy is good for:

- Protect servers
- Load balancing
- Cache static contents
- Encrypt and decrypt SSL communications


©️ From : ByteByteGo


Group:
©️ https://news.1rj.ru/str/DevopsDocGP
Channel:
©️ https://news.1rj.ru/str/DevopsDoc
Please open Telegram to view this post
VIEW IN TELEGRAM
6👌4👍3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍41👏1
⚙️ #SystemDesign 📈📊📊

A Quick Reference to Database Scaling


1. Indexing: Analyze query patterns and create optimal indexes

2. Materialized Views: Pre-compute and store complex query results

3. Denormalization: Simplify joins to boost query performance

4. Vertical Scaling: Upgrade server resources (CPU, RAM, storage)

5. Caching: Store frequent data in faster memory

6. Replication: Create database copies on replicas to scale reads

7. Sharding: Distribute data across servers for improved scalability


©️ From : ByteByteGo


Group:
©️ https://news.1rj.ru/str/DevopsDocGP
Channel:
©️ https://news.1rj.ru/str/DevopsDoc
Please open Telegram to view this post
VIEW IN TELEGRAM
😍31👍1👏1
AWS_networking_fundamentals_1739735250.pdf
1.7 MB
#AWS
#Network

AWS networking fundamentals

Group:
©️ https://news.1rj.ru/str/DevopsDocGP
Channel:
©️ https://news.1rj.ru/str/DevopsDoc
Please open Telegram to view this post
VIEW IN TELEGRAM
👍7👌2
Please open Telegram to view this post
VIEW IN TELEGRAM
3👍3👌2
Jenkins_Starter_Guide_Ebook_1739466978.pdf
2.8 MB
#Jenkins

Jenkins starter giude

Group:
©️ https://news.1rj.ru/str/DevopsDocGP
Channel:
©️ https://news.1rj.ru/str/DevopsDoc
Please open Telegram to view this post
VIEW IN TELEGRAM
4🐳2
DevOps_Shack_Branching_Strategies_1739460015.pdf
1.6 MB
#Git

Git branching strategies

Group:
©️ https://news.1rj.ru/str/DevopsDocGP
Channel:
©️ https://news.1rj.ru/str/DevopsDoc
Please open Telegram to view this post
VIEW IN TELEGRAM
👌5👍32
Which command is used to schedule a task to run at a specific time in Ubuntu?
Anonymous Quiz
83%
Use 'crontab -e'
12%
Run 'task-scheduler'
3%
Type 'schedule-task'
3%
Use 'add-task'
👍4👏21
Kubernetes_Best_Practices__1740079801.pdf
2.4 MB
#Kubernetes

Kubernetes best practices

Group:
©️ https://news.1rj.ru/str/DevopsDocGP
Channel:
©️ https://news.1rj.ru/str/DevopsDoc
Please open Telegram to view this post
VIEW IN TELEGRAM
👌41👍1
Which of the answers listed below refers to a command used for invoking a text editor in Unix-like operating systems?
Anonymous Quiz
7%
edit
4%
notepad
86%
vi
3%
bcdedit
1
A_Comprehensive_Guide_to_Essential_Linux_Commands_1740079779.pdf
1.2 MB
#Linux

Linux Commands: Explanation and Practical Examples

Group:
©️ https://news.1rj.ru/str/DevopsDocGP
Channel:
©️ https://news.1rj.ru/str/DevopsDoc
Please open Telegram to view this post
VIEW IN TELEGRAM
4👍3
Which command allows you to enable packet capture on a specific network interface in Ubuntu?
Anonymous Quiz
80%
Use 'sudo tcpdump -i interface_name'
11%
Run 'netcapture interface'
5%
Type 'pkttrace -int'
3%
Use 'capture -network'
👍3👌2
⚙️ #SystemDesign 📈📊📊

SSH Under the Hood

Secure Shell (SSH) creates an encrypted channel between client and server.
The process begins with a TCP connection, followed by version negotiation.
Both parties then agree on encryption algorithms, key exchange methods, and message authentication codes.
The client and server perform a key exchange (typically using Diffie-Hellman) to securely generate a shared session key for encrypting the connection.
For authentication, SSH commonly uses public key authentication.
The server verifies the client's identity through a challenge-response mechanism using the client's public key, without the private key ever being transmitted.
Once authenticated, the session key encrypts all further communication, providing a secure channel.


©️ From : ByteByteGo


Group:
©️ https://news.1rj.ru/str/DevopsDocGP
Channel:
©️ https://news.1rj.ru/str/DevopsDoc
Please open Telegram to view this post
VIEW IN TELEGRAM
👍43👌3