Skip to content

Commit ac0ef1a

Browse files
authored
Merge branch 'main' into issue/03_user_role_management
2 parents 9f64926 + d1c2ff2 commit ac0ef1a

File tree

7 files changed

+70
-31
lines changed

7 files changed

+70
-31
lines changed

CHANGELOG.md

+4-1
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,15 @@
88
- DevOps, DevSecOps, and SRE
99
- Abstraction Layers of Container Managers
1010
- Permissions Management
11+
- Secrets Management
1112

12-
## Added/Changed wording
13+
## Naming concepts more explicitly
1314

1415
- Chaos engineering
1516
- Eventual consistency
1617
- Platform quality requirements
18+
- Serverless
19+
- Functions as a Service (FaaS)
1720

1821
## Removed
1922
- Mentioning of tool names for automation and operation (Ansible, Chef, Terraform, Rancher, Tectonic, Kops, Kubeadm, OpenShift)

docs/01-Fundamentals-of-Modern-Infrastructures/01-duration-terms.adoc

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
|===
55

66
=== Begriffe und Konzepte
7-
Cloud, Cloud-Arten, Cloud-Anbieter, On Premise, Bare Metal, Cloud Service Modelle (*aaS), Vendor Lock-in, Managed Services, Cloud Native Services, Cloud-Muster, Cloud-Migrationsmuster, Multi/Hybrid Cloud, Organisatorische Aspekte der Cloud Migration, Rechtliche Rahmenbedingungen, Time-to-Market, Verfügbarkeit, Skalierung, Geo Redundanz und Skalierung, Performance, IOPS, Decoupling Operations, Networking.
7+
Cloud, Cloud-Arten, Cloud-Anbieter, On Premise, Bare Metal, Cloud Service Modelle (*aaS), Vendor Lock-in, Managed Services, Serverless Computing, Cloud Native Services, Cloud-Muster, Cloud-Migrationsmuster, Multi/Hybrid Cloud, Organisatorische Aspekte der Cloud Migration, Rechtliche Rahmenbedingungen, Time-to-Market, Verfügbarkeit, Skalierung, Geo Redundanz und Skalierung, Performance, IOPS, Decoupling Operations, Networking.
88

99
// end::DE[]
1010

@@ -14,7 +14,7 @@ Cloud, Cloud-Arten, Cloud-Anbieter, On Premise, Bare Metal, Cloud Service Modell
1414
|===
1515

1616
=== Terms and Principles
17-
Cloud, cloud types, cloud provider, on premise, bare metal, cloud service models (*aaS), vendor lock-in, managed services, cloud native services, cloud patterns, cloud migration patterns, multi/hybrid cloud, organizational aspects of cloud migration, legal conditions, time-to-market, availability, geo redundancy and scalability, performance, IOPS, decoupling operations, networking.
17+
Cloud, cloud types, cloud provider, on premise, bare metal, cloud service models (*aaS), vendor lock-in, managed services, serverless computing, cloud native services, cloud patterns, cloud migration patterns, multi/hybrid cloud, organizational aspects of cloud migration, legal conditions, time-to-market, availability, geo redundancy and scalability, performance, IOPS, decoupling operations, networking.
1818
// end::EN[]
1919

2020

docs/01-Fundamentals-of-Modern-Infrastructures/02-learning-goals.adoc

+6-2
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,9 @@ Sie verstehen den Unterschied zwischen Cloud- und On-Premise-Betrieb sowie die A
1515

1616
Softwarearchitekt:innen kennen unterschiedliche Cloud Service Modelle (*aaS) und können Services anhand dieser Modelle klassifizieren.
1717

18-
Sie verstehen das Shared-Responsibility-Modell und dessen Relevanz für Kosten- und Risikobewertungen bei der Nutzung von managed Cloud Services.
18+
Sie verstehen darüber hinaus das Serverless Computing Konzept und können es den Cloud Service Modellen zuordnen.
19+
20+
Softwarearchitekt:innen verstehen das Shared-Responsibility-Modell und dessen Relevanz für Kosten- und Risikobewertungen bei der Nutzung von managed Cloud Services.
1921

2022
Sie kennen das Konzept des Vendor Lock-in und seine Relevanz für die Entscheidungsfindung zwischen managed und self-managed Services.
2123

@@ -56,7 +58,9 @@ They understand the difference between cloud and on-premise operations, as well
5658

5759
Software architects know different cloud service models (*aaS) and can classify services based on these models.
5860

59-
They understand the shared responsibility model and its relevance for cost and risk assessments when using managed cloud services.
61+
They also understand the serverless computing concept and can assign it to the cloud service models.
62+
63+
Software architects understand the shared responsibility model and its relevance for cost and risk assessments when using managed cloud services.
6064

6165
They know the concept of vendor lock-in and its relevance for decision-making between managed and self-managed services.
6266

docs/04-Patterns/01-duration-terms.adoc

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
|===
55

66
=== Begriffe und Konzepte
7-
Resilienz Muster, Container Application Design, Cloud Native Architekturen, Container Pattern, Service Mesh
7+
Resilienz Muster, Container Application Design, Cloud Native Architekturen, Container Pattern, Functions as a Service (FaaS), Service Mesh
88

99
// end::DE[]
1010

@@ -14,7 +14,7 @@ Resilienz Muster, Container Application Design, Cloud Native Architekturen, Cont
1414
|===
1515

1616
=== Terms and Principles
17-
Resilience Patterns, Container Application Design, Cloud Native Architectures, Container Patterns, Service Mesh
17+
Resilience Patterns, Container Application Design, Cloud Native Architectures, Container Patterns, Functions as a Service (FaaS), Service Mesh
1818

1919
// end::EN[]
2020

docs/04-Patterns/02-learning-goals.adoc

+28-2
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,20 @@ Softwarearchitekt:innen kennen Methoden, um technische von fachlichen Aufgaben d
1919
* Container Management durch Operator bzw. Controller
2020

2121
[[LZ-4-2]]
22-
==== LZ 4-2: Passende Resilienzmuster zur Erhöhung von Fehlertoleranz auswählen
22+
==== LZ 4-2: Passende Technologien für den Betrieb von Modulen auswählen
23+
24+
Softwarearchitekt:innen können geeignete Technologien zum Betrieb von Modulen eines verteilten Systems auswählen, z.B. mit Functions as a Service (FaaS) und Container Orchestrierung.
25+
26+
Darüber hinaus können Sie die Anwendung dieser Technologien Anforderungsgetrieben anwenden. Dabei gibt es verschiedene Aspekte zu beachten wie:
27+
28+
* Skalierungsanforderungen
29+
* Start- und Ausführungszeit
30+
* Komplexität des Betriebs und fachlichen Schnitts
31+
* Zugriff auf Persistenz
32+
* Limitierungen für Observability und Debugging
33+
34+
[[LZ-4-3]]
35+
==== LZ 4-3: Passende Resilienzmuster zur Erhöhung von Fehlertoleranz auswählen
2336

2437
Softwarearchitekt:innen verstehen, wie bei einer verteilten Anwendung die Kommunikation zwischen den Services fehlertolerant realisiert werden kann.
2538

@@ -54,7 +67,20 @@ Software architects are familiar with methods for separating technical and busin
5467
* Container management through operators or controllers
5568

5669
[[LG-4-2]]
57-
==== LG 4-2: Ability to Select Appropriate Resilience Patterns to Increase Fault Tolerance
70+
==== LG 4-2: Ability to Select Suitable Technologies for Operating Modules
71+
72+
Software architects can select suitable technologies for operating modules of a distributed system, e.g. with Functions as a Service (FaaS) and container orchestration.
73+
74+
They select these technologies in a requirements-driven manner. Various aspects must be taken into account, such as
75+
76+
* Scaling requirements
77+
* Start and runtime duration
78+
* Complexity of operation and domain boundaries
79+
* Access to persistence
80+
* Limitations on observability and debugging
81+
82+
[[LG-4-3]]
83+
==== LG 4-3: Ability to Select Appropriate Resilience Patterns to Increase Fault Tolerance
5884

5985
Software architects understand how communication between services in a distributed application can be made fault-tolerant.
6086

docs/05-Development-and-CICD/01-duration-terms.adoc

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
|===
55

66
=== Begriffe und Konzepte
7-
Development Environment, CI/CD Environment, Mean Time To Recovery (MTTR), Application Lifecycle Management, Formen von Deployments wie Rolling-, Canary- und Blue/Green Deployment, Cluster Design, Logging, Monitoring, Metriken, Distributed Tracing, Time Series Queries, Alerting
7+
Development Environment, CI/CD Environment, Mean Time To Recovery (MTTR), Application Lifecycle Management, Formen von Deployments wie Rolling-, Canary- und Blue/Green Deployment, Cluster Design, Secrets Management
88
// end::DE[]
99

1010
// tag::EN[]
@@ -13,7 +13,7 @@ Development Environment, CI/CD Environment, Mean Time To Recovery (MTTR), Applic
1313
|===
1414

1515
=== Terms and Principles
16-
Development environment, CI/CD environment, Mean Time To Recovery (MTTR), application lifecycle management, forms of deployments like Rolling-, Canary- and Blue/Green deployment, cluster design, logging, monitoring, metrics, distributed tracing, time series queries, alerting
16+
Development environment, CI/CD environment, Mean Time To Recovery (MTTR), application lifecycle management, forms of deployments like Rolling-, Canary- and Blue/Green deployment, cluster design, secrets management
1717
// end::EN[]
1818

1919

docs/05-Development-and-CICD/02-learning-goals.adoc

+26-20
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,15 @@
77

88
Softwarearchitekt:innen wissen, dass es bei der Arbeit in Cloud-Umgebungen neue Anforderungen an den Softwareentwicklungsprozess gibt.
99

10-
Sie kennen verschiedene Vorgehensweisen, um Projekte in Cloud-Umgebungen durchzuführen. Zum Beispiel:
10+
Sie kennen verschiedene Vorgehensweisen und Technologien, um Projekte in Cloud-Umgebungen durchzuführen. Zum Beispiel:
1111

1212
* Organisatorische Good Practices
1313
* Development- und CI/CD-Umgebungen
1414

15-
Sie kennen Möglichkeiten, um in einer Cloud-Umgebung Deployments und ein Application Lifecycle Management zu realisieren, insbesondere:
15+
[[LZ-5-2]]
16+
==== LZ 5-2: Application Lifecycle Management in Cloud-Umgebungen umsetzen
17+
18+
Softwarearchitekt:innen kennen Möglichkeiten, um in einer Cloud-Umgebung Deployments und ein Application Lifecycle Management zu realisieren, insbesondere:
1619

1720
* Versionierung von Containern und Deployment-Spezifikationen etc.
1821
* Etablierte Formen der Bereitstellung von Anwendungen, wie z. B.:
@@ -25,18 +28,17 @@ Sie kennen Komponenten und Vorgehensmodelle, um einen schnellen Test- und Deploy
2528
* Verantwortlichkeiten und Zugriffskontrolle
2629
* Good Practices zur Komponentengruppierung
2730

28-
[[LZ-5-2]]
29-
==== LZ 5-2: Wege der Beobachtbarkeit von verteilten Applikationen kennen
31+
[[LZ-5-3]]
32+
==== LZ 5-3: Secrets Management Optionen kennen
3033

31-
Softwarearchitekt:innen wissen, dass es durch die verteilte Ausführung von Prozessen neue Herausforderungen an die Beobachtbarkeit verteilter Applikationen gibt.
34+
Softwarearchitekt:innen verstehen die kritische Rolle und Techniken zur Verwaltung von Geheimnissen (Secrets) in der Cloud, darunter:
3235

33-
Sie kennen die besonderen Rahmenbedingungen verteilter Anwendung und den Einfluss auf die Beobachtbarkeit mittels:
36+
* Integration von Cloud-Diensten zur Secrets-Verwaltung
37+
* Secrets Operator Konzept
38+
* Automatisierte Secret Rotation
3439

35-
* Logging
36-
* Monitoring/Metriken und Alerting
37-
* Distributed Tracing
40+
Darüber hinaus können sie die Vor- und Nachteile zum eigenen Betrieb eines Secrets Managers benennen.
3841

39-
Sie kennen Wege und Verantwortlichkeiten zur Erstellung möglichst fehlervorhersagenden Time Series Queries für Alerts.
4042
// end::DE[]
4143

4244
// tag::EN[]
@@ -45,12 +47,16 @@ Sie kennen Wege und Verantwortlichkeiten zur Erstellung möglichst fehlervorhers
4547

4648
Software architects are aware that working in cloud environments brings new requirements to the software development process.
4749

48-
They are familiar with different approaches to implementing projects in cloud environments, such as:
50+
They are familiar with different approaches and technologies to implementing projects in cloud environments, such as:
4951

5052
* Organizational good practices
5153
* Development and CI/CD environments
5254

53-
They understand the possibilities of implementing deployments and application lifecycle management in a cloud environment, particularly:
55+
56+
[[LG-5-2]]
57+
==== LG 5-2: Implementing Application Lifecycle Management in Cloud Environments
58+
59+
Software architects understand the possibilities of implementing deployments and application lifecycle management in a cloud environment, particularly:
5460

5561
* Versioning of containers and deployment specifications, etc.
5662
* Established forms of application deployment, such as:
@@ -63,16 +69,16 @@ They are familiar with components and models for achieving a fast testing and de
6369
* Responsibilities and access control
6470
* Good practices for component grouping
6571

66-
[[LG-5-2]]
67-
==== LG 5-2: Understanding approaches for observability of distributed applications
6872

69-
Software architects know that the distributed execution of processes presents new challenges for observability of distributed applications.
73+
[[LG-5-3]]
74+
==== LG 5-3: Know Secrets Management Options
75+
76+
Software architects understand the critical role and techniques for managing secrets in the cloud, including:
7077

71-
They understand the unique conditions of distributed applications and their impact on observability through:
78+
* Integration of cloud services for secrets management
79+
* Secrets operator concept
80+
* Automated secret rotation
7281

73-
* Logging
74-
* Monitoring/metrics and alerting
75-
* Distributed tracing
82+
In addition, they can name the advantages and disadvantages of operating a Secrets Manager themselves.
7683

77-
They are familiar with approaches and responsibilities for creating predictive time series queries for alerts.
7884
// end::EN[]

0 commit comments

Comments
 (0)