SRE Data Pipelines and Integrity: Data Integrity


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Data integrity is vital as it ensures end-user data accuracy and consistency in conjunction with an adequate level of service and availability. In this course, you'll learn how to choose a strategy for data integrity, including how to account for any potential upsides and tradeoffs.

You'll explore various types of failures that lead to data loss and the existence of the many data failure modes. You'll also identify data integrity challenges.

Next, you'll examine in detail the soft deletion, back up and recovery, and early detection layers of defense-in-depth, before investigating the data integrity challenges a cloud developer may encounter in high-velocity environments.

Finally, you'll outline considerations for implementing out-of-band data validation and successful data recovery and identify how the primary SRE principles apply to data integrity. 



Expected Duration (hours)
1.1

Lesson Objectives

SRE Data Pipelines and Integrity: Data Integrity

  • discover the key concepts covered in this course
  • define data integrity and recognize how it relates to site reliability engineering and user data, its associated risks, and how to mitigate them
  • list vital data integrity requirements and considerations and differentiate between data integrity and security
  • outline how to choose a strategy for data integrity
  • define what is meant by SRE objectives and outline how they can help maintain data integrity and ensure data availability
  • differentiate between different types of failures resulting in data loss
  • recognize challenges for maintaining data integrity
  • state what is meant by combinations of data integrity failure modes and the multiple layers of defense in depth
  • define the soft deletion layer of defense-in-depth and recognize the benefits of a soft deletion strategy
  • name and describe some important considerations when implementing backup and recovery strategies
  • define what is meant by the early detection layer of defense-in-depth and describe how it relates to data loss prevention
  • list some common challenges faced by cloud developers
  • describe what comprises out-of-band data validation and recognize some important considerations when implementing this strategy
  • recognize the importance of setting up systems and knowing that data recovery will be successful
  • name and define some of the core principles of SRE and outline some best practices for applying these
  • summarize the key concepts covered in this course
  • Course Number:
    it_sredpindj_03_enus

    Expertise Level
    Intermediate