Course Introduction
Professional certification
Google Professional Cloud DevOps Engineer
Implement CI/CD, apply SRE discipline, and keep services reliable on Google Cloud. This guide mirrors the official exam objectives with practical delivery, observability, and optimization workflows.
CI/CD architecture
Design pipelines with Cloud Build, Deploy, and Artifact Registry across hybrid targets.
Secure delivery
SLSA, Binary Authorization, and secrets management embedded into pipelines.
SRE practices
SLIs/SLOs, error budgets, and reliability targets that guide release velocity.
Observability & FinOps
Telemetry, incident response, and cost optimization across services.
Exam Guide + SRE Playbook
Focus on secure CI/CD delivery, measurable reliability, and observability practices that keep production stable while shipping fast.
Exam Overview
Length: 2 hours
Format: 50-60 multiple choice and multiple select questions
Prerequisites: scripting, IaC with Terraform, and container orchestration on GKE
Focus: SRE principles plus practical CI/CD, monitoring, and reliability automation
Exam Domains (5 Sections)
Open each section for key objectives.
1) Bootstrapping and maintaining the organization
Resource hierarchy and IAM: folders, projects, Shared VPC, and least privilege policies.
Workload identity: standard for GKE service access without long-lived keys.
IaC foundations: Terraform, Config Connector, and GitOps workflows for consistent environments.
Secure dev environments: Cloud Workstations, Cloud Shell, Gemini Code Assist.
2) Building and implementing CI/CD pipelines
CI: Cloud Build triggers, cloudbuild.yaml, Artifact Registry, vulnerability scanning.
CD: Cloud Deploy, Skaffold, and Kustomize for repeatable releases.
Strategies: blue/green, canary, rolling updates, and traffic splitting.
Supply chain security: Binary Authorization and SLSA provenance.
3) Applying SRE practices
SLI/SLO/SLA: define targets and measure reliability with error budgets.
Incident response: blameless postmortems, fast rollback, and toil reduction.
4) Observability and troubleshooting
Logging: structured logs, log sinks to BigQuery, Pub/Sub, or Cloud Storage.
Monitoring: golden signals, alerting policies, uptime checks, Managed Prometheus.
Tracing: Cloud Trace for microservice latency analysis.
5) Optimizing performance and cost
Cost levers: committed use discounts, Spot VMs, and GKE Autopilot right-sizing.
Performance: Active Assist recommendations and Cloud Profiler for CPU and memory insights.
Exam Focus
- Measure reliability with SLIs, SLOs, and error budgets.
- Build secure, automated CI/CD pipelines with policy controls.
- Instrument services with logs, metrics, and traces.
- Balance reliability, release velocity, and cost efficiency.
Cheatsheet: Tools and Concepts
| Term | Concept |
|---|---|
| SLI | Metric you measure for reliability. |
| SLO | Target reliability goal for engineering. |
| Error Budget | Allowed failure window (100% minus SLO). |
| Toil | Manual, repetitive operational work to automate away. |
| Skaffold | Local dev tool and CD engine for Cloud Deploy. |
| Kustomize | YAML overlays for staging vs production configs. |
| Binary Authorization | Enforce signed, trusted containers only. |
| Cloud Build | Serverless CI for builds and tests. |
| Cloud Deploy | Managed CD release pipelines. |
| Managed Prometheus | Prometheus metrics without self-hosting. |
Flashcards
DevOps delivery, SRE discipline, and observability essentials
Question Text
Click to reveal answerAnswer Text
CI/CD strategy quick view
Pick the delivery model based on governance, rollout needs, and team autonomy.
Cloud Build + Cloud Deploy
- Managed CI with approvals
- Canary, blue/green, or rolling
- Best for GKE and Cloud Run
GitOps for GKE
- Declarative config with Config Sync
- Argo CD or Flux integration
- Multi-cluster consistency
Hybrid tooling
- Jenkins, Git, or Packer
- Artifact Registry as hub
- Secure supply chain controls
Pipeline security checklist
- Scan images with Artifact Analysis and block risky builds.
- Enforce Binary Authorization and SLSA provenance for releases.
- Scope IAM per environment and use Workload Identity Federation.
- Store secrets in Secret Manager, keys in Cloud KMS or Certificate Manager.
Observability and incident response map
Logs + Metrics + Traces
Use Cloud Logging, Cloud Monitoring, and Trace with OpenTelemetry for end-to-end visibility.
Alerts + Runbooks
Tie SLO-based alerts to runbooks and on-call tools like PagerDuty or webhooks.
Exam clue
If the question mentions SLOs and burn rates, answer with Cloud Monitoring alert policies and error budgets.