Searching...
Flashcards in this deck (256)
  • What types of applications have you deployed?

    • Web applications (Java Spring Boot, Node.js)
    • Microservices architectures
    • Databases (MySQL, MongoDB)
    • Message brokers (Apache Kafka)
    • Monitoring tools (Prometheus, Grafana)
    • CI/CD pipelines (Jenkins)
    • Containerized applications (Docker, Kubernetes)
    applications deployment
  • How should secrets be injected in Kubernetes?

    Use Kubernetes Secrets instead of ConfigMaps. Secrets can be injected into pods via environment variables or mounted as files.

    kubernetes secrets
  • How to find which pod is using more resources?

    Use the command <code>kubectl top pod --all-namespaces</code> to list resource usage by pods. Combine with <code>kubectl describe pod <pod-name></code> for detailed usage.

    kubernetes resources
  • How to find which worker node is consuming more resources?

    Use the command <code>kubectl top nodes</code> to see CPU and memory usage on each node.

    kubernetes resources
  • What are the steps for configuring Prometheus and Grafana?

    1. Deploy Prometheus using Helm or YAML.
    2. Set up Kubernetes service discovery.
    3. Deploy Grafana and configure it to use Prometheus.
    4. Import Kubernetes monitoring dashboards.
    5. Set up alerting rules in Prometheus.
    monitoring prometheus grafana
  • How to visualize metrics of 20 pods in Grafana?

    Configure Grafana to use Prometheus as the data source. Use existing or create custom dashboards for metrics visualization.

    monitoring grafana
  • What is Apache Kafka?

    Apache Kafka is a distributed event streaming platform for building real-time data pipelines and streaming applications.

    apache_kafka streaming
  • How to set up a Docker Hub private registry?

    1. Create a private repository on Docker Hub.
    2. Configure CI/CD pipeline to authenticate with Docker Hub.
    3. Build and push Docker images to the private repository.
    4. Pull images during the CD process.
    docker ci/cd
  • What is the difference between a hard link and a soft link?

    • Hard Link: Direct reference to file data; deletion of the original does not affect it.
    • Soft Link: Pointer to original file path; deletion of the original breaks the link.
    file_system links
  • What is the use of the break command in shell scripting?

    The <code>break</code> command exits a loop prematurely when a specific condition is met.

    shell_scripting commands
  • How to count the number of 'devops' words in HTML files?

    Use the command: <code>grep -o -i "devops" *.html | wc -l</code>.
    - <code>grep</code> searches for 'devops' in HTML files.
    - <code>wc -l</code> counts occurrences.

    shell grep
  • What is the terraform taint command?

    The <code>terraform taint</code> command marks a resource for recreation during the next <code>terraform apply</code>. It destroys the resource and creates a new instance.

    terraform commands
  • What is the syntax to taint a resource in Terraform?

    <code>terraform taint <resource_address></code>

    terraform syntax
  • How do you secure a state file in Terraform?

    1. Encrypt the State File
    2. Use Remote Backends with Security Controls
    3. Enable Versioning
    4. Access Control
    5. Use Backend Locking
    terraform security
  • What happens if you run terraform apply after deleting VMs manually?

    Terraform will recreate the missing VMs to match the state defined in your configuration, resulting in 100 VMs again.

    terraform infrastructure
  • What is the syntax for for_each in Terraform?

    <code>resource "aws_instance" "example" { for_each = var.instances ami = each.value["ami"] instance_type = each.value["instance_type"] tags = { Name = each.key } }</code>

    terraform for_each
  • What are the advantages of multi-stage builds in Docker?

    • Smaller Image Size
    • Improved Security
    • Better Caching
    • Separation of Concerns
    docker advantages
  • What are the disadvantages of multi-stage builds in Docker?

    • Complexity
    • Longer Build Times
    • Troubleshooting
    docker disadvantages
  • How do you deploy containers on different hosts within a Docker cluster?

    Use Docker Swarm or Kubernetes for orchestration.

    docker deployment
  • How to deploy a web container on one host and a DB container on another in Docker Compose?

    Use Docker Compose with separate service definitions for each host.

    docker compose
  • How do you deploy the web container on one host and the DB container on another using Docker Compose?

    1. Use Docker Swarm: Convert the Compose file into a stack file and deploy with docker stack deploy.
    2. Manual Placement: Use placement constraints in docker-compose.yml to specify nodes.
    docker compose deployment
  • What is bridge networking in Docker?

    • Default Docker network driver.
    • Containers on the same bridge can communicate.
    • Each container has its own IP address.
    • Isolated from the host network.
    docker networking bridge
  • What is host networking in Docker?

    • Container shares the host's network stack.
    • No separate IP address for the container.
    • Same network as the host.
    • Can improve performance but reduces isolation.
    docker networking host
  • What are the steps to resolve merge conflicts?

    1. Identify the Conflict: Git marks conflicts with markers.
    2. Manually Resolve: Edit the file to combine changes.
    3. Stage Resolved Files: Use git add.
    4. Commit Changes: Use git commit.
    5. Test: Run tests to ensure no issues.
    git merge conflicts
  • What command changes the existing commit message?

    Use: <code>git commit --amend -m 'New commit message'</code>. If pushed, use: <code>git push --force</code>.

    git commit message
  • What is session affinity?

    • Also known as sticky sessions.
    • Directs requests from a user to the same server.
    • Ensures session data remains accessible throughout the session.
    loadbalancing session affinity
  • What is pod affinity and its use case?

    • Specifies rules for scheduling pods on nodes with other specified pods.
    • Use Case: Keep frontend and backend services on the same node to reduce latency.
    kubernetes pod affinity
  • What is the difference between pod affinity and pod anti-affinity?

    • Pod Affinity: Pods scheduled on the same node or close to each other.
    • Pod Anti-Affinity: Pods not scheduled on the same node or far apart.
    kubernetes pod affinity
  • What is Pod Affinity in Kubernetes?

    Running frontend and backend on the same node for low-latency communication.

    kubernetes pod_affinity
  • What is Pod Anti-Affinity in Kubernetes?

    Ensuring replicas of the same application are spread across different nodes to increase availability and fault tolerance.

    kubernetes pod_anti-affinity
  • What is a Readiness Probe?

    Used to determine when a pod is ready to start accepting traffic.

    kubernetes probes
  • What happens if a Readiness Probe fails?

    The pod will be removed from the service endpoints, ensuring it does not receive traffic until it's ready.

    kubernetes probes
  • What is a Liveness Probe?

    Used to determine if a pod is still running.

    kubernetes probes
  • What happens if a Liveness Probe fails?

    Kubernetes will restart the pod, assuming it's in a failed state.

    kubernetes probes
  • What is a simple Groovy pipeline for a Java Spring Boot application?

    A pipeline that includes stages: Checkout, Build, Push, Approval, and Deploy.

    groovy pipeline
  • What does the Checkout stage do in a Groovy pipeline?

    It checks out the code from the specified Git repository.

    groovy pipeline
  • What command is used to build a Java Spring Boot application in the pipeline?

    sh './mvnw clean package'

    groovy pipeline
  • What command is used to push a Docker image in the pipeline?

    sh 'docker push your-docker-repo/java-spring-boot-app'

    groovy docker
  • What action does the Approval stage require?

    It requires user input for approval to deploy to production.

    groovy pipeline
  • What command is used to deploy in the pipeline?

    sh 'kubectl apply -f deployment.yaml'

    groovy kubernetes
  • How do you export test reports in Jenkins?

    Use the Publish JUnit test result report post-build action to archive test reports.

    jenkins testing
  • What format should tests generate reports in for Jenkins?

    Reports should be in standard formats like JUnit XML or HTML.

    jenkins testing
  • How do you scale pods in Kubernetes from 5 to 10?

    Use the command: kubectl scale --replicas=10 deployment/<your-deployment-name>

    kubernetes scaling
  • What is the purpose of the terraform import command?

    To import existing infrastructure resources into Terraform's state file.

    terraform commands
  • What is the syntax for the terraform import command?

    terraform import <resource_type>.<resource_name> <resource_id>

    terraform commands
  • Where do you store the state file in AWS for Terraform?

    In an S3 bucket.

    terraform aws
  • How do you manage the state file in AWS?

    Using S3 for storage and DynamoDB for locking.

    terraform aws
  • What is the configuration for Terraform backend in AWS?

    backend 's3' { bucket = 'my-terraform-state-bucket' key = 'path/to/my/terraform.tfstate' region = 'us-west-2' dynamodb_table = 'terraform-lock-table' encrypt = true }

    terraform aws
  • What is one significant issue faced with Terraform?

    Managing Terraform state with multiple teams working on the same infrastructure.

    terraform issues
  • How was the Terraform state issue resolved?

    By organizing the state management process.

    terraform issues
  • What was a significant issue faced with Terraform?

    Managing Terraform state with multiple teams working on the same infrastructure.

    terraform infrastructure
  • How was the Terraform state management issue resolved?

    By organizing infrastructure into separate modules and using remote state management with proper locking mechanisms.

    terraform state_management
  • What are the types of storage accounts in AWS S3?

    • S3 Standard
    • S3 Intelligent-Tiering
    • S3 Standard-IA
    • S3 One Zone-IA
    • S3 Glacier
    • S3 Glacier Deep Archive
    aws s3 storage
  • What does lifecycle management in S3 allow you to do?

    Define rules to transition objects between storage classes or delete them after a certain period.

    aws s3 lifecycle_management
  • How can you set up lifecycle policies in S3?

    Using the S3 Management Console, AWS CLI, or Terraform with a JSON configuration file.

    aws s3 lifecycle_policies
  • What is the purpose of load balancers?

    Distribute incoming network traffic across multiple servers.

    networking load_balancers
  • What are the main types of load balancers?

    • Application Load Balancer (ALB): Layer 7, HTTP/HTTPS traffic.
    • Network Load Balancer (NLB): Layer 4, low latency TCP/UDP traffic.
    • Classic Load Balancer (CLB): Supports both Layer 4 and Layer 7, mostly deprecated.
    load_balancers types
  • What are the benefits of using load balancers?

    Improve fault tolerance, scalability, and ensure high availability.

    load_balancers benefits
  • What are Auto Scaling Groups (ASG)?

    Groups that automatically scale the number of instances based on demand.

    aws auto_scaling_groups
  • How do ASGs maintain application performance?

    By adjusting desired capacity based on metrics like CPU utilization.

    aws performance asg
  • Can you provide a simple Dockerfile example?

    <code>Dockerfile FROM node:14 WORKDIR /app COPY package.json . RUN npm install COPY . . EXPOSE 3000 CMD ["npm", "start"]</code>

    docker dockerfile
  • How do you expose an application in Kubernetes to the public internet?

    Using a Kubernetes Service of type LoadBalancer or NodePort.

    kubernetes expose services
  • How do you access an application internally within a Kubernetes cluster?

    By using a ClusterIP service.

    kubernetes internal_access
  • What is the purpose of a ConfigMap in Kubernetes?

    Store non-confidential configuration data in key-value pairs.

    kubernetes configmap
  • What services are considered for a CI/CD pipeline in AWS?

    • AWS CodeCommit: source control.
    • AWS CodeBuild: building and testing.
    • AWS CodeDeploy: deployment.
    • AWS CodePipeline: orchestrate CI/CD.
    • Amazon S3: artifact storage.
    • AWS Lambda: custom automation tasks.
    aws ci/cd services
  • How would you manage unusually high traffic for an e-commerce application?

    Ensure ASGs are configured to handle demand, verify load balancers distribute traffic, and enable caching (e.g., Amazon CloudFront).

    cloud_engineering traffic_management
  • What monitoring tools would be used to track performance metrics?

    Monitoring tools like CloudWatch.

    aws monitoring
  • What is a strategy to reduce load on backend servers?

    Enable caching (e.g., using Amazon CloudFront).

    aws caching
  • What tool is used to track performance metrics in AWS?

    CloudWatch.

    aws monitoring
  • What does Auto Scaling do?

    Automatically scales up instances to handle increased load.

    aws scaling
  • What is the purpose of caching in AWS?

    Reduces load on application servers.

    aws caching
  • What does Load Balancing do?

    Distributes traffic evenly across available instances.

    aws loadbalancing
  • What is involved in Database Optimization?

    Ensure database is properly configured for performance.

    aws database
  • How to upgrade for high availability in AWS?

    Deploy multiple instances across different Availability Zones (AZs).

    aws highavailability
  • What is the role of a Load Balancer for high availability?

    Distributes traffic across multiple instances.

    aws loadbalancing
  • What should be configured to ensure traffic is routed to healthy instances?

    Health checks.

    aws monitoring
  • What is a way to ensure data availability for databases?

    Use Multi-AZ deployments for databases like RDS.

    aws database
  • How to manage the backend RDS database during auto-scaling?

    Enable Multi-AZ for high availability and automatic failover.

    aws rds
  • What are RDS Read Replicas used for?

    Handle read-heavy traffic, reducing load on primary database.

    aws rds
  • How can you scale RDS based on workload?

    Scale vertically (instance size) or horizontally (read replicas).

    aws rds
  • How to set up cross-account access for S3?

    Create an IAM role in production account with necessary permissions.

    aws s3
  • What is established to allow QA account to assume a role?

    A trust relationship.

    aws iam
  • What is used to grant access from the QA account to S3?

    S3 bucket policies.

    aws s3
  • How can Account A access Account B’s S3 bucket?

    Set up a bucket policy in Account B granting permissions to Account A.

    aws s3
  • What is needed for Account A to assume a role in Account B?

    Create an IAM role in Account B with S3 permissions.

    aws iam
  • What are IAM Policies?

    Sets of permissions defining allowed or denied actions.

    aws iam
  • What are IAM Roles?

    Identities with specific permissions that can be assumed by entities.

    aws iam
  • What does the STS AssumeRole policy do?

    Allows a user or service to assume a role in another account, providing temporary credentials.

    aws sts
  • How was a sudden traffic spike issue resolved?

    Scaled database vertically and added read replicas, optimized slow queries.

    aws troubleshooting
  • What is the difference between CMD and ENTRYPOINT in Docker?

    CMD provides default arguments for the container.

    docker cmd entrypoint
  • What is the difference between CMD and ENTRYPOINT in Docker?

    • CMD: Default arguments for entrypoint or command if none provided.
    • ENTRYPOINT: Defines the executable that always runs, with CMD as default arguments.
    docker cmd entrypoint
  • What does ENTRYPOINT do in Docker?

    Ensures a specific executable runs, e.g., <code>ENTRYPOINT ["python", "app.py"]</code> always executes <code>app.py</code>.

    docker entrypoint
  • Have you ever managed an application single-handedly?

    Yes, I managed applications by handling deployment, monitoring, troubleshooting, and scaling, including infrastructure setup and CI/CD pipelines.

    management applications
  • What are the benefits of Infrastructure as Code (IaC)?

    • Consistency: Automates provisioning for consistent environments.
    • Version Control: Enables tracking and rollbacks.
    • Automation: Reduces errors and speeds up deployments.
    • Scalability: Easy resource scaling.
    • Collaboration: Enhances teamwork through code reviews.
    iac benefits
  • What are different ways to create Infrastructure as Code?

    • Terraform: Open-source tool for declarative infrastructure.
    • AWS CloudFormation: Define AWS resources using JSON/YAML.
    • Azure ARM Templates: Define Azure resources in JSON.
    • Google Cloud Deployment Manager: Uses YAML for resources.
    • Ansible: Configuration management with YAML playbooks.
    • Pulumi: Supports multiple programming languages.
    iac tools
  • What is the difference between public and private networking?

    • Public Networking: Accessible from the internet, uses public IPs.
    • Private Networking: Isolated from the internet, uses private IPs for secure communication.
    networking public private
  • What is a Docker registry and why do we need it?

    • Docker Registry: Storage and distribution system for Docker images.
    • Need: Versioning, sharing, and deploying Docker images; supports CI/CD pipelines.
    docker registry
  • What is a secrets manager?

    A tool that securely stores sensitive information like API keys and passwords. Examples: AWS Secrets Manager, HashiCorp Vault, Azure Key Vault.

    security secrets_manager
  • What is the secure way to manage sensitive information?

    • Use a Secrets Manager: Store secrets in services like AWS Secrets Manager.
    • Environment Variables: Inject secrets at runtime.
    • Encrypted Storage: Store sensitive data encrypted.
    security sensitive_information
  • What is HashiCorp Vault used for?

    Managing and securing secrets and sensitive data.

    security vault
  • How do you inject secrets at runtime?

    Use environment variables instead of storing them in code.

    secrets environment
  • Where should you store sensitive data?

    In encrypted databases or files.

    data encryption
  • What should be implemented for access control?

    Strict access controls and auditing.

    access security
  • What is Kubernetes used for?

    Deploying and managing containerized applications.

    kubernetes containers
  • What tools are used to configure Kubernetes clusters?

    Use tools like kubectl.

    kubernetes tools
  • What does Kubernetes manage in terms of services?

    It manages services, ingress, and networking.

    kubernetes services
  • What are Helm charts used for?

    Packaging and deploying applications in Kubernetes.

    kubernetes helm
  • What is the main purpose of Docker?

    Developing, shipping, and running applications inside containers.

    docker containers
  • What is the main purpose of Kubernetes?

    Automating deployment, scaling, and management of containerized applications.

    kubernetes orchestration
  • What is the first step in an end-to-end deployment process?

    Code Commit: Developers push code changes to version control.

    deployment process
  • What does a CI/CD pipeline do?

    Builds code, runs tests, and creates a Docker image.

    ci/cd pipeline
  • Where is the Docker image stored after creation?

    It is pushed to a Docker registry.

    docker registry
  • What happens during the deployment phase?

    The image is pulled from the registry and deployed.

    deployment process
  • What is monitored after deployment?

    The application for performance and errors.

    monitoring deployment
  • What strategies are used for updates in deployment?

    Blue-green or canary deployment strategies.

    deployment updates
  • How do you use Kubernetes instead of EC2?

    Deploy applications on a Kubernetes cluster, set up EKS or another service.

    kubernetes ec2
  • What is Helm in relation to Kubernetes?

    A package manager for managing Kubernetes applications.

    kubernetes helm
  • How to handle multiple microservices on Kubernetes?

    Use namespaces and manage deployment with Helm or CI/CD tools.

    microservices kubernetes
  • What is a bastion host?

    A server in a public subnet that provides access to a private network.

    networking bastion
  • What is a VPC?

    A logically isolated section of a cloud provider's network.

    networking vpc
  • What is VPC peering?

    A network connection allowing traffic between two VPCs using private IPs.

    networking vpc
  • What allows traffic to be routed between two VPCs?

    Using private IP addresses.

    vpc networking
  • What does CI/CD stand for?

    Continuous Integration/Continuous Deployment.

    ci/cd devops
  • What triggers CI/CD pipelines in the setup with Jira?

    When a ticket is marked as 'Done' or moved to a specific workflow stage.

    jira automation
  • What tools can be used for code merging in CI/CD?

    GitLab CI, GitHub Actions, Jenkins.

    ci/cd tools
  • What types of tests are run in a CI/CD pipeline?

    Unit, integration, and end-to-end tests.

    testing ci/cd
  • What is the first step in setting up Nginx on a server?

    Installation.

    nginx installation
  • How do you install Nginx on Ubuntu/Debian?

    Run: sudo apt-get update && sudo apt-get install nginx.

    nginx ubuntu
  • How do you install Nginx on CentOS/RHEL?

    Run: sudo yum install nginx.

    nginx centos
  • What file is edited to configure Nginx?

    The configuration file at /etc/nginx/nginx.conf.

    nginx configuration
  • What command starts the Nginx service?

    sudo systemctl start nginx.

    nginx service
  • What does a load balancer do?

    Distributes incoming network traffic across multiple servers or services.

    load_balancer networking
  • What is one benefit of a load balancer?

    Increased fault tolerance.

    load_balancer benefits
  • What is Cloud NAT?

    A NAT service in cloud environments allowing private instances to connect to the internet securely.

    cloud_nat networking
  • What is the primary function of a Cloud NAT gateway?

    Provides outbound internet access for private network instances without exposing them.

    cloud_nat security
  • How does the author see themselves fitting into the role?

    By leveraging technical expertise in infrastructure management and cloud technologies.

    role career
  • What skills does the author bring to the team?

    Problem-solving skills and a proactive approach to ensuring system reliability.

    skills teamwork
  • What was an instance of cost optimization you implemented?

    • Noticed over-provisioned cloud infrastructure
    • Implemented auto-scaling based on usage metrics
    • Used spot instances for non-critical workloads
    • Moved infrequently accessed data to lower-cost storage
    • Resulted in significant reduction in monthly cloud expenses
    cost_optimization cloud resource_allocation
  • Describe a situation where a production instance crashed.

    • Experienced production server crash due to memory leak
    • Identified issue using Prometheus and ELK Stack logs
    • Restarted affected services and scaled infrastructure
    • Worked with development team to fix memory leak
    production crash memory_leak
  • What is blue-green deployment?

    • Deployment strategy with two identical environments (Blue and Green)
    • Blue is active production, Green is idle
    • New version deployed to Green, then traffic switched after testing
    deployment blue-green
  • Why is blue-green deployment needed?

    • Reduces downtime with instantaneous switch
    • Easy rollback to Blue if issues arise
    • Improves reliability by minimizing deployment failures
    deployment blue-green reliability
  • What is canary deployment?

    • Gradually rolling out new version to a small subset of users before full deployment
    deployment canary
  • What is rolling deployment?

    • Incrementally updating instances while ensuring some run the old version
    deployment rolling
  • What is A/B testing in deployment?

    • Comparing different versions/features with live user traffic to determine performance
    deployment a/b_testing
  • What are feature toggles?

    • Allows dynamic on/off of features, enabling deployment of incomplete features without user impact
    deployment feature_toggles
  • What advanced AWS resources have you worked with?

    • AWS Lambda
    • AWS Fargate
    • Amazon RDS
    • AWS CloudFormation
    • Amazon VPC Peering and Transit Gateway
    • AWS Step Functions
    aws resources advanced
  • How are hosted modules like AI/ML deployed in AWS?

    • Use AWS CodePipeline for automation
    • Containerization into Docker containers
    • Infrastructure provisioning with IaC (e.g., CloudFormation)
    aws ai ml devops
  • What is containerization in AI/ML modules?

    Packaging the modules into Docker containers for portability.

    ai ml containerization
  • What is Infrastructure Provisioning?

    Using IaC (e.g., CloudFormation) to set up necessary AWS resources.

    aws infrastructure iac
  • What is Deployment Automation?

    Using tools like AWS CodeDeploy to deploy containers to provisioned infrastructure.

    aws deployment automation
  • What is Configuration Management?

    Using tools like Ansible or Puppet to configure modules based on requirements.

    management configuration
  • What are Environment Variables used for?

    To inject different configurations for different environments (development, testing, production).

    configuration variables
  • What do Auto Scaling Groups do?

    Automatically adjust the number of instances based on load.

    aws scaling auto-scaling
  • What is the purpose of Elastic Load Balancing?

    Distribute traffic across multiple instances for high availability.

    aws load-balancing availability
  • What is Serverless Computing?

    Using services like AWS Lambda to scale AI/ML workloads dynamically.

    aws serverless computing
  • What technology did the author learn about?

    Apache Kafka, a distributed streaming platform for real-time data processing.

    technology kafka streaming
  • What was the author's learning process for Kafka?

    Read documentation, watched tutorials, experimented, and joined online communities.

    learning kafka process
  • What was the application of Kafka?

    Implemented Kafka to handle high-volume event streams, improving processing efficiency.

    application kafka efficiency
  • What is a challenge faced by DevOps engineers?

    Managing complex cloud environments with multiple services and dependencies.

    devops challenges cloud
  • What is a challenge related to automation?

    Finding the right balance between automation and manual intervention.

    devops automation challenges
  • What is a security challenge in DevOps?

    Ensuring the security of cloud infrastructure and applications.

    devops security challenges
  • What is a collaboration challenge for DevOps engineers?

    Working effectively with developers, operations teams, and stakeholders.

    devops collaboration challenges
  • What is a challenge of continuous learning in DevOps?

    Keeping up with the rapid pace of change in the cloud computing landscape.

    devops learning challenges
  • What was the incident faced by the author?

    A production application experienced slow performance due to a database query bottleneck.

    incident performance database
  • How did the author resolve the incident?

    Analyzed logs, profiled the database, identified the inefficient query, and optimized it.

    resolution incident database
  • What experience does the author have with large-scale databases?

    Managed large-scale databases like MySQL and PostgreSQL, including backups and replication.

    databases mysql postgresql
  • What tools did the author use for backups?

    Used Percona XtraBackup for MySQL and pg_dump for PostgreSQL backups.

    backups tools databases
  • What strategy is used to prevent data loss in critical applications?

    A multi-layered approach including redundancy, backups, and disaster recovery plans.

    data-loss strategy backup
  • What is the role of redundancy in data loss prevention?

    Use multiple data centers or cloud regions for replication and failover.

    data-loss redundancy
  • What is the importance of backups in critical applications?

    Implement frequent and automated backups to multiple locations.

    data-loss backups
  • What does version control do in data loss prevention?

    Tracks changes to data and maintains historical versions.

    data-loss version-control
  • What does monitoring do in data loss prevention?

    Monitors database health and performance to detect potential issues early.

    data-loss monitoring
  • What is a disaster recovery plan?

    Develop a comprehensive plan to restore data and services in case of failure.

    data-loss disaster-recovery
  • What is the purpose of monitoring in database management?

    To monitor database health and performance to detect potential issues early.

    database monitoring
  • What is a disaster recovery plan?

    A comprehensive plan to restore data and services in case of an outage.

    disaster_recovery planning
  • What types of cyberattacks have you faced?

    Encountered security incidents like brute-force attacks and attempts to exploit vulnerabilities.

    cybersecurity attacks
  • What are some precautions against cyberattacks?

    • Implement strong passwords
    • Multi-factor authentication
    • Least privilege access
    cybersecurity precautions
  • What is vulnerability scanning?

    Regularly scanning systems for vulnerabilities and patching them promptly.

    cybersecurity vulnerability
  • What is the purpose of security monitoring?

    Use SIEM tools to monitor for suspicious activity.

    cybersecurity monitoring
  • What is an incident response plan?

    A plan to respond to security incidents effectively.

    cybersecurity incident_response
  • What are the networking setup rules you follow?

    • Use security groups to control traffic
    • Divide network into segments
    • Implement firewall rules
    • Use VPNs for secure communication
    • Monitor network traffic
    networking setup_rules
  • What are your daily responsibilities as a DevOps engineer?

    • Monitor system health
    • Automate tasks
    • Resolve issues
    • Collaborate with teams
    • Continuous improvement
    devops responsibilities
  • What DevOps tools are you proficient with?

    • Terraform, CloudFormation, Ansible, Puppet
    • Docker, Kubernetes
    • Jenkins, GitLab CI/CD, AWS CodePipeline
    • Prometheus, Grafana, ELK Stack
    • Git
    devops tools
  • What does the CI/CD workflow involve?

    1. Code Commit
    2. Build and Test
    3. Artifact Storage
    4. Deployment
    5. Monitoring
    devops ci/cd
  • How do you handle continuous delivery (CD)?

    • Automated Deployments
    • Blue-Green Deployments
    • Canary Deployments
    • Feature Flags
    devops continuous_delivery
  • What methods do you use to check for code vulnerabilities?

    • Static Code Analysis
    • Dynamic Code Analysis
    coding vulnerabilities
  • What is Static Code Analysis?

    Use tools like SonarQube or Snyk to analyze code for vulnerabilities and security issues.

    security code_analysis
  • What is Dynamic Code Analysis?

    Use tools like Burp Suite or ZAP to test the application in runtime for vulnerabilities.

    security code_analysis
  • What is Security Scanning?

    Use tools like AWS Inspector or Qualys to scan infrastructure and applications for vulnerabilities.

    security scanning
  • What are the Compute services in AWS?

    • EC2
    • Lambda
    • ECS
    • EKS
    aws compute
  • What are the Storage services in AWS?

    • S3
    • EBS
    • EFS
    aws storage
  • What are the Networking services in AWS?

    • VPC
    • Route 53
    • Load Balancers
    aws networking
  • What are the Database services in AWS?

    • RDS
    • DynamoDB
    • Redshift
    aws database
  • What are the CI/CD services in AWS?

    • CodePipeline
    • CodeBuild
    • CodeDeploy
    aws ci/cd
  • What are the Security services in AWS?

    • IAM
    • Security Groups
    • KMS
    aws security
  • What are the Monitoring services in AWS?

    • CloudWatch
    • CloudTrail
    aws monitoring
  • How to access data in an S3 bucket from Account A when running in Account B?

    1. Create Role in Account A with S3 access.
    2. Assume Role in Account B EC2 instance.
    3. Access S3 using assumed role's credentials.
    aws s3 cross-account
  • How to provide access to an S3 bucket?

    • IAM Policies: Attach to users/groups/roles.
    • Bucket Policies: Define access control on the bucket.
    aws s3 permissions
  • What are common S3 bucket permissions?

    • Read: Read objects.
    • Write: Write objects.
    • Delete: Delete objects.
    • List: List objects.
    aws s3 permissions
  • How can Instance 2 communicate with Instance 1 in a private subnet?

    Use a NAT gateway or a bastion host.

    aws instance_communication
  • How can an EC2 instance in a private subnet access the internet without a NAT gateway?

    1. Private DNS: Configure a private DNS zone.
    2. Private Hostname: Assign to the EC2 instance.
    3. DNS Resolution: Resolve to access internet resources.
    aws ec2 internet_access
  • What is the typical latency for a load balancer?

    Ranges from a few milliseconds to a few hundred milliseconds.

    aws load_balancer latency
  • What are the monitoring steps for high load balancer latency?

    • CloudWatch Metrics: Monitor latency.
    • Network Tracing: Use AWS X-Ray.
    • Performance Testing: Run load tests.
    aws monitoring latency
  • How to reduce latency for an S3 hosted application?

    • Use AWS CloudFront for caching.
    • Store data in regional S3 buckets.
    aws s3 latency
  • What is the purpose of udFront?

    To cache content at edge locations closer to users, reducing latency.

    content_delivery latency
  • What are Regional Buckets used for?

    Store data in S3 buckets in the same region as the users, minimizing network hops.

    cloud_storage s3
  • What do Content Delivery Networks (CDNs) do?

    Distribute content across multiple locations, reducing latency for users worldwide.

    cdn content_delivery
  • What can be integrated with a CDN?

    • Web Servers: Apache, Nginx, IIS
    • CMS: WordPress, Drupal, Joomla
    • Cloud Storage: AWS S3, Google Cloud Storage, Azure Blob Storage
    • Streaming Services: Netflix, YouTube, Twitch
    • API Gateways: AWS API Gateway, Google Cloud Endpoints
    cdn integration
  • How to dynamically retrieve VPC details from AWS?

    Use Terraform's data sources: 1. aws_vpc Data Source 2. aws_subnet Data Source 3. aws_security_group Data Source 4. aws_instance Data Source

    aws terraform vpc
  • How to manage unmanaged resources in Terraform?

    Use Terraform import command to bring existing unmanaged resources under Terraform's control.

    terraform management
  • How to pass arguments to VPC during import?

    Use the --var flag with the terraform import command: terraform import aws_vpc.example 'vpc-1234567890abcdef0' --var='cidr_block=10.0.0.0/16'

    terraform vpc import
  • What is the master-slave architecture in Jenkins?

    Distributes build tasks across multiple nodes (slaves) for: - Parallel Execution - Resource Optimization - Scalability

    jenkins architecture
  • How to integrate LDAP with AWS and Jenkins?

    1. Configure LDAP server for authentication.
    2. Create IAM role for LDAP access.
    3. Configure Jenkins to use LDAP for authentication.
    jenkins ldap aws
  • What are key features of GitHub?

    • Version Control
    • Collaboration
    • Pull Requests
    • Issues
    • Projects
    github features
  • What are key features of Jenkins?

    • Continuous Integration (CI)
    • Continuous Delivery (CD)
    • Pipeline as Code
    • Plugins
    • Master-Slave Architecture
    jenkins features
  • What are the benefits of CI/CD?

    • Faster Delivery
    • Improved Quality
    • Increased Efficiency
    • Reduced Risk
    ci/cd benefits
  • What are the uses of CI/CD?

    • Software Development
    • Infrastructure Management
    ci/cd uses
  • What are the uses of CI/CD?

    • Software Development: Automate build, test, and deployment processes.
    • Infrastructure Management: Provision and configure infrastructure automatically.
    • Data Pipelines: Automate data processing and analysis tasks.
    ci/cd software infrastructure
  • What is a GitHub workflow?

    A GitHub workflow is a set of automated tasks triggered by events in a repository.

    github workflow
  • What tasks can you perform with GitHub workflows?

    • Build and Test Code: Automate build and test processes.
    • Deploy Applications: Deploy applications to different environments.
    • Run Code Analysis: Perform code quality checks and security scans.
    github automation
  • How do you handle merge conflicts in Git?

    1. Identifying Conflicts: Git identifies conflicts when merging branches.
    2. Resolving Conflicts: Manually edit affected files.
    3. Staging Changes: Stage resolved files using git add.
    4. Committing Changes: Commit changes with a descriptive message using git commit.
    git merge conflicts
  • What steps to take when a build fails in Jenkins?

    1. Analyze Logs: Review build logs to identify the cause.
    2. Troubleshoot: Investigate and try to resolve the issue.
    3. Fix Code: Fix code errors and rebuild.
    4. Update Configuration: Update Jenkins configuration if needed.
    5. Rollback: Roll back to a previous working version if necessary.
    jenkins build failure
  • How can you execute jobs in AWS?

    • AWS Batch: Managed batch computing service.
    • AWS Lambda: Serverless computing service for code execution.
    • AWS ECS: Container orchestration service for deploying applications.
    aws jobs execution
  • What are Ansible roles?

    Ansible roles organize and reuse playbooks, encapsulating tasks, variables, and dependencies.

    ansible roles
  • How do you use Ansible roles?

    • Modularize Playbooks: Break down complex playbooks.
    • Simplify Deployment: Deploy multiple components with a single role.
    • Improve Maintainability: Easier management of Ansible configurations.
    ansible deployment maintenance
  • How do you ensure data persistence with Docker volumes?

    • Named Volumes: Share named volumes between containers.
    • Data Volumes: Mount data volumes from the host machine.
    • Bind Mounts: Mount directories from the host machine into the container.
    docker data persistence
  • What are the key differences between Docker and Kubernetes?

    • Scope: Docker focuses on containerization; Kubernetes on orchestration.
    • Management: Docker manages individual containers; Kubernetes manages clusters.
    • Scalability: Kubernetes offers advanced scaling features.
    • Networking: Kubernetes has sophisticated networking capabilities.
    docker kubernetes differences
  • How do you securely store credentials in GitHub?

    • GitHub Secrets: Store sensitive information securely.
    • Environment Variables: Set in GitHub workflow for access.
    • GitHub Actions: Manage credentials within workflows.
    github security credentials
  • Where is the Jenkinsfile typically stored?

    The Jenkinsfile is typically stored in the root directory of your Git repository.

    jenkins jenkinsfile repository
  • How is pull request approval managed in GitHub?

    GitHub provides features for managing pull request approvals, including required approvers.

    github pull_request approval
  • Where is the Jenkinsfile typically stored?

    In the root directory of your Git repository.

    git jenkins
  • How is pull request approval managed in GitHub?

    • Required Approvers: Specify number of required reviewers.
    • Review Policies: Define code review policies.
    • Approval Flow: Control approval process by teams or roles.
    github pull_requests
  • How do you execute a shell script within a Python script?

    Use the subprocess module: <code>python import subprocess subprocess.run(['/path/to/script.sh'])</code>

    python subprocess
  • How do you ensure data persistence with Docker volumes?

    • Named Volumes: Create shared named volumes.
    • Data Volumes: Mount data volumes from host.
    • Bind Mounts: Mount directories from host.
    docker volumes
  • What are the key differences between Docker and Kubernetes?

    • Scope: Docker for containerization; Kubernetes for orchestration.
    • Management: Docker manages containers; Kubernetes manages clusters.
    • Scalability: Kubernetes scales large deployments.
    • Networking: Kubernetes has advanced networking capabilities.
    docker kubernetes
  • How do you securely store credentials in GitHub?

    • GitHub Secrets: Store sensitive info securely.
    • Environment Variables: Set in GitHub workflow.
    • GitHub Actions: Manage credentials in workflows.
    github security
  • How do you deploy an application in a Kubernetes cluster?

    • kubectl: Use commands with YAML/JSON manifests.
    • Helm: Use charts to package and deploy.
    • Knative: For serverless deployments.
    kubernetes deployment
  • How do you communicate with a Jenkins server and a Kubernetes cluster?

    • Jenkins Plugins: Use Kubernetes plugin.
    • API Calls: Interact programmatically with Kubernetes API.
    • kubectl: Use commands from Jenkins.
    jenkins kubernetes
  • How do you generate Kubernetes cluster credentials?

    • Service Accounts: Create accounts for resource access.
    • kubeconfig: Generate file with authentication details.
    kubernetes credentials
  • What can you update in Kubernetes besides Docker images?

    • Docker Images: Update container images.
    • Replicas: Adjust number of replicas.
    • Storage Levels: Update storage configurations.
    • CPU Allocation: Modify CPU resources.
    kubernetes updates
  • What can you update in Kubernetes?

    • Docker Images: Update container image used by a deployment.
    • Replicas: Scale up or down the number of replicas.
    • Storage Levels: Adjust storage capacity for persistent volumes.
    • CPU Allocation: Modify CPU and memory resource requests and limits.
    kubernetes resources
  • What types of pipelines are there in Jenkins?

    • Pipeline: Flexible way to define complex workflows.
    • Freestyle: Simpler option for basic tasks.
    • Multibranch Pipeline: Creates pipelines for different branches in Git.
    jenkins pipelines
  • How can you define environment variables in Jenkins pipeline?

    • Pipeline Script: Use the environment directive in Jenkinsfile.
    • Global Variables: Configure in Jenkins settings.
    • Credentials: Store sensitive info and access within the pipeline.
    jenkins environment_variables
  • What are artifacts in Jenkins?

    • Artifacts: Output of a build process (e.g., compiled code).
    • Pushing to Nexus: Provides version control, dependency management, and security.
    jenkins artifacts
  • How to separate packages for local Python deployment?

    1. Create Virtual Environment: Use <code>python -m venv <env_name></code>.
    2. Activate Environment: Use <code>source <env_name>/bin/activate</code>.
    3. Install Packages: Use <code>pip install <package_name></code>.
    python virtualenv
  • What are prerequisites before importing a VPC in Terraform?

    • Terraform Configuration: A file defining the VPC resource.
    • Resource ID: Unique identifier of the VPC in AWS.
    • Resource Type: Correct Terraform resource type (e.g., aws_vpc).
    terraform vpc
  • How to handle manual policy added to an S3 bucket created by Terraform?

    • Use <code>terraform plan</code>: Detect differences between current state and IaC.
    • Update IaC: Modify configuration to include the policy.
    • Ignore: Use <code>ignore_changes</code> option if the policy is acceptable.
    terraform s3
  • How to handle credentials for a PHP application in Docker?

    • Environment Variables: Set within the Docker container.
    • Secrets Management: Use AWS Secrets Manager or HashiCorp Vault.
    • Docker Secrets: Store sensitive info separately from the container image.
    docker credentials
  • What is the command for running container logs?

    Use <code>docker logs <container_id or container_name></code>.

    docker logs
  • What is the capital of France?

    Paris

    geography capitals
  • Who was the first president of the United States?

    George Washington

    history presidents
  • What is the largest planet in our solar system?

    Jupiter

    astronomy planets
  • What is the formula for the area of a circle?

    ( A = \pi r^2 )

    math geometry
  • What is the formula for standard deviation?

    ( \sigma = \sqrt{\frac{\sum_{i=1}^{N}(x_i - \mu)^2}{N}} )

    math statistics
  • What are the parts of a neuron?

    • Dendrites
    • Cell body
    • Axon
    biology neuroscience
  • Who were the first 5 presidents of the United States?

    • George Washington
    • John Adams
    • Thomas Jefferson
    • James Madison
    • James Monroe
    history presidents