Filter interviews by
I was interviewed in Jan 2024.
A lambda is a function that can be executed without being explicitly declared or defined.
A lambda is an anonymous function in programming.
It is used to write concise and efficient code.
Lambdas are often used in functional programming languages.
They can be used as arguments to higher-order functions.
Lambdas are commonly used in cloud computing platforms like AWS Lambda.
Yes, you can increase the size of the root volume without shutting down the instance.
To increase the size of the root volume, you can use the AWS Management Console, AWS CLI, or AWS SDKs.
For example, using the AWS CLI, you can use the 'modify-instance-attribute' command to modify the 'BlockDeviceMappings' attribute of the instance.
You can specify the new size for the root volume and apply the changes without requiring ...
EBS, S3, and EFS are storage services in AWS. EBS is block-level storage, S3 is object storage, and EFS is file storage.
EBS is attached to EC2 instances and provides persistent block storage.
S3 is a scalable object storage service for storing and retrieving data.
EFS is a fully managed file storage service that can be accessed by multiple EC2 instances simultaneously.
Events in CloudWatch are used to monitor and respond to changes in AWS resources and applications.
Events help in detecting and responding to operational changes in real-time.
They can trigger automated actions or notifications based on predefined rules.
Events can be used to monitor resource state changes, API calls, and system events.
They enable proactive troubleshooting and help in maintaining system health.
CloudWatch ...
VPC-level security focuses on securing the network infrastructure, while system-level security focuses on securing individual systems.
VPC-level security involves configuring network access control lists (ACLs), security groups, and network traffic routing.
System-level security involves securing individual instances or virtual machines by implementing firewalls, antivirus software, and access controls.
VPC-level security...
To connect to EC2 without the pem file, create a new key pair, associate it with the instance, and then connect using the new key pair.
Create a new key pair in the EC2 console or using the AWS CLI.
Stop the EC2 instance for which the pem file is lost.
Detach the root volume from the instance.
Launch a new EC2 instance and associate the detached root volume with it.
Create a new key pair and associate it with the new instan...
ELB stands for Elastic Load Balancer. There are three types of ELB: Classic Load Balancer, Application Load Balancer, and Network Load Balancer.
ELB is a service provided by AWS to distribute incoming traffic across multiple EC2 instances.
Classic Load Balancer operates at both the request and connection level.
Application Load Balancer operates at the application layer and supports advanced routing features.
Network Load ...
Top trending discussions
I applied via Company Website and was interviewed in Oct 2024. There was 1 interview round.
I have worked on AWS, Azure, and Google Cloud Platform.
Worked extensively on AWS services such as EC2, S3, RDS, and Lambda
Experience with Azure services like Virtual Machines, Blob Storage, and Azure Functions
Familiar with Google Cloud Platform services including Compute Engine, Cloud Storage, and Cloud Functions
I have worked with automation tools such as Ansible, Terraform, and Jenkins.
Ansible
Terraform
Jenkins
I was interviewed in Jul 2024.
2 questions are there 1 is a moderate dsa question & 2nd is a SQL question
DR setup involves identifying critical systems, selecting a DR site, replicating data, and testing the plan regularly.
Identify critical systems and prioritize them based on their importance
Select a DR site that is geographically distant from the primary site
Replicate data to the DR site using technologies like backup and recovery, replication, or clustering
Test the DR plan regularly to ensure it works as expected and m...
I applied via Company Website and was interviewed in Jun 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Dec 2022. There were 2 interview rounds.
VPC and subnets are used to create isolated network environments in the cloud. Firewalls are used to control network traffic.
VPC (Virtual Private Cloud) allows users to create their own virtual network in the cloud, providing isolation and control over network resources.
Subnets are subdivisions of a VPC and allow for further segmentation and organization of resources.
Firewalls are used to enforce security policies and ...
tf.state file is a file used by Terraform to store the current state of the infrastructure being managed.
The tf.state file is used to keep track of the resources that Terraform is managing.
It contains information about the current state of the infrastructure, such as the IDs of resources and their current configuration.
The tf.state file is created when you run 'terraform apply' and is updated every time you make change...
I applied via Approached by Company and was interviewed before Aug 2022. There were 3 interview rounds.
The end to end process for migrating a physical machine to the cloud involves several steps.
Assess the physical machine's compatibility with the cloud environment
Choose a cloud provider and create an account
Select the appropriate cloud service and instance type
Create a virtual machine image of the physical machine
Upload the image to the cloud provider
Configure the virtual machine and network settings
Test the migrated m...
based on 2 reviews
Rating in categories
Cloud Engineer
6
salaries
| ₹2.3 L/yr - ₹5 L/yr |
Senior Cloud Engineer
5
salaries
| ₹4 L/yr - ₹4.1 L/yr |
Cloud Operations Engineer
4
salaries
| ₹3.5 L/yr - ₹4.8 L/yr |
Software Engineer Analyst
3
salaries
| ₹3 L/yr - ₹3.6 L/yr |
Infosys
TCS
Wipro
HCLTech