Filter interviews by
I applied via Referral and was interviewed in Dec 2023. There were 2 interview rounds.
Logical reasoning and basic mathematical questions were asked
Easy questions and basic questions were asked
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
Create a k8s deployment ymal with rolling update for a given docker image
Define a Deployment object in the YAML file
Specify the container image in the spec section
Set the update strategy to RollingUpdate
Define the number of replicas for the deployment
posted on 21 Nov 2024
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
IAP tunneling refers to the process of securely accessing internal resources from outside a network using Identity-Aware Proxy.
IAP tunneling allows users to securely access internal resources without exposing them to the public internet.
It uses Identity-Aware Proxy to authenticate and authorize users before granting access to the resources.
This helps organizations maintain a secure network environment while enabling re
Canary deployment is a technique used to reduce risk by rolling out new features to a small subset of users before a full release.
Canary deployment involves gradually rolling out a new version of software to a small subset of users or servers.
This allows for monitoring of the new version's performance and stability before a full release.
If the canary deployment is successful, the new version can be gradually rolled out...
To call APIs in Python, you can use libraries like requests or urllib.
Use the requests library to make HTTP requests to APIs
Send GET, POST, PUT, DELETE requests using requests library
Parse JSON responses using the json module
To configure Veracode with ADO, you can write a script that automates the process of setting up the integration.
Use Veracode API to authenticate and interact with Veracode services
Create a script that retrieves Veracode API credentials from ADO secure variables
Automate the process of configuring Veracode settings in ADO pipelines
I applied via Naukri.com and was interviewed in Aug 2024. There were 2 interview rounds.
20 questions in 15 mins
HTTP is unsecured protocol while HTTPS is secured protocol using SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol, while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80, while HTTPS operates on port 443.
HTTPS uses SSL/TLS certificates to encrypt data transmitted over the network, providing a secure connection.
HTTPS is essential for websites that handle sensitive information li...
Release management involves planning, scheduling, and controlling the software release process.
Planning and coordinating the release of software updates
Ensuring that the release process is smooth and efficient
Managing dependencies and version control
Communicating with stakeholders about release timelines and changes
Automating release processes to improve efficiency
CI/CD is a software development practice where code changes are automatically built, tested, and deployed.
Continuous Integration (CI) involves automatically building and testing code changes frequently.
Continuous Deployment (CD) involves automatically deploying code changes to production.
Jenkins is a popular open-source automation server used for CI/CD pipelines.
Jenkins pipelines are defined using a Jenkinsfile which s...
Kubernetes is an open-source container orchestration platform for automating deployment, scaling, and management of containerized applications.
Kubernetes follows a master-slave architecture with a master node controlling multiple worker nodes.
Master node components include API server, scheduler, controller manager, and etcd.
Worker node components include kubelet, kube-proxy, and container runtime (e.g. Docker).
Kubernet...
I applied via Naukri.com and was interviewed before Feb 2023. There were 3 interview rounds.
I was interviewed in Aug 2021.
LDAP authentication is a method of verifying user credentials against a centralized directory service.
LDAP stands for Lightweight Directory Access Protocol
It is commonly used for centralized authentication and authorization
LDAP servers store user and group information in a hierarchical structure
LDAP authentication can be integrated with various applications and services
Examples of LDAP servers include OpenLDAP and Micr
I applied via Naukri.com and was interviewed in Apr 2021. There were 4 interview rounds.
Associate Consultant
5.2k
salaries
| ₹3 L/yr - ₹11.8 L/yr |
Consultant
3.8k
salaries
| ₹6.9 L/yr - ₹26.9 L/yr |
Senior Consultant
1.9k
salaries
| ₹10.8 L/yr - ₹34 L/yr |
System Engineer
915
salaries
| ₹2 L/yr - ₹6.3 L/yr |
Associate Engineer
478
salaries
| ₹2.5 L/yr - ₹9.5 L/yr |
TCS
Infosys
Wipro
HCLTech