Filter interviews by
I am impressed by the company's commitment to innovation and security practices.
Strong focus on DevSecOps practices
Innovative projects and technologies being used
Positive company culture and employee feedback
Opportunities for growth and learning
I have a strong background in DevOps and security, with a proven track record of implementing secure development practices.
Extensive experience in implementing DevOps practices to improve efficiency and security
Strong understanding of security principles and best practices
Proven track record of successfully implementing secure development processes
Ability to collaborate effectively with cross-functional teams to achiev
Top trending discussions
CICD stands for Continuous Integration/Continuous Deployment. Jenkinsfile functions include stages, steps, post, and more.
CICD stands for Continuous Integration/Continuous Deployment
Jenkinsfile functions include stages, steps, post, agent, environment, and more
Stages define a series of tasks to be executed in a pipeline
Steps define individual actions within a stage
Post defines actions to be taken after the pipeline has...
Kubernetes is an open-source container orchestration platform for automating deployment, scaling, and management of containerized applications.
Kubernetes helps in automating the deployment, scaling, and management of containerized applications.
It allows for easy scaling of applications by adding or removing containers based on demand.
Kubernetes provides features like service discovery, load balancing, and self-healing ...
Workspaces in Docker are isolated environments where developers can work on different projects without affecting each other.
Workspaces allow developers to have separate environments for each project, preventing conflicts between dependencies.
Each workspace has its own set of containers, volumes, and networks, ensuring isolation.
Developers can easily switch between workspaces to work on different projects.
Workspaces are...
Cost optimization in DevOps is achieved through efficient resource utilization, automation, and continuous monitoring.
Implementing auto-scaling to dynamically adjust resources based on demand
Using containerization to maximize resource utilization and reduce costs
Leveraging cloud services for pay-as-you-go pricing model
Implementing cost monitoring tools to identify and eliminate wasteful spending
Optimizing code and infr...
Monitoring is done using Prometheus and Grafana. Prometheus collects metrics and Grafana visualizes them.
Prometheus is an open-source monitoring and alerting toolkit
It collects metrics from monitored targets by scraping HTTP endpoints
Grafana is a visualization tool that creates dashboards for the collected metrics
It allows users to create graphs, charts, and alerts based on the data from Prometheus
Persistent volume is a storage volume that exists beyond the life cycle of a container.
Persistent volumes are used to store data that needs to persist even if the container is deleted or recreated.
They are decoupled from the container and can be attached to different containers.
Examples include network-attached storage (NAS), cloud storage, and local storage.
Persistent volumes are managed by the storage administrator r
PersistentVolumes (PVs) in Kubernetes can be attached and detached.
PersistentVolumes (PVs) can be attached to pods using PersistentVolumeClaims (PVCs).
PVs can be detached from pods when no longer needed.
Examples of PV types include NFS, iSCSI, and AWS EBS.
posted on 14 Nov 2024
I applied via Naukri.com and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated and experienced Desktop Support Engineer with a strong background in troubleshooting and resolving technical issues.
Over 5 years of experience in providing desktop support to end users
Proficient in diagnosing and resolving hardware and software issues
Skilled in setting up and configuring desktops, laptops, and peripherals
Excellent customer service and communication skills
Certified in CompTIA A+ and Mic...
The DORA process stands for Discover, Offer, Request, and Acknowledge. It is a method used in DHCP to assign IP addresses to devices.
Discover: Device sends a broadcast message to discover DHCP servers on the network
Offer: DHCP server responds with an IP address offer to the device
Request: Device requests the offered IP address from the DHCP server
Acknowledge: DHCP server acknowledges the request and assigns the IP addr
An incident is an unplanned interruption to an IT service or reduction in the quality of an IT service. A service request is a formal request from a user for something to be provided.
An incident is a disruption to normal operation that requires immediate attention to restore service.
A service request is a formal request from a user for information, advice, a standard change, or access to a service.
Examples: Incident -
The outlook file responsible for taking backup is the PST file.
PST file stores emails, contacts, calendar events, and other data in Outlook.
Users can manually backup their PST file by exporting it from Outlook.
Third-party backup software can also be used to automatically backup the PST file.
SMTP - 25, POP - 110, IMAP - 143
SMTP uses port 25 for sending emails
POP uses port 110 for receiving emails
IMAP uses port 143 for accessing emails
I applied via Job Portal and was interviewed in Apr 2024. There were 2 interview rounds.
Case study is quite practical based scenario
I applied via Naukri.com and was interviewed in Aug 2022. There were 2 interview rounds.
Terraform templates can be used to create AKS clusters.
Use the azurerm_kubernetes_cluster resource in Terraform to create an AKS cluster.
Specify the required parameters such as resource group, location, node count, and node size.
Use the azurerm_kubernetes_service_principal resource to create a service principal for the AKS cluster.
Use the azurerm_kubernetes_cluster_node_pool resource to create node pools with specific ...
Ansible was extensively used in the project for configuration management and automation.
Automated deployment of applications using Ansible playbooks
Configuration management of servers using Ansible roles
Automated backup and restore of databases using Ansible scripts
Automated provisioning of infrastructure using Ansible modules
posted on 15 Nov 2022
I was interviewed in May 2022.
Design Instagram's high-level architecture.
Use a microservices architecture to handle different functionalities like user authentication, image storage, and feed generation.
Use a NoSQL database like MongoDB to store user data and images.
Use a content delivery network (CDN) to serve images and videos to users quickly.
Implement a caching layer to improve performance and reduce database load.
Use a message broker like Rabb...
Design Instagram, a photo and video sharing social media platform.
Use a scalable architecture with load balancing and caching.
Store media files in a distributed file system like Amazon S3.
Use a relational database for storing user data and metadata.
Implement a content delivery network (CDN) for faster content delivery.
Use machine learning algorithms for personalized content recommendations.
Implement security measures l...
I applied via Approached by Company and was interviewed in Jan 2022. There were 3 interview rounds.
based on 1 interview
Interview experience
Network Design and Optimization Engineer
4
salaries
| ₹5 L/yr - ₹8.7 L/yr |
NW Design & Optimization Engineer
4
salaries
| ₹11 L/yr - ₹14 L/yr |
Senior Software Engineer
4
salaries
| ₹9 L/yr - ₹18.5 L/yr |
Network Engineer
4
salaries
| ₹4.5 L/yr - ₹5 L/yr |
Sales Executive
4
salaries
| ₹1.8 L/yr - ₹4.2 L/yr |
Red Sea Hotels
Yellow Sky
Black Forest
Brown Valley