i
Solera
Filter interviews by
Be the first one to contribute and help others!
I applied via LinkedIn and was interviewed before Jan 2024. There were 3 interview rounds.
Kubernetes (k8s) fundamentals and role of each component
Kubelet - agent that runs on each node in the cluster and ensures containers are running
Kube-proxy - network proxy that maintains network rules on nodes
Kubernetes API server - central management entity that serves the Kubernetes API
etcd - distributed key-value store used for storing cluster data
Kube-controller-manager - runs controller processes to manage the stat...
Troubleshooting crashloop error in Kubernetes involves checking pod logs, examining resource limits, and verifying configuration files.
Check pod logs to identify the cause of the crashloop.
Examine resource limits to ensure the pod has enough resources to run.
Verify configuration files for any errors or misconfigurations.
Use kubectl commands like describe, logs, and exec to troubleshoot further.
Consider checking for iss...
1. Log parsing using python
Inodes are data structures in Unix-like file systems that store metadata about files, such as permissions, ownership, and location.
Inodes contain information about files, such as file size, permissions, timestamps, and pointers to data blocks.
Each file in a Unix-like file system is represented by an inode.
Inodes are used to efficiently locate and manage files on the file system.
When a file is created, an inode is also ...
Use the lsof command to list all files held by a process
Use the lsof command followed by the -p flag and the process ID to list files held by a specific process
For example, to list all files held by process ID 1234, run: lsof -p 1234
You can also use the -c flag to specify a process name instead of ID, like: lsof -c chrome
Containers are lightweight, portable, and efficient, while virtual machines are more isolated and resource-intensive.
Containers share the host OS kernel, making them more lightweight and faster to start compared to VMs.
VMs provide stronger isolation and security by running a separate OS instance for each VM.
Containers are ideal for microservices architecture and rapid deployment, while VMs are better for running multip...
I was interviewed in Dec 2024.
ipconf.pl is a Perl script used for configuring network interfaces on Linux systems.
ipconf.pl is typically used to set up IP addresses, netmasks, gateways, and DNS servers on Linux machines.
It can be used to automate the configuration of network interfaces during system setup or maintenance.
The script may also be used to troubleshoot network connectivity issues by checking and modifying network settings.
ipconf.pl is of...
Scan VIP is used for load balancing traffic to multiple nodes, while Node VIP is assigned to a specific node for direct access.
Scan VIP is a virtual IP address used for load balancing traffic across multiple nodes in a cluster.
Node VIP is a virtual IP address assigned to a specific node in the cluster for direct access.
Scan VIP is typically used for services that need to be highly available and distributed across multi...
Quarantile in Exadata is a feature that isolates problematic cells to prevent them from affecting the rest of the system.
Quarantile is a feature in Exadata that identifies and isolates cells that are experiencing issues or failures.
It helps prevent the spread of issues to other cells in the system, ensuring high availability and performance.
Quarantiled cells are still accessible for diagnosis and maintenance, but are n...
The master switch in Exadata can be identified by checking the status of the cell server software.
Check the status of the cell server software using the 'cellcli' command
The cell server with the 'MS' role is the master switch
The master switch can also be identified by checking the 'cellinit.ora' file
Spine switch and leaf switch are networking components in Exadata used for connecting database servers and storage servers.
Spine switch acts as the core of the network, connecting all leaf switches and providing high-speed connectivity.
Leaf switches connect database servers and storage servers to the spine switch, facilitating communication between them.
Exadata uses a leaf-spine network architecture for efficient data ...
One of the node of a 3 node cluster is down. Explain the step by step process to troubleshoot the issue.
Shell script & terraform code output was asked.
DSA, Hashmaps, Arrays and String Manipulation
Terraform modules are reusable components that can be used to create infrastructure resources.
Modules are collections of .tf files that define resources and their dependencies
They can be used to create reusable infrastructure code
Modules can be published to the Terraform Registry for others to use
They can be used to create complex infrastructure setups easily
I applied via Company Website and was interviewed before Jul 2021. There were 2 interview rounds.
Data Structure related questions
I applied via Recruitment Consultant and was interviewed before Jan 2021. There were 6 interview rounds.
Thread concepts involve concurrent execution of multiple parts of a program.
Threads allow for parallelism and can improve performance.
Threads can communicate with each other through shared memory or message passing.
Thread synchronization is important to prevent race conditions and deadlocks.
Examples of thread concepts include multithreading, thread pools, and futures.
Thread safety is important to ensure correct behavio
I applied via Referral and was interviewed in Jul 2020. There were 3 interview rounds.
Detect if two circular linked lists overlap
Traverse both lists and check if they have the same tail node
If they have different tail nodes, they do not overlap
If they have the same tail node, check if they intersect at any point
Use Floyd's cycle-finding algorithm to detect intersection point
I was interviewed before Nov 2023.
Simple coding test - DSA questions. Questions on JS
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
Use dynamic programming to find the longest palindromic substring in a given string.
Iterate through the string and expand around each character to find palindromes.
Store the length of the longest palindrome found so far.
Return the substring based on the start and end indices of the longest palindrome.
To serialize and deserialize a tree, use a recursive approach to traverse the tree and store the data in a suitable format.
Use pre-order traversal to serialize the tree by storing the node values in a list or string.
For deserialization, reconstruct the tree by recursively building nodes from the serialized data.
Consider using JSON or XML format for serialization to easily store and retrieve tree structure.
Use regex library to match given regex with string.
Use a regex library like re in Python to match the given regex with the string.
Check if the regex matches the string using the library functions.
Handle cases where the regex contains special characters like . and * appropriately.
Throttling is a technique used to control the rate of requests sent to a server.
Throttling helps prevent server overload by limiting the number of requests processed at a time.
Implementing a throttle function involves setting a maximum request rate and delaying excess requests.
Example: Implementing a throttle function in a web application to limit the number of API calls made to a third-party service.
Example: Throttlin...
Sort the squares of elements in a sorted array and return the sorted response.
Iterate through the array and square each element.
Store the squared values in a new array.
Sort the new array and return it.
A promise is a commitment to do something in the future, typically used for asynchronous operations in JavaScript.
Promises are used to handle asynchronous operations in JavaScript.
They represent a value that may be available now, in the future, or never.
Promises have three states: pending, fulfilled, or rejected.
Example: new Promise((resolve, reject) => { setTimeout(() => resolve('Done!'), 1000); });
Event loop is a mechanism that allows for asynchronous execution of code by managing the order of events in a single thread.
Event loop continuously checks the call stack for any functions that need to be executed, and processes them in a non-blocking manner.
Different types of queues in event loop include microtask queue (Promise callbacks), macrotask queue (setTimeout, setInterval callbacks), and animation frame queue
Virtual DOM is a lightweight copy of the actual DOM, used to improve performance by minimizing direct manipulation of the real DOM.
Virtual DOM is a concept used in frameworks like React to optimize rendering performance.
Changes are first made to the virtual DOM, which is then compared to the real DOM to identify the minimal updates needed.
This approach reduces the number of actual DOM manipulations, resulting in faster...
I was interviewed in Aug 2023.
Associate Software Engineer
90
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Analyst
64
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
46
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
35
salaries
| ₹0 L/yr - ₹0 L/yr |
Product Owner
27
salaries
| ₹0 L/yr - ₹0 L/yr |
CDK Global
Reynolds and Reynolds
Veeva Systems
Epicor Software Corporation