i
Hexaware Technologies
Filter interviews by
I applied via Naukri.com and was interviewed in Apr 2024. There was 1 interview round.
I primarily use IAC tools like Terraform to create AWS resources for consistency, version control, and automation.
I prefer using IAC tools like Terraform for creating AWS resources as it allows for infrastructure as code, version control, and automation.
Using IAC tools ensures consistency in resource creation across environments.
GUI can be useful for quick prototyping or exploring AWS services, but IAC is more efficien...
Yes, I have faced issues while creating or monitoring pods in a Kubernetes cluster.
One common issue is pods getting stuck in a pending state due to resource constraints or scheduling issues.
Another issue is pods crashing frequently due to misconfigured settings or incompatible container images.
Monitoring pods can be challenging, especially when dealing with a large number of pods and trying to track their health and pe...
Versioning in S3 allows for preserving, retrieving, and restoring every version of an object stored in a bucket.
Enables recovery from unintended user actions or application failures
Helps in maintaining different versions of objects for audit or compliance purposes
Prevents accidental deletion or overwriting of objects
Useful for tracking changes and rolling back to previous versions if needed
I have experience with various DevOps tools including Jenkins, Docker, Ansible, and Terraform.
Jenkins
Docker
Ansible
Terraform
What people are saying about Hexaware Technologies
posted on 30 Nov 2022
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
Create a k8s deployment ymal with rolling update for a given docker image
Define a Deployment object in the YAML file
Specify the container image in the spec section
Set the update strategy to RollingUpdate
Define the number of replicas for the deployment
posted on 21 Nov 2024
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
IAP tunneling refers to the process of securely accessing internal resources from outside a network using Identity-Aware Proxy.
IAP tunneling allows users to securely access internal resources without exposing them to the public internet.
It uses Identity-Aware Proxy to authenticate and authorize users before granting access to the resources.
This helps organizations maintain a secure network environment while enabling re
Canary deployment is a technique used to reduce risk by rolling out new features to a small subset of users before a full release.
Canary deployment involves gradually rolling out a new version of software to a small subset of users or servers.
This allows for monitoring of the new version's performance and stability before a full release.
If the canary deployment is successful, the new version can be gradually rolled out...
posted on 16 Oct 2024
I applied via Company Website and was interviewed in Sep 2024. There was 1 interview round.
I use Docker for containerization and Kubernetes for orchestration in my project.
I use Docker to create lightweight, portable containers for my applications.
I use Kubernetes to automate deployment, scaling, and management of these containers.
I define my application's infrastructure and dependencies in Dockerfiles and Kubernetes manifests.
I use Kubernetes features like pods, services, and deployments to ensure high avai
Yes, I have experience creating and managing Kubernetes clusters.
Yes, I have created Kubernetes clusters from scratch
I have experience configuring and managing nodes in the cluster
I have deployed applications and services on the Kubernetes cluster
I have set up monitoring and scaling mechanisms for the cluster
I applied via Naukri.com and was interviewed in Aug 2024. There were 2 interview rounds.
20 questions in 15 mins
HTTP is unsecured protocol while HTTPS is secured protocol using SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol, while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80, while HTTPS operates on port 443.
HTTPS uses SSL/TLS certificates to encrypt data transmitted over the network, providing a secure connection.
HTTPS is essential for websites that handle sensitive information li...
Release management involves planning, scheduling, and controlling the software release process.
Planning and coordinating the release of software updates
Ensuring that the release process is smooth and efficient
Managing dependencies and version control
Communicating with stakeholders about release timelines and changes
Automating release processes to improve efficiency
I applied via Naukri.com and was interviewed in May 2024. There were 3 interview rounds.
CI/CD pipeline is a set of automated processes that allow developers to continuously integrate code changes and deploy them to production.
Continuous Integration (CI) involves automatically building and testing code changes as they are committed to a shared repository.
Continuous Deployment (CD) involves automatically deploying code changes to production environments after passing automated tests.
CI/CD pipelines typicall...
DaemonSet ensures that all or some nodes run a copy of a Pod
DaemonSet is a Kubernetes resource that ensures a copy of a Pod is running on all or some nodes in the cluster
It is useful for running a single instance of a Pod on every node, such as log collection or monitoring agents
DaemonSet automatically adds or removes Pods as nodes are added or removed from the cluster
AWS provides a variety of networking services to help users manage their network infrastructure.
Virtual Private Cloud (VPC) allows users to create isolated networks within the AWS cloud
Elastic Load Balancing distributes incoming traffic across multiple instances to ensure high availability
Route 53 is a scalable domain name system (DNS) web service
Direct Connect allows users to establish a dedicated network connection b...
Terraform module is a reusable, configurable, and self-contained collection of Terraform resources.
Terraform modules help organize and reuse code for infrastructure components
Modules can be shared and reused across different projects
Modules can have input variables to customize their behavior
Modules can output values that can be used by other parts of the infrastructure code
GitOps tools help automate infrastructure management, version control, and deployment processes.
Enables infrastructure as code practices
Facilitates version control for infrastructure configurations
Automates deployment processes
Promotes collaboration and visibility among team members
Examples: Argo CD, Flux, Jenkins X
AWS Secret Manager is a service that helps you protect access to your applications, services, and IT resources.
It allows you to securely store, manage, and retrieve sensitive credentials and configuration data.
You can rotate, manage, and retrieve secrets throughout their lifecycle.
Integrates with AWS services like Lambda, EC2, RDS, and more for secure access to secrets.
Helps you meet security and compliance requirement...
Application deployment on Windows server involves packaging the application, configuring the server, and deploying the application using tools like IIS or PowerShell.
Package the application into a deployable format such as a zip file or MSI installer
Configure the Windows server with necessary dependencies and settings for the application to run
Deploy the application using tools like Internet Information Services (IIS) ...
posted on 22 May 2024
I applied via LinkedIn and was interviewed in Apr 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Dec 2023. There was 1 interview round.
Node affinity is a feature in Kubernetes that allows pods to be scheduled onto nodes based on labels assigned to nodes.
Node affinity is used to ensure that pods are scheduled onto nodes that meet certain criteria specified in the pod's affinity rules.
There are two types of node affinity: requiredDuringSchedulingIgnoredDuringExecution and preferredDuringSchedulingIgnoredDuringExecution.
Node affinity rules can be based o...
Security groups are virtual firewalls that control inbound and outbound traffic for instances in a cloud network.
Security groups are used to control traffic at the instance level.
They act as virtual firewalls for instances in a cloud network.
They allow you to specify which traffic is allowed to reach your instances.
You can define rules for inbound and outbound traffic based on protocols, ports, and IP addresses.
Securit...
Some of the top questions asked at the Hexaware Technologies AWS Devops Engineer interview -
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Senior Software Engineer
3.8k
salaries
| ₹5.4 L/yr - ₹20 L/yr |
System Analyst
3k
salaries
| ₹7 L/yr - ₹29.5 L/yr |
Software Engineer
2.9k
salaries
| ₹2 L/yr - ₹10 L/yr |
Senior Executive
2.1k
salaries
| ₹0.8 L/yr - ₹6 L/yr |
Technical Architect
1.9k
salaries
| ₹10 L/yr - ₹36 L/yr |
Cognizant
TCS
Infosys
Wipro