Filter interviews by
I applied via LinkedIn and was interviewed in Sep 2024. There was 1 interview round.
Troubleshooting Kubernetes issues involves identifying the root cause, checking logs, examining configurations, and using monitoring tools.
Identify the specific issue by checking logs and error messages.
Examine the Kubernetes configurations to ensure they are set up correctly.
Use monitoring tools like Prometheus or Grafana to track performance metrics.
Check the status of pods, nodes, and deployments to pinpoint any iss...
Top trending discussions
I applied via Referral and was interviewed in Apr 2024. There were 2 interview rounds.
I applied via LinkedIn and was interviewed in Dec 2021. There was 1 interview round.
To connect to a storage account, you need to use the appropriate connection string.
Obtain the connection string from the Azure portal or programmatically
Use the connection string in your code to connect to the storage account
Examples of connection strings: Blob storage - DefaultEndpointsProtocol=https;AccountName=myaccount;AccountKey=mykey;EndpointSuffix=core.windows.net, File storage - DefaultEndpointsProtocol=https;A...
SAS keys are used for accessing specific resources while access keys are used for accessing all resources in a storage account.
SAS keys provide time-limited access to specific resources in a storage account
Access keys provide full access to all resources in a storage account
SAS keys are more secure as they limit access to specific resources and have an expiration time
Access keys should be used only for initial setup an...
Types of network peering include private, public, and global.
Private peering involves connecting two networks directly, without going through a third-party network.
Public peering involves connecting to a public internet exchange point (IXP) where multiple networks can exchange traffic.
Global peering involves connecting to a global IXP, which allows for peering with networks around the world.
Other types of peering inclu...
To give access to users via az portal, follow these steps:
Log in to the Azure portal
Navigate to the resource you want to give access to
Click on the 'Access control (IAM)' tab
Click on the 'Add' button
Select the role you want to assign to the user
Enter the user's email address or select from the list of existing users
Click on the 'Save' button
Azure provides multiple VPN options for different use cases.
Site-to-Site VPN for connecting on-premises network to Azure
Point-to-Site VPN for connecting individual devices to Azure
ExpressRoute for dedicated private connections to Azure
VNet-to-VNet VPN for connecting multiple VNets in Azure
Third-party VPN solutions can also be used
Fastconnect and IPsec tunnels are networking solutions in OCI for secure and reliable connectivity.
Fastconnect provides a private connection between on-premises network and OCI without going through the public internet.
IPsec tunnels create secure communication channels over the public internet between on-premises network and OCI.
Both Fastconnect and IPsec tunnels ensure data privacy, integrity, and availability for net...
Enable audit logs in OCI for monitoring and compliance purposes.
Navigate to the OCI Console and select the compartment you want to enable audit logs for.
Go to 'Audit' under 'Identity' and click on 'Create Configuration'.
Choose the services you want to audit, set the log retention period, and specify the log object storage bucket.
Review and create the configuration to start logging audit events.
Monitor the audit logs in...
File storage is a method of storing and organizing digital files in a structured manner.
File storage involves saving data in a structured format for easy retrieval and management
It can be done locally on a computer or on a network server
Examples include saving documents, images, videos, and other digital files on a computer's hard drive or in cloud storage services like Google Drive or Dropbox
Alarm definition and event rules in OCI are used to monitor and manage resources based on predefined conditions.
Alarm definitions specify the conditions under which an alarm is triggered in OCI Monitoring service
Event rules define actions to be taken when specific events occur in OCI Events service
Both are essential for proactive monitoring and management of resources in OCI
I applied via Walk-in and was interviewed in Feb 2024. There were 3 interview rounds.
Experienced Senior Cloud Engineer with a strong background in designing and implementing cloud solutions.
Over 8 years of experience in cloud computing
Proficient in AWS, Azure, and Google Cloud Platform
Designed and implemented scalable and secure cloud architectures
Strong background in automation and DevOps practices
Certified in AWS Solutions Architect and Azure Administrator
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
posted on 5 Jul 2024
Average level of difficulty for me
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
VPC peering can be done using AWS console or CLI for each pair of VPCs.
Create a VPC peering connection for each pair of VPCs
Accept the peering request on the other side
Update the route tables to allow traffic between the peered VPCs
Ensure that the CIDR blocks of the VPCs do not overlap
Consider using a transit VPC for better management of multiple VPCs
Interview experience
Senior Software Engineer
6
salaries
| ₹44 L/yr - ₹54 L/yr |
Software Engineer
4
salaries
| ₹30.4 L/yr - ₹33.6 L/yr |
Production Support Engineer
4
salaries
| ₹2.8 L/yr - ₹3.8 L/yr |
Senior Devops Engineer
4
salaries
| ₹28 L/yr - ₹51.8 L/yr |
Software Engineer2
4
salaries
| ₹32.2 L/yr - ₹32.2 L/yr |
Proofpoint
Barracuda Networks
NortonLifeLock's
Trend Micro