Filter interviews by
I applied via LinkedIn and was interviewed in Sep 2024. There was 1 interview round.
Troubleshooting Kubernetes issues involves identifying the root cause, checking logs, examining configurations, and using monitoring tools.
Identify the specific issue by checking logs and error messages.
Examine the Kubernetes configurations to ensure they are set up correctly.
Use monitoring tools like Prometheus or Grafana to track performance metrics.
Check the status of pods, nodes, and deployments to pinpoint any iss...
Top trending discussions
I applied via Referral and was interviewed in Apr 2024. There were 2 interview rounds.
I applied via LinkedIn and was interviewed in Dec 2021. There was 1 interview round.
To connect to a storage account, you need to use the appropriate connection string.
Obtain the connection string from the Azure portal or programmatically
Use the connection string in your code to connect to the storage account
Examples of connection strings: Blob storage - DefaultEndpointsProtocol=https;AccountName=myaccount;AccountKey=mykey;EndpointSuffix=core.windows.net, File storage - DefaultEndpointsProtocol=https;A...
SAS keys are used for accessing specific resources while access keys are used for accessing all resources in a storage account.
SAS keys provide time-limited access to specific resources in a storage account
Access keys provide full access to all resources in a storage account
SAS keys are more secure as they limit access to specific resources and have an expiration time
Access keys should be used only for initial setup an...
Types of network peering include private, public, and global.
Private peering involves connecting two networks directly, without going through a third-party network.
Public peering involves connecting to a public internet exchange point (IXP) where multiple networks can exchange traffic.
Global peering involves connecting to a global IXP, which allows for peering with networks around the world.
Other types of peering inclu...
To give access to users via az portal, follow these steps:
Log in to the Azure portal
Navigate to the resource you want to give access to
Click on the 'Access control (IAM)' tab
Click on the 'Add' button
Select the role you want to assign to the user
Enter the user's email address or select from the list of existing users
Click on the 'Save' button
Azure provides multiple VPN options for different use cases.
Site-to-Site VPN for connecting on-premises network to Azure
Point-to-Site VPN for connecting individual devices to Azure
ExpressRoute for dedicated private connections to Azure
VNet-to-VNet VPN for connecting multiple VNets in Azure
Third-party VPN solutions can also be used
I was interviewed in Jan 2025.
It was easy, bacis aptitude questions asked in this round
posted on 20 Dec 2024
I applied via Referral and was interviewed in Nov 2024. There were 3 interview rounds.
User profile data is securely stored in a centralized database with access control and encryption.
Store user profile data in a centralized database
Implement access control to restrict unauthorized access
Encrypt sensitive user information for added security
I find the Kubernetes package to be complex due to its extensive features and configurations.
Kubernetes has a steep learning curve with various concepts like pods, deployments, services, etc.
Managing Kubernetes clusters requires understanding of networking, storage, security, and scalability.
Configuring Kubernetes involves YAML files, API resources, and command-line tools like kubectl.
Troubleshooting issues in Kubernet...
Application model in SCCM is used to deploy applications based on user-centric requirements, while package model is used for traditional software deployment.
Application model allows for user-centric deployments and dependencies, while package model is more rigid and requires manual intervention for dependencies.
Application model supports user device affinity, allowing for targeted deployments to specific users or devic...
I applied via Referral and was interviewed in Oct 2024. There were 2 interview rounds.
VM integration with self-hosted agent allows for seamless deployment and management of resources.
Self-hosted agents can be used to run tasks on virtual machines (VMs) in a cloud environment.
Integration involves configuring the self-hosted agent to communicate with the VMs for deployment and management.
This setup enables flexibility and control over the resources being utilized.
DevOps practices involve collaboration between development and operations teams to automate processes and improve efficiency.
Continuous integration and continuous deployment (CI/CD)
Infrastructure as code (IaC)
Automated testing
Monitoring and logging
Collaboration and communication between teams
AWS and Azure are two major cloud computing platforms with differences in services, pricing, and market share.
AWS has a larger market share compared to Azure
Azure is known for its strong integration with Microsoft products
AWS offers a wider range of services compared to Azure
Azure provides hybrid cloud solutions with Azure Stack
Pricing models differ between AWS and Azure
Cloud concepts refer to the fundamental ideas and principles behind cloud computing technology.
Cloud computing models (IaaS, PaaS, SaaS)
Virtualization
Scalability
Elasticity
On-demand self-service
Resource pooling
Metered service
Examples: AWS, Azure, Google Cloud
I applied via Company Website and was interviewed in Sep 2024. There was 1 interview round.
Cloud services are categorized into three main types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Infrastructure as a Service (IaaS) provides virtualized computing resources over the internet, such as virtual servers and storage.
Platform as a Service (PaaS) offers a platform allowing customers to develop, run, and manage applications without the complexity of build...
Fastconnect and IPsec tunnels are networking solutions in OCI for secure and reliable connectivity.
Fastconnect provides a private connection between on-premises network and OCI without going through the public internet.
IPsec tunnels create secure communication channels over the public internet between on-premises network and OCI.
Both Fastconnect and IPsec tunnels ensure data privacy, integrity, and availability for net...
Enable audit logs in OCI for monitoring and compliance purposes.
Navigate to the OCI Console and select the compartment you want to enable audit logs for.
Go to 'Audit' under 'Identity' and click on 'Create Configuration'.
Choose the services you want to audit, set the log retention period, and specify the log object storage bucket.
Review and create the configuration to start logging audit events.
Monitor the audit logs in...
File storage is a method of storing and organizing digital files in a structured manner.
File storage involves saving data in a structured format for easy retrieval and management
It can be done locally on a computer or on a network server
Examples include saving documents, images, videos, and other digital files on a computer's hard drive or in cloud storage services like Google Drive or Dropbox
Alarm definition and event rules in OCI are used to monitor and manage resources based on predefined conditions.
Alarm definitions specify the conditions under which an alarm is triggered in OCI Monitoring service
Event rules define actions to be taken when specific events occur in OCI Events service
Both are essential for proactive monitoring and management of resources in OCI
I was interviewed in Jul 2024.
2 questions are there 1 is a moderate dsa question & 2nd is a SQL question
based on 1 interview
Interview experience
Senior Software Engineer
6
salaries
| ₹44 L/yr - ₹54 L/yr |
Software Engineer
4
salaries
| ₹30.4 L/yr - ₹33.6 L/yr |
Production Support Engineer
4
salaries
| ₹2.8 L/yr - ₹3.8 L/yr |
Senior Devops Engineer
4
salaries
| ₹28 L/yr - ₹51.8 L/yr |
Software Engineer2
4
salaries
| ₹32.2 L/yr - ₹32.2 L/yr |
Proofpoint
Barracuda Networks
NortonLifeLock's
Trend Micro