i
Movate
Filter interviews by
I applied via Approached by Company and was interviewed in Dec 2023. There were 3 interview rounds.
Everything is good they are given for good aptitude test
Good interview is very deep ...they are asked to very scenario questions
posted on 19 Nov 2024
I applied via Naukri.com and was interviewed in May 2024. There were 3 interview rounds.
CI/CD pipeline is a set of automated processes that allow developers to continuously integrate code changes and deploy them to production.
Continuous Integration (CI) involves automatically building and testing code changes as they are committed to a shared repository.
Continuous Deployment (CD) involves automatically deploying code changes to production environments after passing automated tests.
CI/CD pipelines typicall...
DaemonSet ensures that all or some nodes run a copy of a Pod
DaemonSet is a Kubernetes resource that ensures a copy of a Pod is running on all or some nodes in the cluster
It is useful for running a single instance of a Pod on every node, such as log collection or monitoring agents
DaemonSet automatically adds or removes Pods as nodes are added or removed from the cluster
AWS provides a variety of networking services to help users manage their network infrastructure.
Virtual Private Cloud (VPC) allows users to create isolated networks within the AWS cloud
Elastic Load Balancing distributes incoming traffic across multiple instances to ensure high availability
Route 53 is a scalable domain name system (DNS) web service
Direct Connect allows users to establish a dedicated network connection b...
Terraform module is a reusable, configurable, and self-contained collection of Terraform resources.
Terraform modules help organize and reuse code for infrastructure components
Modules can be shared and reused across different projects
Modules can have input variables to customize their behavior
Modules can output values that can be used by other parts of the infrastructure code
GitOps tools help automate infrastructure management, version control, and deployment processes.
Enables infrastructure as code practices
Facilitates version control for infrastructure configurations
Automates deployment processes
Promotes collaboration and visibility among team members
Examples: Argo CD, Flux, Jenkins X
AWS Secret Manager is a service that helps you protect access to your applications, services, and IT resources.
It allows you to securely store, manage, and retrieve sensitive credentials and configuration data.
You can rotate, manage, and retrieve secrets throughout their lifecycle.
Integrates with AWS services like Lambda, EC2, RDS, and more for secure access to secrets.
Helps you meet security and compliance requirement...
Vault is a tool for managing secrets and protecting sensitive data.
Vault securely stores and manages sensitive information such as API keys, passwords, and certificates.
It provides a centralized place for managing access control and encryption of data.
Vault can be integrated with AWS to securely store and retrieve AWS credentials and other sensitive information.
Integration with AWS allows for automated provisioning and...
posted on 13 Nov 2024
I applied via Campus Placement
Aptitude was mix of questions from logical reasoning, english grammar to simple numerical problems.
I applied via LinkedIn and was interviewed in Apr 2024. There was 1 interview round.
I am familiar with a variety of technologies commonly used in DevOps, including Docker, Kubernetes, Jenkins, Ansible, and Git.
Docker
Kubernetes
Jenkins
Ansible
Git
posted on 22 May 2024
I applied via LinkedIn and was interviewed in Apr 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Dec 2023. There was 1 interview round.
Node affinity is a feature in Kubernetes that allows pods to be scheduled onto nodes based on labels assigned to nodes.
Node affinity is used to ensure that pods are scheduled onto nodes that meet certain criteria specified in the pod's affinity rules.
There are two types of node affinity: requiredDuringSchedulingIgnoredDuringExecution and preferredDuringSchedulingIgnoredDuringExecution.
Node affinity rules can be based o...
Security groups are virtual firewalls that control inbound and outbound traffic for instances in a cloud network.
Security groups are used to control traffic at the instance level.
They act as virtual firewalls for instances in a cloud network.
They allow you to specify which traffic is allowed to reach your instances.
You can define rules for inbound and outbound traffic based on protocols, ports, and IP addresses.
Securit...
based on 5 reviews
Rating in categories
Senior Engineer
1.5k
salaries
| ₹2.2 L/yr - ₹12 L/yr |
Technical Support Engineer
1.4k
salaries
| ₹1 L/yr - ₹7 L/yr |
Network Engineer
1.1k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Engineer
1.1k
salaries
| ₹1.8 L/yr - ₹8.5 L/yr |
Specialist
312
salaries
| ₹4.5 L/yr - ₹17.3 L/yr |
TCS
Infosys
Wipro
HCLTech