Filter interviews by
State files are typically stored in a centralized location such as a version control system or a cloud storage service.
State files can be stored in version control systems like Git or SVN for easy access and versioning.
Cloud storage services like AWS S3 or Azure Blob Storage can also be used to store state files securely.
Some tools like Terraform recommend using remote backends like Terraform Cloud or HashiCorp Consul ...
Top trending discussions
posted on 21 Nov 2024
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
IAP tunneling refers to the process of securely accessing internal resources from outside a network using Identity-Aware Proxy.
IAP tunneling allows users to securely access internal resources without exposing them to the public internet.
It uses Identity-Aware Proxy to authenticate and authorize users before granting access to the resources.
This helps organizations maintain a secure network environment while enabling re
Canary deployment is a technique used to reduce risk by rolling out new features to a small subset of users before a full release.
Canary deployment involves gradually rolling out a new version of software to a small subset of users or servers.
This allows for monitoring of the new version's performance and stability before a full release.
If the canary deployment is successful, the new version can be gradually rolled out...
To call APIs in Python, you can use libraries like requests or urllib.
Use the requests library to make HTTP requests to APIs
Send GET, POST, PUT, DELETE requests using requests library
Parse JSON responses using the json module
To configure Veracode with ADO, you can write a script that automates the process of setting up the integration.
Use Veracode API to authenticate and interact with Veracode services
Create a script that retrieves Veracode API credentials from ADO secure variables
Automate the process of configuring Veracode settings in ADO pipelines
I applied via Naukri.com and was interviewed in Aug 2024. There were 2 interview rounds.
20 questions in 15 mins
HTTP is unsecured protocol while HTTPS is secured protocol using SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol, while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80, while HTTPS operates on port 443.
HTTPS uses SSL/TLS certificates to encrypt data transmitted over the network, providing a secure connection.
HTTPS is essential for websites that handle sensitive information li...
Release management involves planning, scheduling, and controlling the software release process.
Planning and coordinating the release of software updates
Ensuring that the release process is smooth and efficient
Managing dependencies and version control
Communicating with stakeholders about release timelines and changes
Automating release processes to improve efficiency
CI/CD is a software development practice where code changes are automatically built, tested, and deployed.
Continuous Integration (CI) involves automatically building and testing code changes frequently.
Continuous Deployment (CD) involves automatically deploying code changes to production.
Jenkins is a popular open-source automation server used for CI/CD pipelines.
Jenkins pipelines are defined using a Jenkinsfile which s...
Kubernetes is an open-source container orchestration platform for automating deployment, scaling, and management of containerized applications.
Kubernetes follows a master-slave architecture with a master node controlling multiple worker nodes.
Master node components include API server, scheduler, controller manager, and etcd.
Worker node components include kubelet, kube-proxy, and container runtime (e.g. Docker).
Kubernet...
grep and egrep are command line tools used for searching text patterns in files in Linux.
grep is a basic command line tool for searching text patterns in files.
egrep is an extended version of grep with support for regular expressions.
grep is case-sensitive by default, use -i flag for case-insensitive search.
egrep supports extended regular expressions without escaping special characters.
Example: grep 'pattern' file.txt
E
Use awk command to print the fourth column of a file
Use awk command with '{print $4}' to print the fourth column of a file
Example: awk '{print $4}' file.txt
posted on 29 May 2024
I applied via Job Portal and was interviewed in Apr 2024. There was 1 interview round.
posted on 16 Aug 2024
I applied via Referral and was interviewed in Feb 2024. There was 1 interview round.
Ingress is a Kubernetes resource that manages external access to services, and a sidecar container is a secondary container that runs alongside the main container in a pod.
Ingress is a Kubernetes resource that acts as an API gateway for incoming traffic to services within the cluster.
Ingress controllers are responsible for implementing the rules specified in the Ingress resource.
Sidecar containers are additional contai...
Services in k8s are abstractions that define a set of pods and a policy for accessing them.
Services allow communication between different parts of an application within a Kubernetes cluster.
They provide a stable endpoint for accessing a set of pods, even if the pods are scaled up or down.
Services can be of different types such as ClusterIP, NodePort, LoadBalancer, and ExternalName.
ClusterIP services expose the service ...
Interview experience
based on 1 review
Rating in categories
Software Developer
27
salaries
| ₹2.2 L/yr - ₹10 L/yr |
Senior Software Engineer
20
salaries
| ₹6 L/yr - ₹18 L/yr |
Senior Software Developer
15
salaries
| ₹8 L/yr - ₹14.4 L/yr |
Data Scientist
13
salaries
| ₹4.8 L/yr - ₹18.4 L/yr |
Devops Engineer
11
salaries
| ₹6.8 L/yr - ₹15 L/yr |
TCS
Infosys
Wipro
HCLTech