i
Oracle
Filter interviews by
Clear (1)
I was interviewed in Dec 2024.
ipconf.pl is a Perl script used for configuring network interfaces on Linux systems.
ipconf.pl is typically used to set up IP addresses, netmasks, gateways, and DNS servers on Linux machines.
It can be used to automate the configuration of network interfaces during system setup or maintenance.
The script may also be used to troubleshoot network connectivity issues by checking and modifying network settings.
ipconf.pl is of...
Scan VIP is used for load balancing traffic to multiple nodes, while Node VIP is assigned to a specific node for direct access.
Scan VIP is a virtual IP address used for load balancing traffic across multiple nodes in a cluster.
Node VIP is a virtual IP address assigned to a specific node in the cluster for direct access.
Scan VIP is typically used for services that need to be highly available and distributed across multi...
Quarantile in Exadata is a feature that isolates problematic cells to prevent them from affecting the rest of the system.
Quarantile is a feature in Exadata that identifies and isolates cells that are experiencing issues or failures.
It helps prevent the spread of issues to other cells in the system, ensuring high availability and performance.
Quarantiled cells are still accessible for diagnosis and maintenance, but are n...
The master switch in Exadata can be identified by checking the status of the cell server software.
Check the status of the cell server software using the 'cellcli' command
The cell server with the 'MS' role is the master switch
The master switch can also be identified by checking the 'cellinit.ora' file
Spine switch and leaf switch are networking components in Exadata used for connecting database servers and storage servers.
Spine switch acts as the core of the network, connecting all leaf switches and providing high-speed connectivity.
Leaf switches connect database servers and storage servers to the spine switch, facilitating communication between them.
Exadata uses a leaf-spine network architecture for efficient data ...
One of the node of a 3 node cluster is down. Explain the step by step process to troubleshoot the issue.
Shell script & terraform code output was asked.
I applied via LinkedIn and was interviewed before Jan 2024. There were 3 interview rounds.
Kubernetes (k8s) fundamentals and role of each component
Kubelet - agent that runs on each node in the cluster and ensures containers are running
Kube-proxy - network proxy that maintains network rules on nodes
Kubernetes API server - central management entity that serves the Kubernetes API
etcd - distributed key-value store used for storing cluster data
Kube-controller-manager - runs controller processes to manage the stat...
Troubleshooting crashloop error in Kubernetes involves checking pod logs, examining resource limits, and verifying configuration files.
Check pod logs to identify the cause of the crashloop.
Examine resource limits to ensure the pod has enough resources to run.
Verify configuration files for any errors or misconfigurations.
Use kubectl commands like describe, logs, and exec to troubleshoot further.
Consider checking for iss...
1. Log parsing using python
Inodes are data structures in Unix-like file systems that store metadata about files, such as permissions, ownership, and location.
Inodes contain information about files, such as file size, permissions, timestamps, and pointers to data blocks.
Each file in a Unix-like file system is represented by an inode.
Inodes are used to efficiently locate and manage files on the file system.
When a file is created, an inode is also ...
Use the lsof command to list all files held by a process
Use the lsof command followed by the -p flag and the process ID to list files held by a specific process
For example, to list all files held by process ID 1234, run: lsof -p 1234
You can also use the -c flag to specify a process name instead of ID, like: lsof -c chrome
Containers are lightweight, portable, and efficient, while virtual machines are more isolated and resource-intensive.
Containers share the host OS kernel, making them more lightweight and faster to start compared to VMs.
VMs provide stronger isolation and security by running a separate OS instance for each VM.
Containers are ideal for microservices architecture and rapid deployment, while VMs are better for running multip...
DSA, Hashmaps, Arrays and String Manipulation
Terraform modules are reusable components that can be used to create infrastructure resources.
Modules are collections of .tf files that define resources and their dependencies
They can be used to create reusable infrastructure code
Modules can be published to the Terraform Registry for others to use
They can be used to create complex infrastructure setups easily
What people are saying about Oracle
I applied via Naukri.com and was interviewed before Feb 2023. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Apr 2021. There was 1 interview round.
Before CI/CD, manual processes were used for software deployment, leading to slower release cycles. After CI/CD, automation streamlines the process for faster and more reliable deployments.
Before CI/CD: Manual deployment processes requiring human intervention
After CI/CD: Automated deployment pipelines for continuous integration and continuous delivery
Before CI/CD: Longer release cycles due to manual testing and deploym...
Docker is used for containerization of applications, allowing for easy deployment and scaling. Before Docker, CI/CD integration was more complex and less efficient.
Docker is used to create lightweight, portable, self-sufficient containers that can run applications in any environment.
Before Docker, CI/CD pipelines often relied on virtual machines or manual configurations for deployment and testing.
Docker simplifies the ...
Automate the process of adding mount points on system restart and store Terraform state file for accessibility by other developers.
Use a configuration management tool like Ansible to automatically add mount points on system restart.
Utilize cloud storage services like AWS S3 or Azure Blob Storage to store Terraform state file for easy access by other developers.
Implement scripts or automation workflows to handle the mou...
Store ansible secrets securely and trigger pipeline after another
Use ansible-vault to encrypt sensitive data like passwords and API keys
Store encrypted secrets in a separate file or in a secure vault
Use ansible-playbook to trigger pipelines sequentially or use a CI/CD tool like Jenkins for automation
based on 2 interviews
Interview experience
based on 6 reviews
Rating in categories
Senior Software Engineer
2.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Consultant
2.1k
salaries
| ₹0 L/yr - ₹0 L/yr |
Principal Consultant
2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Member of Technical Staff
1.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Application Engineer
1.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
SAP
MongoDB
Salesforce
IBM