i
PowerSchool India
Filter interviews by
Top trending discussions
Postfix mail server can be managed and configured using configuration files and command line tools.
Edit the main configuration file /etc/postfix/main.cf to make changes to the server settings
Use postconf command to view or change configuration parameters
Restart the postfix service after making changes for them to take effect
Utilize tools like postmap to manage lookup tables for postfix
Monitor mail server logs for troub
To fix an OS in maintenance mode, reboot the system, check for any recent changes or updates, run diagnostics, and restore from a backup if necessary.
Reboot the system to see if it resolves the issue
Check for any recent changes or updates that may have caused the OS to go into maintenance mode
Run diagnostics to identify any hardware or software issues
Restore the OS from a backup if needed
I applied via Company Website and was interviewed in Feb 2022. There were 3 interview rounds.
Aptitude test is to test the Individual skill
I know multiple programming languages
I am proficient in Java and Python
I have basic knowledge of C++ and JavaScript
I am currently learning Ruby and Swift
I applied via Company Website and was interviewed in Mar 2020. There was 1 interview round.
The VPN port used for UDP is typically 500.
The VPN port used for UDP is usually port 500.
UDP is a protocol that allows for faster transmission of data but does not guarantee delivery or order of packets.
Port 500 is commonly used for IPsec VPNs, which provide secure communication over the internet.
Other VPN protocols may use different ports for UDP, so it's important to check the specific configuration.
Syntax for grep command and regex
grep [options] pattern [file]
Regular expression (regex) is used to define the pattern
Examples: grep 'hello' file.txt
grep -i 'hello' file.txt
grep -r 'hello' /path/to/directory
You can use the Docker API to remotely run Docker commands on a Linux server without taking a separate SSH session.
Use the Docker API to interact with the Docker daemon on the remote Linux server.
Make sure Docker is installed and running on both your laptop and the remote server.
Authenticate with the remote server using appropriate credentials.
Establish a connection to the Docker daemon on the remote server using the D...
I appeared for an interview before Mar 2021.
Round duration - 60 Minutes
Round difficulty - Medium
This round started with some basic questions from DevOps followed by some more questions from Docker and Linux.
Continuous Testing (CT) is the process of executing automated tests as part of the software delivery pipeline to obtain immediate feedback on the business risks associated with a software release candidate.
CT helps in identifying defects early in the development cycle.
It ensures that the software is always in a releasable state.
CT integrates testing into the CI/CD pipeline for faster feedback loops.
Examples include run...
AWS provides a wide range of services and tools that support the principles and practices of DevOps.
AWS offers infrastructure as code tools like CloudFormation and Terraform for automating the provisioning of resources.
AWS provides a variety of monitoring and logging services such as CloudWatch and CloudTrail to help with continuous monitoring and feedback loops.
AWS supports continuous integration and continuous deploy...
A Docker image registry is a repository for storing and managing Docker images.
It allows users to push and pull Docker images to and from the registry.
Popular Docker image registries include Docker Hub, Amazon ECR, and Google Container Registry.
Registries can be public or private, with private registries requiring authentication for access.
Docker has 3 main components: Docker Engine, Docker Images, and Docker Containers.
Docker Engine is the core component responsible for running and managing Docker containers.
Docker Images are read-only templates used to create Docker containers.
Docker Containers are lightweight, standalone, and executable packages that include everything needed to run a piece of software.
The lifecycle of a Docker container involves creation, running, pausing, restarting, and stopping.
1. Creation: A Docker container is created from a Docker image using the 'docker run' command.
2. Running: The container is started and runs the specified application or service.
3. Pausing: The container can be paused using the 'docker pause' command, which temporarily stops its processes.
4. Restarting: The container can be...
LVM stands for Logical Volume Manager, used to manage disk space efficiently by allowing for dynamic resizing of volumes.
LVM allows for easy resizing of volumes without the need to unmount the filesystem
It provides features like snapshots, striping, mirroring, and thin provisioning
LVM can span multiple physical disks to create a single logical volume
Load average in Linux is a measure of system activity, indicating the average number of processes waiting for CPU time over a period of time.
Load average is displayed as three numbers representing the average load over the last 1, 5, and 15 minutes.
A load average of 1.0 means the system is at full capacity, while a load average of 0.5 means the system is half as busy.
High load averages may indicate that the system is o...
Round duration - 60 Minutes
Round difficulty - Medium
This round started with me first giving a brief intro about my experience in the DevOps sector and then the interviewer switched to asking me questions about Git , Docker and Kubernetes.
The command used to delete a branch in Git is 'git branch -d <branch_name>'.
Use 'git branch -d <branch_name>' to delete a branch in Git.
Make sure to switch to a different branch before deleting the branch.
If the branch has not been merged, use 'git branch -D <branch_name>' to force delete.
Git reflog is a reference log that records changes to the HEAD of the repository.
Records all changes to the HEAD reference
Useful for recovering lost commits or branches
Can be accessed using 'git reflog' command
git revert undoes a specific commit by creating a new commit, while git reset moves the HEAD to a previous commit without creating a new commit.
git revert creates a new commit that undoes a specific commit, keeping the commit history intact
git reset moves the HEAD to a previous commit, potentially discarding changes made after that commit
git revert is safer for shared branches as it does not rewrite history, while git ...
CMD specifies the default command to run in the container, while ENTRYPOINT specifies the executable to run when the container starts.
CMD is often used to provide default arguments for the ENTRYPOINT command
ENTRYPOINT is used to specify the executable that will run when the container starts
CMD can be overridden at runtime by passing arguments to docker run command
ENTRYPOINT cannot be overridden at runtime, but can be c
Monitoring a Kubernetes cluster involves using tools like Prometheus, Grafana, and Kubernetes Dashboard.
Use Prometheus for collecting metrics from Kubernetes components and applications running on the cluster.
Set up Grafana for visualizing the collected metrics and creating dashboards for monitoring.
Utilize Kubernetes Dashboard for a graphical interface to view and manage the cluster resources.
Implement alerts and noti...
Kubernetes Load Balancing is a method to distribute incoming network traffic across multiple pods in a Kubernetes cluster.
Kubernetes Load Balancer service type automatically creates a cloud provider load balancer.
It helps in scaling applications by distributing traffic evenly across multiple pods.
Load balancing ensures high availability and reliability of applications running in a Kubernetes cluster.
Jenkins is an open-source automation server that helps to automate the non-human part of the software development process.
Jenkins is a Java-based application that runs in a servlet container like Apache Tomcat.
It can be installed on a single server or distributed across multiple servers for scalability.
Jenkins uses plugins to extend its functionality, allowing integration with various tools and technologies.
It follows ...
Round duration - 30 Minutes
Round difficulty - Easy
This was a typical HR round with some standard Behavioral questions.
Tip 1 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 2 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Recruitment Consulltant and was interviewed before May 2021. There were 2 interview rounds.
I applied via Company Website and was interviewed in Mar 2020. There was 1 interview round.
Terraform modules are reusable components that allow you to define and manage infrastructure as code.
Modules are collections of resources that can be used across multiple Terraform configurations
They can be shared and reused by other teams or projects
Modules can be published to the Terraform Registry for easy discovery and use
They help to reduce duplication of code and simplify infrastructure management
Debugging Apache Nginx issues involves checking logs, configuration files, and server status.
Check error logs for any relevant error messages
Verify the configuration files for syntax errors
Check server status and resource usage
Use tools like curl or telnet to test connectivity and response times
Check firewall rules and network settings
Consider load balancing and caching configurations
Prevent DDoS attack by implementing various measures
Implementing firewalls and intrusion detection systems
Using load balancers to distribute traffic
Blocking traffic from suspicious IP addresses
Using content delivery networks (CDNs)
Limiting the number of requests per IP address
Using anti-DDoS services provided by cloud providers
Regularly monitoring network traffic for unusual patterns
Yes, AWS provides various methods to blacklist IPs.
Use AWS WAF to create rules to block specific IP addresses
Configure security groups to deny traffic from specific IP addresses
Utilize AWS Network ACLs to block traffic from specific IP addresses
Average load in Linux refers to the amount of work being done by the system at a given time.
Average load is measured as a decimal number, with 1.00 representing a fully loaded system.
It takes into account both running processes and processes waiting for resources.
High average load can indicate a need for more resources or optimization of processes.
Command 'uptime' can be used to check the average load on a Linux system
Inodes are data structures that store information about files on a Unix/Linux file system. File descriptors are unique identifiers for open files. Swap is a space on a hard disk used as virtual memory.
Inodes contain metadata about files such as ownership, permissions, and timestamps.
File descriptors are used by the operating system to keep track of open files and to perform I/O operations on them.
Swap is used when the ...
Load balancer routes traffic to other healthy instances
Load balancer detects the unhealthy instance
Stops sending traffic to that instance
Routes traffic to other healthy instances
Maintains high availability and scalability of the application
To debug a progressively slowing down website, I would analyze the server logs, check for memory leaks, and optimize the code.
Analyze server logs to identify any errors or bottlenecks
Check for memory leaks in the code
Optimize the code by removing unnecessary scripts and optimizing images
Use tools like Chrome DevTools to identify performance issues
Consider implementing a content delivery network (CDN) to improve website
Docker save and Docker load commands can be used to transfer an image from one machine to another without using a Docker registry.
Use the 'docker save' command to save the image as a tar file on the source machine
Transfer the tar file to the destination machine using any file transfer method (e.g., scp)
On the destination machine, use the 'docker load' command to load the image from the tar file
A program to reverse a string in Python
Use the slicing technique to reverse the string
Start with the last character and move backwards
Store the reversed string in a new variable
Ansible playbook to install Apache
Create a playbook file with .yml extension
Define hosts and remote user
Add tasks to install Apache package
Start Apache service
Save and run the playbook using ansible-playbook command
Distributed Jenkins nodes are used to handle large-scale builds and improve performance.
Large-scale builds: When there are a large number of builds to be executed simultaneously, distributed Jenkins nodes can handle the load by distributing the builds across multiple nodes.
Improved performance: By distributing the workload, the overall build time can be reduced, resulting in improved performance.
Resource utilization: D...
I applied via LinkedIn and was interviewed before Aug 2021. There were 2 interview rounds.
I applied via Recruitment Consultant and was interviewed before Sep 2020. There were 3 interview rounds.
based on 2 reviews
Rating in categories
Senior Software Engineer
136
salaries
| ₹10.2 L/yr - ₹32 L/yr |
Software Engineer
102
salaries
| ₹5.5 L/yr - ₹21.8 L/yr |
Technical Support Engineer
91
salaries
| ₹4.2 L/yr - ₹10 L/yr |
Associate Software Engineer
55
salaries
| ₹5 L/yr - ₹10.2 L/yr |
Software Engineer2
54
salaries
| ₹13 L/yr - ₹23 L/yr |
BYJU'S
Whitehat jr
Unacademy
Extramarks Education