i
Quest Global
Filter interviews by
Top trending discussions
I applied via Company Website and was interviewed before Sep 2022. There were 3 interview rounds.
Out of memory in Kubernetes can occur due to resource limits not being set, inefficient application code, or insufficient memory allocation.
Check resource limits and requests in Kubernetes manifests
Optimize application code to reduce memory usage
Increase memory allocation for pods if needed
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
Create a k8s deployment ymal with rolling update for a given docker image
Define a Deployment object in the YAML file
Specify the container image in the spec section
Set the update strategy to RollingUpdate
Define the number of replicas for the deployment
I applied via Naukri.com and was interviewed in Apr 2024. There was 1 interview round.
posted on 1 Dec 2024
I applied via Approached by Company and was interviewed in Nov 2024. There was 1 interview round.
I appeared for an interview in Aug 2021.
LDAP authentication is a method of verifying user credentials against a centralized directory service.
LDAP stands for Lightweight Directory Access Protocol
It is commonly used for centralized authentication and authorization
LDAP servers store user and group information in a hierarchical structure
LDAP authentication can be integrated with various applications and services
Examples of LDAP servers include OpenLDAP and Micr
posted on 22 May 2024
I applied via LinkedIn and was interviewed in Apr 2024. There were 2 interview rounds.
To manage drift in Terraform due to manually added services, use Terraform import, state management, and version control.
Use Terraform import to bring manually added services under Terraform management.
Regularly update Terraform state file to reflect the current state of infrastructure.
Utilize version control to track changes made outside of Terraform.
Implement automated checks to detect and reconcile drift in infrastr
To safeguard data and services, I would implement encryption, access controls, regular backups, and monitoring.
Implement encryption for data at rest and in transit
Set up access controls to restrict unauthorized access
Regularly backup data to prevent data loss
Implement monitoring and alerting to detect and respond to security incidents
posted on 21 Nov 2024
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
IAP tunneling refers to the process of securely accessing internal resources from outside a network using Identity-Aware Proxy.
IAP tunneling allows users to securely access internal resources without exposing them to the public internet.
It uses Identity-Aware Proxy to authenticate and authorize users before granting access to the resources.
This helps organizations maintain a secure network environment while enabling re
Canary deployment is a technique used to reduce risk by rolling out new features to a small subset of users before a full release.
Canary deployment involves gradually rolling out a new version of software to a small subset of users or servers.
This allows for monitoring of the new version's performance and stability before a full release.
If the canary deployment is successful, the new version can be gradually rolled out...
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Senior Software Engineer
2.4k
salaries
| ₹4.8 L/yr - ₹20 L/yr |
Software Engineer
2k
salaries
| ₹2.8 L/yr - ₹9.3 L/yr |
Senior Engineer
1.8k
salaries
| ₹4.9 L/yr - ₹18.2 L/yr |
Lead Engineer
1.7k
salaries
| ₹7.6 L/yr - ₹24 L/yr |
Design Engineer
643
salaries
| ₹2.2 L/yr - ₹8.3 L/yr |
Virtusa Consulting Services
Genpact
Nagarro
Sopra Steria