AWS Devops Engineer
100+ AWS Devops Engineer Interview Questions and Answers

Asked in Hindustan Unilever

Q. How can we retrieve all IAM usernames with access keys older than 75 days and send them in a single email?
To get all IAM usernames whose access key age is above 75 in one mail.
Create a script to check access key age for all IAM users
Filter out users with access key age below 75
Send email with list of usernames

Asked in KPIT Technologies

Q. If I delete an instance on the console and then deploy the same instance using a Terraform template, how will Terraform behave?
Terraform will recreate the instance as per the template
Terraform will detect that the instance is missing and recreate it based on the template
The new instance will have the same configuration as defined in the template
Any changes made to the instance outside of Terraform will be lost
AWS Devops Engineer Interview Questions and Answers for Freshers

Asked in KPIT Technologies

Q. If you have an instance configuration Terraform template, and you manually add an EBS volume to it through the console, then run `terraform apply`, how will Terraform behave?
Terraform will detect the manual EBS addition and attempt to reconcile the state, potentially removing the EBS volume.
Terraform maintains a state file that tracks resources it manages.
When you manually add an EBS volume, Terraform is unaware of this change.
On running 'terraform apply', Terraform will compare the current state with the desired state defined in the configuration.
Since the EBS volume is not defined in the Terraform template, Terraform may plan to remove it to ma...read more

Asked in Rapyder Cloud Solutions

Q. How do you troubleshoot a Docker container that is failing?
To troubleshoot a dying docker container, we can use logs, inspect the container, and check resource usage.
Check container logs using 'docker logs
' command Inspect the container using 'docker inspect
' command to check its status and configuration Check resource usage using 'docker stats
' command to see if it's running out of memory or CPU Restart the container using 'docker restart
' command if necessary

Asked in Rapyder Cloud Solutions

Q. How do you take a backup of Linux logs to an AWS S3 bucket?
Use AWS CLI to sync Linux logs to S3 bucket
Install AWS CLI on the Linux machine
Create an S3 bucket and configure IAM role with S3 permissions
Use AWS CLI command 'aws s3 sync' to sync logs to S3 bucket
Schedule a cron job to run the backup regularly

Asked in Saaspect

Q. How many ways can you create a role in AWS?
There are multiple ways to create a role in AWS.
Using AWS Management Console
Using AWS CLI
Using AWS SDKs
Using AWS CloudFormation
Using AWS Identity and Access Management (IAM) APIs
AWS Devops Engineer Jobs




Asked in Vayana

Q. If an EC2 instance is deleted from the AWS Console and then Terraform is applied, will it create a new instance or throw an error?
Terraform will recreate the EC2 machine if it is deleted from AWS Console.
Terraform will detect that the EC2 machine is missing and recreate it according to the defined configuration in the Terraform script.
Deleting the EC2 machine from the AWS Console will not affect the Terraform configuration, as Terraform maintains its own state file.
Running Terraform apply after deleting the EC2 machine will result in the creation of a new machine with the specified configuration.

Asked in TCS

Q. What tools have you used to check the quality of code written for deployment?
I have used code reviews, automated testing, static code analysis tools, and continuous integration to check the quality of code.
Code reviews by peers to catch bugs and ensure best practices
Automated testing using tools like Selenium for functional testing and JUnit for unit testing
Static code analysis tools like SonarQube to identify code smells and potential bugs
Continuous integration with tools like Jenkins to automate testing and deployment processes
Share interview questions and help millions of jobseekers 🌟

Asked in Wipro

Q. Why are both Elastic Compute Cloud and Elastic Load Balancing referred to as 'elastic'?
Both EC2 and ELB are termed 'elastic' due to their ability to scale resources dynamically based on demand.
EC2 instances can be launched or terminated automatically based on traffic, allowing for flexible resource management.
Elastic Load Balancing distributes incoming application traffic across multiple targets, ensuring high availability and fault tolerance.
For example, during peak traffic, EC2 can scale up by adding more instances, while ELB can balance the load among them.
T...read more

Asked in KPIT Technologies

Q. What are the health checks after creating instances - 2/2? What do they mean?
Health checks after creating instances ensure the instances are functioning properly.
Instance status checks ensure the instance is reachable and responding to traffic.
System status checks ensure the underlying hardware is functioning properly.
Example: If an instance fails the system status check, it may indicate a problem with the underlying host hardware.

Asked in Hindustan Unilever

Q. How can we set up an automated job to transfer data from DynamoDB tables to S3 every Friday, and which AWS services should be used?
Use AWS Lambda and CloudWatch Events to automate data transfer from DynamoDB to S3 every Friday.
Create an AWS Lambda function to read data from DynamoDB tables and write to S3 bucket
Create a CloudWatch Events rule to trigger the Lambda function every Friday
Ensure that the Lambda function has the necessary permissions to access DynamoDB and S3
Test the automation job to ensure that data is transferred correctly

Asked in Rapyder Cloud Solutions

Q. How do you give executable permissions of a file only to the user?
To give executable permissions of a file only to the user, use the chmod command with the u+x option.
Open the terminal and navigate to the directory where the file is located.
Use the command 'chmod u+x filename' to give executable permissions to the user only.
Verify the permissions using the 'ls -l' command.

Asked in TCS iON

Q. Manage projects with Repositories Clone a project to work on a local copy Control and track changes with Staging and Committing Branch and Merge to allow for work on different parts and versions of a project Pu...
read moreManaging projects with repositories involves cloning, staging, committing, branching, merging, pulling, and pushing changes.
Clone a project to work on a local copy: Use 'git clone
' to create a local copy of the project. Control and track changes with Staging and Committing: Use 'git add' to stage changes and 'git commit' to commit them.
Branch and Merge to allow for work on different parts and versions of a project: Use 'git branch' to create branches and 'git merge' to merge ...read more

Asked in Celebal Technologies

Q. How to create soft link and hardlink How to create empty file in Linux?
To create a soft link, use the 'ln -s' command. To create a hard link, use the 'ln' command. To create an empty file, use the 'touch' command.
To create a soft link: ln -s
To create a hard link: ln
To create an empty file: touch

Asked in TCS

Q. How do you use blue-green deployment, and what is it?
Blue green deployment is a deployment strategy where two identical production environments are used to minimize downtime and risk.
Blue green deployment involves running two identical production environments, one 'blue' and one 'green'.
Traffic is routed to the 'blue' environment while the 'green' environment is updated and tested.
Once the 'green' environment is deemed stable, traffic is switched to it and the 'blue' environment becomes the new staging environment.
This strategy...read more

Asked in KPIT Technologies

Q. What IP range is needed for 500 IP addresses?
The IP range for 500 IPs would typically be a /23 subnet.
For 500 IPs, you would need at least a /23 subnet.
A /23 subnet provides 512 IP addresses (2^9 = 512), with 510 usable IPs after subtracting network and broadcast addresses.
The IP range for a /23 subnet would be from x.x.x.0 to x.x.x.255.

Asked in Celebal Technologies

Q. What is the use of the chmod and chown commands? Can you provide an example?
chmod and chown commands are used to change file permissions and ownership respectively.
chmod command is used to change the permissions of a file or directory
chown command is used to change the ownership of a file or directory
Example: chmod 755 file.txt - This command gives read, write and execute permissions to the owner and read and execute permissions to group and others
Example: chown user1 file.txt - This command changes the ownership of file.txt to user1

Asked in Rapyder Cloud Solutions

Q. What is the difference between a NAT gateway and an internet gateway?
NAT gateway is used to provide internet access to private subnets while internet gateway is used to provide internet access to public subnets.
NAT gateway is used for outbound traffic while internet gateway is used for inbound and outbound traffic.
NAT gateway is associated with a private subnet while internet gateway is associated with a public subnet.
NAT gateway performs network address translation while internet gateway does not.
Example: NAT gateway is used to allow EC2 inst...read more

Asked in Hindustan Unilever

Q. How can we extract data from Azure Blob Storage to Amazon S3?
Data extraction from Azure blob storage to Amazon S3 can be done using AWS Data Pipeline or Azure Data Factory.
Create a pipeline in AWS Data Pipeline or a data factory in Azure Data Factory
Add a copy activity to the pipeline or data factory
Configure the source as Azure Blob Storage and the destination as Amazon S3
Provide the necessary credentials and permissions for both sources
Run the pipeline or data factory to extract the data from Azure Blob Storage to Amazon S3

Asked in Celebal Technologies

Q. How do you create subdirectories using the mkdir command?
To create sub directories using mkdir command, use the -p option followed by the directory path.
Use the command 'mkdir -p directory/subdirectory'
The -p option creates parent directories if they don't exist
Multiple subdirectories can be created at once using 'mkdir -p directory/subdirectory1/subdirectory2'
Use 'mkdir -m' option to set permissions for the directory

Asked in Rapyder Cloud Solutions

Q. On what basis did you implement autoscaling in your project?
Autoscaling was implemented based on CPU utilization and network traffic.
Autoscaling was implemented to ensure that the application can handle sudden spikes in traffic.
CPU utilization and network traffic were used as metrics to trigger autoscaling.
The minimum and maximum number of instances were set based on the expected traffic.
Load testing was done to determine the optimal scaling thresholds.
Autoscaling policies were set to gradually add or remove instances to avoid sudden ...read more

Asked in TCS

Q. What issues did you face while deploying the application?
I faced issues with network connectivity, configuration errors, and dependency mismatches while deploying the application.
Network connectivity issues causing deployment failures
Configuration errors leading to incorrect application setup
Dependency mismatches causing compatibility issues
Resource constraints impacting deployment performance

Asked in Wipro

Q. DIFFERENCE NACL & SECURITY GROUPS DOCKERS SWARM, HOW DO WE INSTALL JENKINS,
Explanation of NACL, Security Groups, Docker Swarm, and Jenkins installation process.
NACL is a stateless firewall that controls inbound and outbound traffic at the subnet level.
Security Groups are stateful firewalls that control inbound and outbound traffic at the instance level.
Docker Swarm is a container orchestration tool that manages a cluster of Docker hosts.
Jenkins can be installed on a server using a package manager or by downloading and running the Jenkins WAR file.
Je...read more

Asked in Rapyder Cloud Solutions

Q. How do you build and push a Docker image to ECR?
To build and push a docker image to ECR, we need to create a Dockerfile, build the image, tag it, login to ECR, push the image to ECR.
Create a Dockerfile with necessary configurations
Build the image using docker build command
Tag the image using docker tag command
Login to ECR using AWS CLI command aws ecr get-login-password
Push the image to ECR using docker push command

Asked in KPIT Technologies

Q. Write Terraform code to launch an EC2 instance in a VPC and attach a role to it.
Launch an EC2 instance in a VPC and attach a role using Terraform
Define a VPC resource in Terraform
Define a subnet resource within the VPC
Create a security group for the EC2 instance
Define an IAM role for the EC2 instance
Launch an EC2 instance within the subnet and attach the IAM role

Asked in Infosys

Q. What is an ingress controller and how is it used in Kubernetes networking?
Ingress controller is a Kubernetes resource that manages external access to services within a cluster.
Ingress controller acts as a traffic manager, routing incoming traffic to the appropriate services based on rules defined in the Ingress resource.
It allows for the configuration of HTTP and HTTPS routing, load balancing, SSL termination, and more.
Popular Ingress controllers include Nginx Ingress Controller, Traefik, and HAProxy.
Ingress controllers can be used to expose multip...read more

Asked in Epsilon Technologies

Q. Terraform - - Null in terraform, provisionsers, most complex problem in terraform - want to deploy a new application in VPC, but ips are exhausted - route 53 - static website hosting on private S3 bucket - laun...
read moreAnswering questions related to Terraform, VPC, Route 53, S3 bucket, launch templates, and load balancer setup.
Use Terraform's null_resource and provisioners to handle complex problems
For deploying a new application in a VPC with exhausted IPs, consider using Elastic Load Balancing to distribute traffic
Utilize Route 53 for DNS management and routing traffic to the application
Host a static website on a private S3 bucket by configuring bucket policies and enabling static website...read more

Asked in Rapyder Cloud Solutions

Q. How did you integrate Jenkins and Docker?
Jenkins and Docker can be integrated using Jenkins Docker plugin.
Install Docker plugin in Jenkins
Configure Docker Cloud in Jenkins
Create a Jenkins pipeline job and specify Docker image to be used
Use Docker commands in Jenkinsfile to build and push Docker images

Asked in Infosys

Q. How do you securely grant a user access to an S3 bucket?
Grant access to S3 bucket securely by using IAM policies and roles.
Create an IAM policy with specific permissions for the S3 bucket
Attach the IAM policy to an IAM role
Assign the IAM role to the user or group that needs access
Use bucket policies for more granular control if needed
Asked in iCloudEMS

Q. How do you back up a specific table from an AWS RDS instance?
To take a backup of a particular table from AWS RDS instance, you can use the AWS Database Migration Service (DMS) or AWS Data Pipeline.
Use AWS Database Migration Service (DMS) to create a task that includes the specific table you want to backup.
Alternatively, you can use AWS Data Pipeline to schedule regular backups of the table to Amazon S3.
Ensure that you have the necessary IAM permissions to perform backup operations on the RDS instance.
Interview Questions of Similar Designations
Interview Experiences of Popular Companies





Top Interview Questions for AWS Devops Engineer Related Skills



Reviews
Interviews
Salaries
Users

