Cloud Operations Engineer
20+ Cloud Operations Engineer Interview Questions and Answers
Q1. How do you give access to users via az portal
To give access to users via az portal, follow these steps:
Log in to the Azure portal
Navigate to the resource you want to give access to
Click on the 'Access control (IAM)' tab
Click on the 'Add' button
Select the role you want to assign to the user
Enter the user's email address or select from the list of existing users
Click on the 'Save' button
Q2. What is diff between management group and tenant
Management group is a logical container for resources while tenant is an organization or individual who owns and manages resources.
Management group is used to organize resources and apply policies across multiple subscriptions.
Tenant is the highest level of organization in Azure and represents an individual or organization that owns and manages resources.
A tenant can have multiple subscriptions and management groups.
Management groups can be nested within each other to create ...read more
Q3. How do you connect to storage account
To connect to a storage account, you need to use the appropriate connection string.
Obtain the connection string from the Azure portal or programmatically
Use the connection string in your code to connect to the storage account
Examples of connection strings: Blob storage - DefaultEndpointsProtocol=https;AccountName=myaccount;AccountKey=mykey;EndpointSuffix=core.windows.net, File storage - DefaultEndpointsProtocol=https;AccountName=myaccount;AccountKey=mykey;EndpointSuffix=file....read more
Q4. What are Types of network peering
Types of network peering include private, public, and global.
Private peering involves connecting two networks directly, without going through a third-party network.
Public peering involves connecting to a public internet exchange point (IXP) where multiple networks can exchange traffic.
Global peering involves connecting to a global IXP, which allows for peering with networks around the world.
Other types of peering include remote peering, where networks connect remotely through...read more
Q5. Docker Restart will change which attributes of comtainer
Docker Restart changes the container's attributes like IP address, hostname, and uptime.
IP address of the container will change after restart
Hostname of the container may change
Uptime of the container will be reset
Any changes made to the container's filesystem will be lost
Q6. Difference between sas keys and access keys
SAS keys are used for accessing specific resources while access keys are used for accessing all resources in a storage account.
SAS keys provide time-limited access to specific resources in a storage account
Access keys provide full access to all resources in a storage account
SAS keys are more secure as they limit access to specific resources and have an expiration time
Access keys should be used only for initial setup and not shared with others
Examples of resources that can be ...read more
Share interview questions and help millions of jobseekers 🌟
Q7. What is azure Active Directory?
Azure Active Directory is a cloud-based identity and access management service.
It provides single sign-on and multi-factor authentication for applications and services.
It allows users to access resources across multiple cloud environments.
It integrates with other Microsoft services such as Office 365 and Azure.
It can be used to manage user identities and access to resources within an organization.
It supports various authentication protocols such as OAuth, OpenID Connect, and ...read more
Q8. Difference between private and service endpoint
Private endpoint is used to access resources within a VNet, while service endpoint is used to access Azure services over a private link.
Private endpoint is a network interface that connects to a specific resource within a VNet
Service endpoint is a secure and direct connection to an Azure service over a private link
Private endpoint provides secure access to resources without exposing them to the public internet
Service endpoint reduces data exposure to the public internet and i...read more
Cloud Operations Engineer Jobs
Q9. How many EBS can be attached to single EC2
The maximum number of EBS volumes that can be attached to a single EC2 instance is 40.
Maximum of 40 EBS volumes can be attached to a single EC2 instance
Each EBS volume can be up to 16 TiB in size
EBS volumes can be attached and detached while the instance is running
Q10. How do you troubleshoot Kubernetes issues?
Troubleshooting Kubernetes issues involves identifying the root cause, checking logs, examining configurations, and using monitoring tools.
Identify the specific issue by checking logs and error messages.
Examine the Kubernetes configurations to ensure they are set up correctly.
Use monitoring tools like Prometheus or Grafana to track performance metrics.
Check the status of pods, nodes, and deployments to pinpoint any issues.
Utilize kubectl commands to gather information and int...read more
Q11. How to create an EC2 instance using terraform
To create an EC2 instance using Terraform, you need to define the instance configuration in a Terraform file and then apply the configuration using Terraform commands.
Define the EC2 instance configuration in a Terraform file using the 'aws_instance' resource type
Specify the instance type, AMI ID, key pair, security group, and other necessary parameters in the configuration
Run 'terraform init' to initialize the Terraform environment
Run 'terraform plan' to preview the changes t...read more
Q12. 3 what is nsg and asg
NSG stands for Network Security Group and ASG stands for Application Security Group.
NSG is a firewall that filters network traffic to and from Azure resources.
ASG is a logical container for grouping Azure VMs to apply network security policies.
NSG can be associated with subnets, VMs, or network interfaces.
ASG can be associated with NSGs to enforce security policies on a group of VMs.
NSG rules can allow or deny traffic based on source/destination IP, port, and protocol.
ASG rul...read more
Q13. Different vpn sets up in azure
Azure provides multiple VPN options for different use cases.
Site-to-Site VPN for connecting on-premises network to Azure
Point-to-Site VPN for connecting individual devices to Azure
ExpressRoute for dedicated private connections to Azure
VNet-to-VNet VPN for connecting multiple VNets in Azure
Third-party VPN solutions can also be used
Q14. What is service principal?
A service principal is an identity created for an application to access resources in a specific tenant.
Service principal is used to authenticate an application to access resources in Azure Active Directory.
It is created for a specific tenant and can be assigned roles and permissions.
Service principal can be used to access Azure resources like virtual machines, storage accounts, etc.
It is commonly used in automation scenarios like CI/CD pipelines and Azure DevOps.
Examples of a...read more
Q15. Cloud types, what is virtual network
Virtual network is a software-defined network that allows multiple virtual machines to communicate with each other as if they were on the same physical network.
Virtual network is created using software and can span across multiple physical networks.
It provides isolation and security for the virtual machines within the network.
Virtual network allows for efficient communication and data transfer between virtual machines.
Examples include Azure Virtual Network, AWS Virtual Privat...read more
Q16. What is javaregex..what do yiu think
Java regex is a sequence of characters that defines a search pattern for matching strings in Java.
Java regex is used for pattern matching and string manipulation in Java.
It allows you to search, replace, and validate strings based on specific patterns.
Regex patterns are defined using a combination of characters and special symbols.
Some common regex methods in Java include matches(), find(), replaceAll(), etc.
For example, to check if a string contains only digits, you can use ...read more
Q17. Prerequisites for S3 Cross Region Replication
Prerequisites for S3 Cross Region Replication include enabling versioning, configuring IAM roles, and ensuring proper bucket policies.
Enable versioning on both source and destination buckets
Configure IAM roles with proper permissions for replication
Ensure proper bucket policies are in place for cross region replication
Q18. Write a bash script to make pyramid
Bash script to create a pyramid pattern
Use nested loops to print spaces and stars in a pyramid shape
Incrementally increase the number of stars in each row
Calculate the number of spaces needed for each row based on the total number of rows and current row number
Q19. S3 vs EFS scenario based use cases.
S3 is ideal for storing static files like images and videos, while EFS is better for shared file storage among multiple EC2 instances.
S3 is object storage, suitable for storing large amounts of unstructured data like images, videos, backups, and logs.
EFS is a file storage service that can be mounted on multiple EC2 instances, making it ideal for shared file systems and databases.
Use S3 for static website hosting, data archiving, and data lakes.
Use EFS for content management s...read more
Q20. Explain terraform init, plan and apply
Terraform init initializes a working directory, plan creates an execution plan, and apply executes the plan.
terraform init is used to initialize a working directory containing Terraform configuration files
terraform plan is used to create an execution plan showing what Terraform will do when you run apply
terraform apply is used to apply the changes required to reach the desired state of the configuration
Q21. 4 different types of blob
There are 4 types of blobs in Azure Blob Storage: block blobs, append blobs, page blobs, and managed disks.
Block blobs are used for storing large amounts of unstructured data.
Append blobs are used for appending data to an existing blob.
Page blobs are used for storing random access files and virtual hard disks.
Managed disks are used for storing virtual machine disks in Azure.
Examples: storing images, videos, backups, and virtual machine disks.
Q22. Analysing Coding and approach
Analysing coding and approach is crucial for efficient cloud operations.
Review code for efficiency and scalability
Identify potential bottlenecks and optimize code
Ensure adherence to best practices and standards
Collaborate with developers to improve code quality
Implement automation and monitoring tools for continuous improvement
Interview Questions of Similar Designations
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month