The document contains 20 questions and answers about Kubernetes concepts. It discusses the role of etcd in storing cluster state, what DaemonSets and the control plane are used for, the different types of Kubernetes services, what Kustomization and ConfigMaps do, and network policies. The document serves as a review of common questions asked in Kubernetes interviews.
The document contains 20 questions and answers about Kubernetes concepts. It discusses the role of etcd in storing cluster state, what DaemonSets and the control plane are used for, the different types of Kubernetes services, what Kustomization and ConfigMaps do, and network policies. The document serves as a review of common questions asked in Kubernetes interviews.
INTERVIEW QUESTION WITH ANSWER PART-2 Scenario based and Simple Questions ALPINE SKI HOUSE EACH QUESTION WILL PAUSE FOR 5-8 SECONDS THINK ABOUT ANSWER
ALPINE SKI HOUSE
Alok Kumar 2 KUBERNETES INTERVIEW QUESTION - 11
What is the role of etcd in a Kubernetes cluster?
etcd is a distributed key-value store used in
Kubernetes to store the configuration data of the cluster. It acts as a single source of truth for the state of the cluster, including the current state of all objects, such as pods, services, and config maps.
ALPINE SKI HOUSE
Alok Kumar 3 KUBERNETES INTERVIEW QUESTION - 12
What is a DaemonSet in Kubernetes?
A DaemonSet is a Kubernetes object that ensures a
single instance of a pod is running on each node in a cluster. This is useful for deploying system-level services, such as log collectors, node-level monitoring agents, and other utilities that need to run on every node.
ALPINE SKI HOUSE
Alok Kumar 4 KUBERNETES INTERVIEW QUESTION - 13
What is the Kubernetes control plane?
The Kubernetes control plane is a set of components that
manage the state of a cluster, including the API server, controller manager, and scheduler. The API server is the frontend for the Kubernetes control plane and exposes the RESTful API for managing the cluster, the controller manager is responsible for managing the state of various objects in the cluster, and the scheduler is responsible for scheduling pods on nodes in the cluster.
ALPINE SKI HOUSE
Alok Kumar 5 KUBERNETES INTERVIEW QUESTION - 14
A cluster administrator has a set of pods running a web application
that need to communicate with each other. What type of Service should the administrator use to allow the pods to communicate with each other? A ClusterIP Service should be used to allow the pods running the web application to communicate with each other. ClusterIP Services provide a stable IP address for a group of pods within the cluster, making it easy to set up communication between pods. By using a ClusterIP Service, the administrator can provide a stable IP address for the pods running the web application, which the pods can use to communicate with each other. ALPINE SKI HOUSE Alok Kumar 6 KUBERNETES INTERVIEW QUESTION - 15
What is a Kustomization file in Kubernetes?
A Kustomization file is a YAML file used in Kubernetes to
manage and apply customizations to Kubernetes objects. It allows you to define, modify, and extend Kubernetes objects in a reusable and repeatable way, and it can be used to create custom resources and manage resource configurations. Kustomization files are used in combination with kubectl apply to apply the desired state to a cluster.
ALPINE SKI HOUSE
Alok Kumar 7 KUBERNETES INTERVIEW QUESTION - 16
A cluster administrator is running a web application that
needs to be accessed by external clients over the internet. What type of Service should the administrator use to accomplish this? A LoadBalancer Service should be used to expose the web application to external clients over the internet. LoadBalancer Services provide external IP addresses that can be accessed from outside the cluster, making it easy to expose a web application running in the cluster to the internet. By using a LoadBalancer Service, the administrator can provide external access to the web application, making it possible for external clients to access the application over the internet. ALPINE SKI HOUSE Alok Kumar 8 KUBERNETES INTERVIEW QUESTION - 17
What is a Namespace in Kubernetes and why is it used?
A Namespace in Kubernetes is a virtual cluster within a
cluster, and it is used to divide resources and limit scope in a cluster. Namespaces allow you to isolate resources and enforce resource quotas, and they are used to provide environment-specific resources, such as development, testing, and production environments. Multiple namespaces can be used to partition resources in a cluster and enforce access controls between teams and environments.
ALPINE SKI HOUSE
Alok Kumar 9 KUBERNETES INTERVIEW QUESTION - 18
What is a Pod in Kubernetes and what is it used for?
A Pod in Kubernetes is the smallest and simplest unit
in the cluster, representing a single instance of a running process. Pods are used to host the containers that run the applications and services in the cluster. Pods provide a way to manage the deployment and execution of containers in the cluster, making it easier to manage the scaling, placement, and lifecycle of the containers. ALPINE SKI HOUSE 10 Alok Kumar KUBERNETES INTERVIEW QUESTION - 19
What is a ConfigMap in Kubernetes and what is it used for?
A ConfigMap in Kubernetes is a resource that stores
configuration data as key-value pairs. ConfigMaps are used to store configuration data, such as command line arguments, environment variables, and configuration files, that are needed by the applications running in the cluster. ConfigMaps provide a way to manage configuration data, making it easier to update the configuration of an application without having to rebuild and redeploy the application.
ALPINE SKI HOUSE 11
Alok Kumar KUBERNETES INTERVIEW QUESTION - 20
What is a network policy in Kubernetes and what is it used
for?
A network policy in Kubernetes is a resource that defines the
allowed ingress and egress traffic to pods in the cluster. Network policies are used to control the communication between pods, and to limit the exposure of pods to the network. Network policies provide a way to enforce security and isolation between pods, ensuring that only authorized traffic is allowed to reach the pods.