Update
This commit is contained in:
parent
c66780275c
commit
99050cbf90
60
README.md
60
README.md
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
:information_source: This repo contains questions and exercises on various technical topics, sometimes related to DevOps and SRE :)
|
:information_source: This repo contains questions and exercises on various technical topics, sometimes related to DevOps and SRE :)
|
||||||
|
|
||||||
:bar_chart: There are currently **1518** questions
|
:bar_chart: There are currently **1519** questions
|
||||||
|
|
||||||
:books: To learn more about DevOps and SRE, check the resources in [devops-resources](https://github.com/bregman-arie/devops-resources) repository
|
:books: To learn more about DevOps and SRE, check the resources in [devops-resources](https://github.com/bregman-arie/devops-resources) repository
|
||||||
|
|
||||||
@ -120,6 +120,28 @@ Google:
|
|||||||
* Not allowing someone to push to production on Friday ;)
|
* Not allowing someone to push to production on Friday ;)
|
||||||
</b></details>
|
</b></details>
|
||||||
|
|
||||||
|
#### Version Control
|
||||||
|
|
||||||
|
<details>
|
||||||
|
<summary>What is Version Control?</summary><br><b>
|
||||||
|
</b></details>
|
||||||
|
|
||||||
|
<details>
|
||||||
|
<summary>What is a commit?</summary><br><b>
|
||||||
|
</b></details>
|
||||||
|
|
||||||
|
<details>
|
||||||
|
<summary>What is a merge?</summary><br><b>
|
||||||
|
</b></details>
|
||||||
|
|
||||||
|
<details>
|
||||||
|
<summary>What is a merge conflict?</summary><br><b>
|
||||||
|
</b></details>
|
||||||
|
|
||||||
|
<details>
|
||||||
|
<summary>What best practices are you familiar with regarding version control?</summary><br><b>
|
||||||
|
</b></details>
|
||||||
|
|
||||||
#### CI/CD
|
#### CI/CD
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
@ -663,6 +685,10 @@ It's important to note that:
|
|||||||
* Serverless Computing allows you to have a different paying model. You basically pay only when your functions are running and not when the VM or containers are running as in other payment models
|
* Serverless Computing allows you to have a different paying model. You basically pay only when your functions are running and not when the VM or containers are running as in other payment models
|
||||||
</b></details>
|
</b></details>
|
||||||
|
|
||||||
|
<details>
|
||||||
|
<summary>Is there a difference between managed service to SaaS or is it the same thing?</summary><br><b>
|
||||||
|
</b></details>
|
||||||
|
|
||||||
## AWS
|
## AWS
|
||||||
|
|
||||||
#### Global Infrastructure
|
#### Global Infrastructure
|
||||||
@ -1956,8 +1982,6 @@ Packets that are sent on the ethernet are always coming from a MAC address and s
|
|||||||
<summary>What is an IP address?</summary><br><b>
|
<summary>What is an IP address?</summary><br><b>
|
||||||
|
|
||||||
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.An IP address serves two main functions: host or network interface identification and location addressing.
|
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.An IP address serves two main functions: host or network interface identification and location addressing.
|
||||||
|
|
||||||
|
|
||||||
</b></details>
|
</b></details>
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
@ -1987,7 +2011,11 @@ A Subnet mask is a 32-bit number that masks an IP address, and divides the IP ad
|
|||||||
</b></details>
|
</b></details>
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>What is a private IP address? What do we need it for?</summary><br><b>
|
<summary>What is a private IP address? In which scenarios/system designs, one should use it?</summary><br><b>
|
||||||
|
</b></details>
|
||||||
|
|
||||||
|
<details>
|
||||||
|
<summary>What is a public IP address? In which scenarios/system designs, one should use it?</summary><br><b>
|
||||||
</b></details>
|
</b></details>
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
@ -10762,7 +10790,17 @@ The server didn't receive a response from another server it communicates with in
|
|||||||
</b></details>
|
</b></details>
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>What load balancer algorithms are you familiar with?</summary><br><b>
|
<summary>What load balancer techniques/algorithms are you familiar with?</summary><br><b>
|
||||||
|
|
||||||
|
* Round Robin
|
||||||
|
* Weighted Round Robin
|
||||||
|
* Least Connection
|
||||||
|
* Weighted Least Connection
|
||||||
|
* Resource Based
|
||||||
|
* Fixed Weighting
|
||||||
|
* Weighted Response Time
|
||||||
|
* Source IP Hash
|
||||||
|
* URL Hash
|
||||||
</b></details>
|
</b></details>
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
@ -10792,14 +10830,20 @@ Pros:
|
|||||||
</b></details>
|
</b></details>
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>Explain the following load balancing algorithms:
|
<summary>Explain each of the following load balancing techniques
|
||||||
|
|
||||||
* Round Robin
|
* Round Robin
|
||||||
|
* Weighted Round Robin
|
||||||
* Least Connection
|
* Least Connection
|
||||||
* Source IP hash</summary><br><b>
|
* Weighted Least Connection
|
||||||
|
* Resource Based
|
||||||
|
* Fixed Weighting
|
||||||
|
* Weighted Response Time
|
||||||
|
* Source IP Hash
|
||||||
|
* URL Hash
|
||||||
|
</summary><br><b>
|
||||||
</b></details>
|
</b></details>
|
||||||
|
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>Explain use case for connection draining?</summary><br><b>
|
<summary>Explain use case for connection draining?</summary><br><b>
|
||||||
To ensure that a Classic Load Balancer stops sending requests to instances that are de-registering or unhealthy, while keeping the existing connections open, use connection draining. This enables the load balancer to complete in-flight requests made to instances that are de-registering or unhealthy.
|
To ensure that a Classic Load Balancer stops sending requests to instances that are de-registering or unhealthy, while keeping the existing connections open, use connection draining. This enables the load balancer to complete in-flight requests made to instances that are de-registering or unhealthy.
|
||||||
|
Loading…
Reference in New Issue
Block a user