Question:- What are federated clusters?
Answer:- Multiple clusters that are managed as a single cluster is referred to as federated clusters.
Question:- What is a pod in Kubernetes?
Answer:- We can think of a Kubernetes pod as a group of containers that are run on the same host. So, if we regularly deploy single containers, then our container and the pod will be one and the same.
Question:- What is a node in Kubernetes?
Answer:- A node in Kubernetes is a worker machine which is also known as a minion. This node could be a physical machine or a virtual machine. For each node, there is a service to run pods, and it is managed by master components. The node services could include kubelet, kube-proxy, and so on.
Question:- What is a Heapster?
Answer:- The Heapster lets us do the container cluster monitoring. It lets us do cluster-wide monitoring and event data aggregation. It has native support for Kubernetes.
Question:- What is a container cluster?
Answer:- A container cluster lets us place and manage containers in a dynamic setup. It can be considered as a set of nodes or Compute Engine instances. The API server of Kubernetes does not run on cluster nodes, instead the Container Engine hosts the API server.
Question:- What is a kubelet?
Answer:- We can think of a kubelet as the lowest level component in a Kubernetes. The kubelet is responsible for making the individual machines run. The sole purpose of a kubelet is that in a given set of containers, it has to ensure that they are all running.
Question:- How to write a Kubernetes scheduler?
Answer:- The kube-scheduler is the default scheduler for Kubernetes. It is designed such that if you prefer, you can write your own one and use that instead. Following is the syntax: kube-scheduler [flags] The scheduling life cycle: 1. A pod is created and the preferred state is mentioned, and without filling the node name, it is saved to etcd 2. The scheduler notices the new pod with no node bound 3. It finds a suitable node for that pod 4. It then informs the API server to bind the pod to the node, and next, the new desired state is saved to etcd 5. Kubelets watch the pods that are bound and start the containers on the particular node
Question:- What are the ways to provide API Security on Kubernetes?
Answer:- Following are some of the ways that provide API Security: • Using the correct auth mode with the API server authentication mode= Node, RBAC • Ensuring that the traffic is protected by TLS • Using API authentication • Ensuring that kubeless protects its API via authorization-mode=Webhook • Monitoring RBAC failures • Removing default Service Account permissions • Ensuring that the kube-dashboard applies a restrictive RBAC policy • Implementing a pod security policy for container restrictions and the protection of the node • Using the latest version of kube
Question:- If an organization is looking for ways to improve its deployment methods and desires a more scalable and responsive platform, what should be done?
Answer:- The company should move to a cloud environment and implement a microservice architecture for implementing Docker containers. Once the base framework is set up, Kubernetes can be used for the autonomous development of applications and the quick delivery of the same by the team.
Question:- If an organization has a large distributed system with several data centers, virtual machines, and a huge number of employees working on various tasks, how can the tasks be managed with consistency with the help of Kubernetes?
Answer:- The company can do well with something that offers scale-out capability, agility, and the DevOps practice to the cloud-based applications. Kubernetes, in this situation, can enable the customization of the scheduling architecture and support multiple container formats. This results in greater efficiency as well as provides support for various container networking solutions and container storage.
Question:- What is the difference between a replica set and a replication controller?
Answer:- The difference is mainly in the selectors used for pod replication. A replica set uses set-based selectors, and replication controllers use equity-based selectors.
Question:- How does Kubernetes scale?
Answer:- The kubectl scale command enables the ability to instantly change the number of replicas needed for running an application. While using this command, the new number of replicas need to be specified by setting the –replicas flag.
Question:- What is a Kubernetes context?
Answer:- A context is a group of access parameters that has a cluster, a user, and a namespace. The current context is the cluster that is currently the default for kubectl, and all kubectl commands run against that cluster.
Question:- Give examples of some recommended security measures for Kubernetes.
Answer:- • Defining resource quotas • Auditing support • Providing restricted access to etcd • Regular security updates • Network segmentation • Strict resource policies • Regular scans for security vulnerabilities • Using images from repositories that are authorized