Kubernetes Interview Q &A
Kubernetes Interview Q &A
12. Load balancer:-Expose the services externally using a cloud providers load balancers. Services
to whi9ch the external load balancers will route are automatically routed.
13. External Name: - Maps the service to the contents of the external name fields by returning a
(C NAME) record with its value.. proxying of any kind is setup.
14. Types of LOADBALANCERS :-
A- Internal Load balancers – It automatically balances load and allocates the pods with
required configuration.
B- External Load balancer: - It directs the traffic from external loads to backend pods.
Polling: - It is a library for computing the status of Kubernetes resources based on polling of resource
state from a cluster. It can keep polling until either some condition is met or until it’s cancelled through
provided context.
Election in Kubernetes: - It begins with creation of a lock object where the leader updates the current
timestamp at regular intervals as a way of informing other replicas regarding its leadership.
Toleration: - It applies to PODS. It allows the scheduler to schedule pods with matching taints.
NODE AFFINITY: - It is a property of PODS to attracts them to set of NODES (Either as a preference or
hard requirement)
Node Scheduler: - It is control plane process which assigns PODS to NODES. It determines which NODES
are valid placement for each PODS in the scheduling queue according to the constraints and available
resources. Scheduler then ranks each valid NODE and binds the PODS to a suitable NODE.
NODE SELCTOR: - The simplest recommended form of NODE selection constraints. You can add NODE
selector field to your POD specification and specify the NODE labels you want to target NODE to have.
Kubernetes only schedule PODS in to NODES that have each of the labels you specify.
NODE ANTI- AFFINITY: - It is also called inter POD- Affinity allows you to constraints PODS against labels
on other pods.
ROUTERS on KUBERNETES: - IT is a turnkey for K8s networking with aim to provide operation simplicity.
Networking is hard as such. In typical K8S cluster you would need to install multiple networks from
components for various functionality.
Secrets in K8s :- Secret is a Object that contains a small amount of sensitive data such as password , A
token or KEY. –-- Kubectl ----Use a configuration file --- Use the Kustomize tool.
Workloads in K8S :- It is an application running in K8s. It is a single component or several that works
together run on K8s you run in it inside a POD