Interview questions for Cloud Engineer
The wealth of information is no longer limited to voluminous books and libraries. Irrespective of the topic or theme of concern, detailed information is available at your fingertips.
The World Wide Web paved the path for such access to information. However, in contemporary times, even more, is few. So a static web server might give you access to certain information, but that may not suffice always. The advent of cloud computing has extensively resolved this limitation.
1. What are the advantages of Cloud Computing?
Cloud Computing technology helps the users avail of a more extensive network of global web servers. This directly boosts the productivity and performance of the web platform and makes development efficient in terms of cost and time. Cloud computing also increments the data storage and data backup capacities of the web servers. Due to the boosted interaction between different web servers, the server capabilities are made much more powerful.
2. Mention different data center deployments of Cloud Computing?
Cloud Computing consists of different data centers as follows:
• Containerized data centers: Containerized data centers are the packages that contain a consistent set of servers, network components, and storage delivered to large warehouse kind of facilities. Here, each deployment is relatively unique.
• Low-density data centers: Containerized data centers promote heavy density which in turn causes much heat and significant engineering troubles. Low-density data centers are the solution to this problem. Here, the equipment is established far apart so that it cools down the generated heat.
3. Describe the different cloud service models?
There are predominantly three models of cloud service. Each come with their own sets of advantages and are at variance with each other with regards to one or the other features. Before opting for one of them, let’s understand their characteristics and gauge how they fit within our individual requirements.
• IaaS- Infrastructure as a Service (IaaS) consists of highly automated compute resources. Businesses can avail of on-demand hardware resources through IaaS without having to make any upfront hardware purchase. IaaS is highly scalable and can assist in quickly accessing and monitoring computers, database storage, and other networking services.
• PaaS-Platform as a Service (PaaS) is helpful in customizing applications that require cloud components. PaaS helps in streamlining the workflow in the situations which involve more than one developer. While developers can manage the applications, businesses get to use the network and storage.
• SaaS- Software as a Service (SaaS) refers to the service model where applications are delivered to the user using cloud platforms, and the third party can then manage the applications. They are incredibly convenient to use since they do not require any additional installations.
4. List down the three basic functioning clouds in Cloud Computing?
• Professional cloud
• Personal cloud
• Performance cloud
5. What are the characteristics of cloud architecture that differ from traditional cloud architecture?
The characteristics are:
• In cloud, the hardware requirement is fulfilled as per the demand created for cloud architecture.
• Cloud architecture is capable of scaling up resources when there is a demand.
• Cloud architecture is capable of managing and handling dynamic workloads without any point of failure.
6. What are the building blocks of cloud architecture?
• Reference architecture
• Technical architecture
• Deployment operation architecture
7. What is the difference between the Hybrid Cloud and Hybrid IT?
• The hybrid cloud term is supposed to be integrating public and private clouds.
• Hybrid IT is what results when hybrid cloud efforts in organizations become more of advanced virtualization and automation environments with various features. And there haven’t been a lot of success stories of organizations being able to really build and maintain real hybrid clouds.
• They’ve done some things with OpenStack, but, for the most part, private cloud-inspired environments powered by VMware dominate. Therefore, a substitute term — hybrid IT — actually better describes the bulk of hybrid scenarios. This does not, however, change the need for clarity in terminology.
• The hybrid cloud must involve some combination of cloud styles (private, public, community), but physical location is not a definitive aspect of the style. The bottom line is that most users of the hybrid cloud term have really meant hybrid IT thus far.
8. Mention the key components of AWS.
The key components of AWS are as follows:
• Route 53: It is a DNS (Domain Name Server) web-based service platform.
• Simple E-mail Service: Sending of e-mail is done by using a RESTFUL API call or via regular SMTP (Simple Mail Transfer Protocol).
• Identity and Access Management: Improvised security and identity management are provided for an AWS account.
• Simple Storage Device (S3): It is a huge storage medium, widely used for AWS services.
• Elastic Compute Cloud (EC2): It allows on-demand computing resources for hosting applications and essentially useful for unpredictable workloads.
• Elastic Block Stores (EBS): They are storage volumes attached to EC2 and allow the data lifespan of a single EC2.
• CloudWatch: It is used to monitor AWS resources, and it allows administrators to view and collect keys required. Access is provided so that one can set a notification alarm in the case of trouble.
9. Explain how you can vertically scale an Amazon instance.
This is one of the essential features of AWS and cloud virtualization. We spinup a newly developed large instance where we pause that instance and detach the root EBS volume from the server and discard. Later, we stop our live instance and detach its root volume connected. here, we note down the unique device ID and attach the same root volume to the new server, and we restart it again. This results in a vertically scaled Amazon instance.
10. Explain the security usage in the Amazon Web Services model?
• AWS supports security groups.
• Access is provided to create a security group for a jump box with SSH access only for port 22 open. Later, a webserver group and a database group are created. The webserver group provides 80 and 443 from around the world, but only port 22 will be vital among the jump box group. The database group allows port 3306 from the webserver group and port 22 from the jump box group. The addition of any machines to the webserver group can store in the database. No one can directly SSH to any of our boxes.