cloud6-p1
|
|
Title of test:
![]() cloud6-p1 Description: cloud6 cloud6 cloud6 |



| New Comment |
|---|
NO RECORDS |
|
• Challenges of Microservices: _______. عارف. مش عارف. Microservices can be perfectly hosted by using ___________. عارف. مش عارف. However, • How are containers managed? • How is the availability of resources in virtual machines_______? • How do you determine the optimal virtual machine for deploying the next ________? • How are health checks conducted for running containers, and how are ________ containers restarted? • How is service scaling achieved through the _____ or _____ of replica containers? Therefore, _______________ are needed. عارف. مش عارف. Container Orchestration tools offer: • __________________ • __________________ • __________________. عارف. مش عارف. • An ECS cluster is established on AWS to operate __________________________. Within the ECS cluster, a set of ____________ is maintained to oversee containers. عارف. مش عارف. • An ECS cluster is established on AWS to operate a cluster of containerized applications. Within the ECS cluster, a set of management services is maintained to oversee containers. Multiple virtual machines are provisioned as ________________ instances and linked to the ECS cluster for deploying containers. Nevertheless, users are responsible for _______ and _______ these EC2 instances. عارف. مش عارف. • The ECS communicates with and manages EC2 instances by employing the ________, which is installed on ________. عارف. مش عارف. • However, you are responsible for the creation and up keep of these EC2 instances, which includes: • Creating EC2 instances • Integrating them into the ____________ • Verifying the adequacy of _______ on each __________ • Overseeing the _____________ • Managing _______ and __________________. عارف. مش عارف. • By using AWS Fargate, instead of _____________ EC2 instances directly: • Create ____________ that describe how your containers should run. •_____________ such as the Docker image, CPU and memory requirements, networking configuration, and environment variables. • launch _______________ directly within your ECS cluster. Fargate provisions the required compute resources (servers) automatically on demand.Therefore, you will pay for used compute resources only not for all provisioned EC2 instances as previous. عارف. مش عارف. • By using ECS with ___ or _______, you can integrate your application with other AWS Services. عارف. مش عارف. • Kubernetes serves as a _____________ platform, __________ the deployment, scaling, and management of containerized applications across a cluster of nodes. It abstracts away the complexities of managing individual containers and ensures that applications run ____ and efficiently in dynamic environments. Kubernetes provides features such as ______,_______, _______, and ________, making it an essential tool for building and managing modern, cloud-native applications. عارف. مش عارف. • You can use Amazon______ (________________) as an alternative to Amazon ECS (Elastic Container Service). عارف. مش عارف. • Kubernetes is open source, therefore, you can migrate you ______ to another platform. عارف. مش عارف. • The EKS communicates with ____________ by employing the ________________, which is installed on each worker node. عارف. مش عارف. Kubernetes Architecture • at least one _____________ (virtual or physical machine) (at least two in common) • list of worker nodes with ___________. عارف. مش عارف. • API Server: (the entry point of the ________) The Kubernetes master node's API Server acts as the central management point for all ________ and _______. عارف. مش عارف. • _____________continuously monitors the cluster's desired state and manages the lifecycle of various resources to ensure they match the desired state. عارف. مش عارف. ______________ is responsible for assigning workloads to nodes based on resource availability and constraints defined in the cluster's configuration. عارف. مش عارف. _______________ serves as Kubernetes' distributed key-value store, storing all cluster data and providing a reliable and consistent source of truth for cluster state. عارف. مش عارف. Kubernetes Architecture Common components: • ____ • Service • _______ • Configmap • Volume • Secret • Deployment • Statefulset • Daemonset. عارف. مش عارف. • A Pod is the smallest deployable unit in Kubernetes, representing one or more containers that share ______ like________ and ________. عارف. مش عارف. • Pods encapsulate an _______________, storage resources, a __________________, and configuration options. • They are ephemeral (easily died) and can be easily ________,scaled, and managed by Kubernetes. • Each pod contains one or more containers but only _______ container with helper containers only. • Every pod is assigned an internal IP address, which may ______ if the pod dies and is subsequently recreated. عارف. مش عارف. Ephemeral: can easily died Every pod is assigned an internal IP address, which may change if the pod dies (for any reasons) and is subsequently recreated. Therefore, ______ is needed. عارف. مش عارف. Service: • A Service is an abstraction that defines a logical set of _____ and a policy by which to access them. • Services enable discovery and communication between ____ within a Kubernetes cluster. • They provide stable endpoints to connect to, even as individual Pods are created, _______, or ________ . • Every Service is assigned a static IP address, ensuring permanence ,even if Pods are terminated and recreated. This ensures that Services persist with the same IP regardless of Pod lifecycle changes. عارف. مش عارف. Ingress: • Ingress exposes HTTP and HTTPS routes from _______ the cluster to services within the cluster. • It provides features like _______, _________, and path based routing to route traffic to different services based on rules defined in the Ingress resource. عارف. مش عارف. • A ConfigMap is an API object used to store non-sensitive configuration data in key-value pairs. • ConfigMaps ______ configuration artifacts from container images ,allowing for more flexible and dynamic configuration management. • They are often used to store environment variables, command-line arguments, configuration files, or other configuration data needed by applications running in Kubernetes. عارف. مش عارف. ConfigMap: To prevent the need for ______ and _______ images in the event of changes to environment variables, command-line arguments, or configuration files. عارف. مش عارف. Secret: • A Secret is similar to a ConfigMap but is designed to store sensitive information, such as passwords, API keys, and TLS certificates. • Secrets are base64 encoded and can be mounted into Pods as _______ or exposed as ________. • They provide a secure way to manage and distribute sensitive data to applications running in Kubernetes. عارف. مش عارف. Kubernetes Secrets are, by default, stored unencrypted in the API server's underlying data store (etcd). Anyone with API access can retrieve or _____ a Secret, and so can anyone with access to ____. Additionally, anyone who is authorized to create a Pod in a namespace can use that access to read any_____ in that______; this includes indirect access such as the ability to create a Deployment. عارف. مش عارف. In order to safely use Secrets, take at least the following steps: 1-Enable _______ at Rest for Secrets. 2-Enable or configure RBAC rules that restrict reading data in Secrets (including via indirect means). Where appropriate, also use mechanisms such as RBAC to limit which principals are allowed to create new Secrets or replace existing ones. عارف. مش عارف. Volume: Kubernetes itself does not provide built-in mechanisms for managing the long-term storage or persistence of data within containers or pods. Kubernetes is ultimately up to the ___ to configure and manage data storage solutions such as databases, file systems, or object storage services separately from the Kubernetes platform. Users typically integrate Kubernetes with ______ storage solutions or cloud-native storage services to ensure data persistence for their applications. عارف. مش عارف. Deployment: • A Deployment is a Kubernetes resource that manages the lifecycle of _______ and ________. • Deployments enable declarative updates to Pods and Replica Sets, allowing users to specify the _________ of the application and let Kubernetes handle the rest. • They provide features like __________ , _______ , scaling, and self healing capabilities for managing application deployments. عارف. مش عارف. Deployment: when you create a Service of type Load Balancer, Kubernetes automatically provisions a load balancer to distribute incoming traffic across the _____ in the Service ,providing external access to the applications running in the Kubernetes cluster. عارف. مش عارف. The database cannot be replicated using Deployment due to the necessity of concurrency control for managing the shared data store. As a result,________ is utilized to address this requirement effectively. DB are often hosted outside the __________. عارف. مش عارف. • A StatefulSet is a Kubernetes resource used to manage stateful applications with persistent storage requirements. • StatefulSets provide _______, _____ identity, and stable network identifiers for each Pod in the set, ensuring predictable and consistent behavior. • They are commonly used for databases, messaging queues, and other stateful workloads that require stable and durable storage. عارف. مش عارف. DaemonSet: • A DaemonSet ensures that all (or some) nodes in a Kubernetes Cluster run a _____________. • DaemonSets are used to deploy system daemons, ________, or logging agents that need to run on every node in the cluster. • They ensure that a specific Pod is scheduled on each node ,automatically scaling as nodes are added or removed from the cluster. عارف. مش عارف. |




