Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
:information_source: This repo contains questions and exercises on various technical topics, sometimes related to DevOps and SRE
:bar_chart: There are currently 2138 exercises and questions
:books: To learn more about DevOps and SRE, check the resources in devops-resources repository
:warning: You can use these for preparing for an interview but most of the questions and exercises don't represent an actual interview. Please read FAQ page for more details
:busts_in_silhouette: Join our DevOps community where we have discussions and share resources on DevOps
:pencil: You can add more exercises by submitting pull requests :) Read about contribution guidelines here
A set of protocols that define how two or more devices can communicate with each other. To learn more about TCP/IP, read here
What is Ethernet?Ethernet simply refers to the most common type of Local Area Network (LAN) used today. A LAN—in contrast to a WAN (Wide Area Network), which spans a larger geographical area—is a connected network of computers in a small area, like your office, college campus, or even home.
What is a MAC address? What is it used for?A MAC address is a unique identification number or code used to identify individual devices on the network.
Packets that are sent on the ethernet are always coming from a MAC address and sent to a MAC address. If a network adapter is receiving a packet, it is comparing the packet’s destination MAC address to the adapter’s own MAC address.
When is this MAC address used?: ff:ff:ff:ff:ff:ffWhen a device sends a packet to the broadcast MAC address (FF:FF:FF:FF:FF:FF), it is delivered to all stations on the local network. Ethernet broadcasts are used to resolve IP addresses to MAC addresses (by ARP) at the datalink layer .
What is an IP address?An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.An IP address serves two main functions: host or network interface identification and location addressing.
Explain subnet mask and given an exampleA Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s. Within a given network, two host addresses are reserved for special purpose, and cannot be assigned to hosts. The "0" address is assigned a network address and "255" is assigned to a broadcast address, and they cannot be assigned to hosts.
For Example
| Address Class | No of Network Bits | No of Host Bits | Subnet mask | CIDR notation |
| ------------- | ------------------ | --------------- | --------------- | ------------- |
| A | 8 | 24 | 255.0.0.0 | /8 |
| A | 9 | 23 | 255.128.0.0 | /9 |
| A | 12 | 20 | 255.240.0.0 | /12 |
| A | 14 | 18 | 255.252.0.0 | /14 |
| B | 16 | 16 | 255.255.0.0 | /16 |
| B | 17 | 15 | 255.255.128.0 | /17 |
| B | 20 | 12 | 255.255.240.0 | /20 |
| B | 22 | 10 | 255.255.252.0 | /22 |
| C | 24 | 8 | 255.255.255.0 | /24 |
| C | 25 | 7 | 255.255.255.128 | /25 |
| C | 28 | 4 | 255.255.255.240 | /28 |
| C | 30 | 2 | 255.255.255.252 | /30 |
What is a private IP address? In which scenarios/system designs, one should use it?You can read more about the OSI model in penguintutor.com
For each of the following determine to which OSI layer it belongs:Unitcast: One to one communication where there is one sender and one receiver.
Broadcast: Sending a message to everyone in the network. The address ff:ff:ff:ff:ff:ff is used for broadcasting. Two common protocols which use broadcast are ARP and DHCP.
Multicast: Sending a message to a group of subscribers. It can be one-to-many or many-to-many.
What is CSMA/CD? Is it used in modern ethernet networks?CSMA/CD stands for Carrier Sense Multiple Access / Collision Detection. Its primarily focus it to manage access to shared medium/bus where only one host can transmit at a given point of time.
CSMA/CD algorithm:
A router is a physical or virtual appliance that passes information between two or more packet-switched computer networks. A router inspects a given data packet's destination Internet Protocol address (IP address), calculates the best way for it to reach its destination and then forwards it accordingly.
What is NAT?Network Address Translation (NAT) is a process in which one or more local IP address is translated into one or more Global IP address and vice versa in order to provide Internet access to the local hosts.
What is a proxy? How does it works? What do we need it for?A proxy server acts as a gateway between you and the internet. It’s an intermediary server separating end users from the websites they browse.
If you’re using a proxy server, internet traffic flows through the proxy server on its way to the address you requested. The request then comes back through that same proxy server (there are exceptions to this rule), and then the proxy server forwards the data received from the website to you.
roxy servers provide varying levels of functionality, security, and privacy depending on your use case, needs, or company policy.
What is TCP? How does it works? What is the 3 way handshake?TCP 3-way handshake or three-way handshake is a process which is used in a TCP/IP network to make a connection between server and client.
A three-way handshake is primarily used to create a TCP socket connection. It works when:
From wikipedia: "the length of time it takes for a signal to be sent plus the length of time it takes for an acknowledgement of that signal to be received"
Bonus question: what is the RTT of LAN?
How does SSL handshake work?TCP establishes a connection between the client and the server to guarantee the order of the packages, on the other hand, UDP does not establish a connection between client and server and doesn't handle package order. This makes UDP more lightweight than TCP and a perfect candidate for services like streaming.
Penguintutor.com provides a good explanation.
What TCP/IP protocols are you familiar with?A default gateway serves as an access point or IP router that a networked computer uses to send information to a computer in another network or the internet.
What is ARP? How does it works?ARP stands for Address Resolution Protocol. When you try to ping an IP address on your local network, say 192.168.1.1, your system has to turn the IP address 192.168.1.1 into a MAC address. This involves using ARP to resolve the address, hence its name.
Systems keep an ARP look-up table where they store information about what IP addresses are associated with what MAC addresses. When trying to send a packet to an IP address, the system will first consult this table to see if it already knows the MAC address. If there is a value cached, ARP is not used.
What is TTL? What does it helps to prevent?It stands for Dynamic Host Configuration Protocol, and allocates IP addresses, subnet masks and gateways to hosts. This is how it works:
Read more here
Can you have two DHCP servers in the same network? How it works?NAT stands for network address translation. It’s a way to map multiple local private addresses to a public one before transferring the information. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers. For example, your computer's private IP could be 192.168.1.100, but your router maps the traffic to it's public IP (e.g. 1.1.1.1). Any device on the internet would see the traffic coming from your public IP (1.1.1.1) instead of your private IP (192.168.1.100).
Which factors affect network performancesSSH
SMTP
HTTP
DNS
HTTPS
FTP
SFTP
SSH - 22
SMTP - 25
HTTP - 80
DNS - 53
HTTPS - 443
FTP - 21
SFTP - 22
The control plane is the part of the network that decides how to route and forward packets to a different location.
What "data plane" refers to?The data plane is the part of the network that actually forwards the data/packets.
What "management plane" refers to?Refers to monitoring and management functions.
To which plane (data, control, ...) is creating routing tables belongs to?Control Plane.
Explain Spanning Tree Protocol (STP)Latency. To have a good latency, a search query should be forwarded to the closest datacenter.
When uploading a video, what is more important, latency or throughput? And how to assure that?Throughput. To have a good throughput, the upload stream should be routed to an underutilized link.
What other considerations (except latency and throughput) are there when forwarding requests?00110011110100011101
Give examples of protocols found in the application layerRead more here
The internet refers to network of networks, transferring huge amounts of data around the globe.
The World Wide Web is an application running on millions of server, on top of the internet, accessed through what is know as the web browser
ISP (Internet Service Provider) is the local internet company provider.
A completely free application for testing your knowledge on Linux
Only you know :)
For example:
touch
ls
rm
cat
cp
mkdir
pwd
cd
touch - update file's timestamp. More commonly used for creating files
ls - listing files and directories
rm - remove files and directories
cat - create, view and concatenate files
cp - copy files and directories
mkdir - create directories
pwd - print current working directory (= at what path the user currently located)
cd - change directory
cd /
cd ~
cd
cd ..
cd .
cd -
cd / -> change to the root directory
cd ~ -> change to your home directory
cd -> change to your home directory
cd .. -> change to the directory above your current i.e parent directory
cd . -> change to the directory you currently in
cd - -> change to the last visited path
The -r (or -R in some commands) flag allows the user to run a certain command recursively. For example, listing all the files under the following tree is possible when done recursively (ls -R
):
/dir1/ dir2/ file1 file2 dir3/ file3
To list all the files, one can run ls -R /dir1
These are files directly not displayed after performing a standard ls direct listing. An example of these files are .bashrc which are used to execute some scripts. Some also store configuration about services on your host like .KUBECONFIG. The command used to list them is, ls -a
myProgram < input.txt > executionOutput.txt
sed -i s/salad/burger/g
grep 'word' file.md
grep -c 'This is a string' file.md
cut OPTION [FILE]
cut -b 1-2 file.md
, output: wo
Using the mv
command.
rm -rf dir
cat or less
chmod 777 /tmp/x
cd ~
sed -i s/good/great/g /tmp/y
echo hello world
echo "hello world"
The echo command receives two separate arguments in the first execution and in the second execution it gets one argument which is the string "hello world". The output will be the same.
Explain piping. How do you perform piping?Using a pipe in Linux, allows you to send the output of one command to the input of another command. For example: cat /etc/services | wc -l
sed 's/1/2/g' /tmp/myFile # sed "s/1/2/g" is also fine
find . -iname "*.yaml" -exec sed -i "s/1/2/g" {} \;
How to check which commands you executed in the past?history command or .bash_history file
Running the commanddf
you get "command not found". What could be wrong and how to fix it?
Most likely the default/generated $PATH was somehow modified or overridden thus not containing /bin/
where df would normally go.
This issue could also happen if bash_profile or any configuration file of your interpreter was wrongly modified, causing erratics behaviours.
You would solve this by fixing your $PATH variable:
As to fix it there are several options:
PATH="$PATH":/user/bin:/..etc
Note: There are many ways of getting errors like this: if bash_profile or any configuration file of your interpreter was wrongly modified; causing erratics behaviours, permissions issues, bad compiled software (if you compiled it by yourself)... there is no answer that will be true 100% of the time.
How do you schedule tasks periodically?You can use the commands cron
and at
.
With cron, tasks are scheduled using the following format:
*/30 * * * * bash myscript.sh
Executes the script every 30 minutes.
The tasks are stored in a cron file, you can write in it using crontab -e
Alternatively if you are using a distro with systemd it's recommended to use systemd timers.
ls > ls_output.txt
Demonstrate Linux stderr output redirectionyippiekaiyay 2> ls_output.txt
Demonstrate Linux stderr to stdout redirectionyippiekaiyay 1>&2
What is the result of running the following command?yippiekaiyay 1>&2 die_hard
An output similar to: yippikaiyay: command not found...
The file die_hard
will not be created
/
?The root of the filesystem. The beginning of the tree.
What is stored in each of the following paths?/tmp
folder is cleaned automatically, usually upon reboot.
False. No one can create file in /proc directly (certain operations can lead to files being created in /proc by the kernel).
What can be found in /proc/cmdline?The command passed to the boot loader to run the kernel
In which path can you find the system devices (e.g. block storage)?Using the chmod
command.
777 - You give the owner, group and other: Execute (1), Write (2) and Read (4); 4+2+1 = 7. 644 - Owner has Read (4), Write (2), 4+2 = 6; Group and Other have Read (4). 750 - Owner has x+r+w, Group has Read (4) and Execute (1); 4+1 = 5. Other have no permissions.What this command does?
chmod +x some_file
True
Explain what are ACLs. For what use cases would you recommend to use them?chmod -x $(which chmod)
. How to fix it?A daemon is a program that runs in the background without direct control of the user, although the user can at any time talk to the daemon.
systemd has many features such as user processes control/tracking, snapshot support, inhibitor locks..
If we visualize the unix/linux system in layers, systemd would fall directly after the linux kernel.
Hardware -> Kernel -> Daemons, System Libraries, Server Display.
To start a service: systemctl start <service name>
To stop a service: systemctl stop <service name>
systemctl status <service name>
journalctl
/var/log
How to follow file's content as it being appended without opening the file every time?tail -f
What are you using for troubleshooting and debugging network issues?dstat -t
is great for identifying network and disk issues.
netstat -tnlaup
can be used to see which processes are running on which ports.
lsof -i -P
can be used for the same purpose as netstat.
ngrep -d any metafilter
for matching regex against payloads of packets.
tcpdump
for capturing packets
wireshark
same concept as tcpdump but with GUI (optional).
dstat -t
is great for identifying network and disk issues.
opensnoop
can be used to see which files are being opened on the system (in real time).
strace
is great for understanding what your program does. It prints every system call your program executed.
top
will show you how much CPU percentage each process consumes
perf
is a great choice for sampling profiler and in general, figuring out what your CPU cycles are "wasted" on
flamegraphs
is great for CPU consumption visualization (http://www.brendangregg.com/flamegraphs.html)
top
for anything unusualdstat -t
to check if it's related to disk or network.sar
iostat
The kernel is part of the operating system and is responsible for tasks like:
uname -a
command
The operating system executes the kernel in protected memory to prevent anyone from changing (and risking it crashing). This is what is known as "Kernel space". "User space" is where users executes their commands or applications. It's important to create this separation since we can't rely on user applications to not tamper with the kernel, causing it to crash.
Applications can access system resources and indirectly the kernel space by making what is called "system calls".
In what phases of kernel lifecycle, can you change its configuration?Usually it will reside in /boot/config-<kernel version>.<os release>.<arch>
/proc/cmdline
sysctl -a
sysctl -a
as a regular user vs. root, produce different result?Yes, you might notice that in most systems, when running systctl -a
with root, you'll get more runtime parameters compared to executing the same command with a regular user.
sudo sysctl net.ipv4.ip_forward=1
To make it persistent (applied after reboot for example): insert net.ipv4.ip_forward = 1
into /etc/sysctl.conf
Another way to is to run echo 1 | sudo tee /proc/sys/net/ipv4/ip_forward
sysctl
applies the changes to kernel's runtime parameters the moment you run sysctl command?If you strace
the sysctl command you can see it does it by changing the file under /proc/sys/...
In the past it was done with sysctl system call, but it was deprecated at some point.
How changes to kernel runtime parameters persist? (applied even after reboot to the system for example)There is a service called systemd-sysctl
that takes the content of /etc/sysctl.conf and applies it. This is how changes persist, even after reboot, when they are written in /etc/sysctl.conf
No. Containers have their own /proc filesystem so any change to kernel parameters inside a container, are not affecting the host or other containers running on that host.
Wikipedia Definition: "SSH or Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network."
Hostinger.com Definition: "SSH, or Secure Shell, is a remote administration protocol that allows users to control and modify their remote servers over the Internet."
An SSH server will have SSH daemon running. Depends on the distribution, you should be able to check whether the service is running (e.g. systemctl status sshd).
Why SSH is considered better than telnet?Telnet also allows you to connect to a remote host but as opposed to SSH where the communication is encrypted, in telnet, the data is sent in clear text, so it doesn't considered to be secured because anyone on the network can see what exactly is sent, including passwords.
What is stored in~/.ssh/known_hosts
?It means that the key of the remote host was changed and doesn't match the one that stored on the machine (in ~/.ssh/known_hosts).
What is the difference between SSH and SSL?ssh-keygen
is used for?ls [XYZ]
matchls [^XYZ]
matchls [0-5]
matchgrep '[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' some_file
grep -E "error|failure" some_file
grep '[0-9]$' some_file
aaa bbb ccc.aaa aaaaaa
lines 1 and 3.
What is the difference single and double quotes?An exit code (or return code) represents the code returned by a child process to its parent process.
0 is an exit code which represents success while anything higher than 1 represents error. Each number has different meaning, based on how the application was developed.
I consider this as a good blog post to read more about it: https://shapeshed.com/unix-exit-codes
Another way to ask this: what happens from the moment you turned on the server until you get a prompt
What is GRUB2?For each file (and directory) in Linux there is an inode, a data structure which stores meta data related to the file like its size, owner, permissions, etc.
Which of the following is not included in inode:File name (it's part of the directory file)
How to check which disks are currently mounted?Run mount
mount
command but you get no output. How would you check what mounts you have on your system?cat /proc/mounts
Hard link is the same file, using the same inode. Soft link is a shortcut to another file, using a different inode.
True or False? You can create an hard link for a directoryFalse
True or False? You can create a soft link between different filesystemsTrue
True or False? Directories always have by minimum 2 linksTrue.
What happens when you delete the original file in case of soft link and hard link?There are many answers for this question. One way is running df -T
du -sh
False. /tmp is cleared upon system boot while /var/tmp is cleared every a couple of days or not cleared at all (depends on distro).
One can use uptime
or top
This article summarizes the load average topic in a great way
How to check process usage?pidstat
How to check disk I/O?iostat -xz 1
You can use the commands top
and free
sar -n TCP,ETCP 1
ps -ef
You can achieve that by specifying & at the end of the command. As to why, since some commands/processes can take a lot of time to finish execution or run forever, you may want to run them in the background instead of waiting for them to finish before gaining control again in current session.
How can you find how much memory a specific process consumes?
mem()
{
ps -eo rss,pid,euser,args:100 --sort %mem | grep -v grep | grep -i [email protected] | awk '{printf $1/1024 "MB"; $1=""; print }'
}
[Source](https://stackoverflow.com/questions/3853655/in-linux-how-to-tell-how-much-memory-processes-are-using)
What signal is used by default when you run 'kill *process id*'?The default signal is SIGTERM (15). This signal kills process gracefully which means it allows it to save current state configuration.What signals are you familiar with?
SIGTERM - default signal for terminating a process SIGHUP - common usage is for reloading configuration SIGKILL - a signal which cannot caught or ignored
To view all available signals run kill -l
kill 0
does?kill -0
does?A background process. Most of these processes are waiting for requests or set of conditions to be met before actually running anything. Some examples: sshd, crond, rpcbind.
What are the possible states of a process in Linux?Running (R) Uninterruptible Sleep (D) - The process is waiting for I/O Interruptible Sleep (S) Stopped (T) Dead (x) Zombie (z)How do you kill a process in D state?
A process which has finished to run but has not exited.
One reason it happens is when a parent process is programmed incorrectly. Every parent process should execute wait() to get the exit code from the child process which finished to run. But when the parent isn't checking for the child exit code, the child process can still exists although it finished to run.
How to get rid of zombie processes?You can't kill a zombie process the regular way with kill -9
for example as it's already dead.
One way to kill zombie process is by sending SIGCHLD to the parent process telling it to terminate its child processes. This might not work if the parent process wasn't programmed properly. The invocation is kill -s SIGCHLD [parent_pid]
You can also try closing/terminating the parent process. This will make the zombie process a child of init (1) which does periodic cleanups and will at some point clean up the zombie process.
How to find all theIf you mention at any point ps command with arugments, be familiar with what these arguments does exactly.
What is the init process?strace
does? What about ltrace
?find /some_dir -iname *.yml -print0 | xargs -0 -r sed -i "s/1/2/g"
You run ls and you get "/lib/ld-linux-armhf.so.3 no such file or directory". What is the problem?The ls executable is built for an incompatible architecture.
How would you split a 50 lines file into 2 files of 25 lines each?You can use the split
command this way: split -l 25 some_file
In Linux (and Unix) the first three file descriptors are:
This is a great article on the topic: https://www.computerhope.com/jargon/f/file-descriptor.htm
What is NTP? What is it used for?ip link show
What is the loopback (lo) interface?The loopback interface is a special, virtual network interface that your computer uses to communicate with itself. It is used mainly for diagnostics and troubleshooting, and to connect to servers running on the local machine.
What the following commands are used for?One of the following would work:
netstat -tnlp | grep <port_number>
lsof -i -n -P | grep <port_number>
How can you turn your Linux server into a router?False
Can you have more than one default gateway in a given system?Technically, yes.
What is telnet and why is it a bad idea to use it in production? (or at all)Telnet is a type of client-server protocol that can be used to open a command line on a remote computer, typically a server. By default, all the data sent and received via telnet is transmitted in clear/plain text, therefore it should not be used as it does not encrypt any data between the client and the server.
What is the routing table? How do you view it?One way would be ping6 ff02::1
There a couple of modes:
cat /etc/hostname
You can also run hostnamectl
or hostname
but that might print only a temporary hostname. The one in the file is the permanent one.
/etc/resolv.conf
is used for? What does it include?You can specify one or more of the following:
dig
host
nslookup
dig codingshell.com
and get the following result:
ANSWER SECTION:
codingshell.com. 3515 IN A 185.199.109.153
What is the meaning of the number 3515?
This is the TTL. When you lookup for an address using a domain/host name, your OS is performing DNS resolution by contacting DNS name servers to get the IP address of the host/domain you are looking for.
When you get a reply, this reply in cached in your OS for a certain period of time. This is period of time is also known as TTL and this is the meaning of 3515 number - it will be cached for 3515 seconds before removed from the cache and during that period of time, you'll get the value from the cache instead of asking DNS name servers for the address again.
The answer depends on the distribution being used.
In Fedora/CentOS/RHEL/Rocky it can be done with rpm
or dnf
commands.
In Ubuntu it can be done with the apt
command.
Package managers allow you to manage packages lifecycle as in installing, removing and updating the packages.
In addition, you can specify in a spec how a certain package will be installed - where to copy the files, which commands to run prior to the installation, post the installation, etc.
From the repo:
"Dandified YUM (DNF) is the next upcoming major version of YUM. It does package management using RPM, libsolv and hawkey libraries."
Official docs
How to look for a package that provides the command /usr/bin/git? (the package isn't necessarily installed)dnf provides /usr/bin/git
Depends on the init system.
Systemd: systemctl enable [service_name]
System V: update-rc.d [service_name]
and add this line id:5678:respawn:/bin/sh /path/to/app
to /etc/inittab
Upstart: add Upstart init script at /etc/init/service.conf
ssh 127.0.0.1
but it fails with "connection refused". What could be the problem?Nginx, Apache httpd.
Command to create users is useradd
Syntax:
useradd [options] Username
There are 2 configuration files, which stores users information
/etc/passwd
- Users information like, username, shell etc is stored in this file
/etc/shadow
- Users password is stored in encrypted format
/etc/groups
file stores the group name, group ID, usernames which are in secondary group.
passwd <username>
is the command to set/change password of a user.
/etc/shadow
file holds the passwords of the users in encryted format. NO, it is only visble to the root
user
YES, we can create new user by manually adding an entry in the /etc/passwd
file.
For example, if we need to create a user called john
.
Step 1: Add an entry to /etc/passwd
file, so user gets created.
echo "john:x:2001:2001::/home/john:/bin/bash" >> /etc/passwd
Step 2: Add an entry to /etc/group
file, because every user belong to the primary group that has same name as the username.
echo "john:x:2001:" >> /etc/group
Step 3: Verify if the user got created
id john
/etc/passwd
is a configuration file, which contains users information. Each entry in this file has, 7 fields,
username:password:UID:GID:Comment:home directory:shell
username
- The name of the user.
password
- This field is actually a placeholder of the password field. Due to security concerns, this field does not contain the password, just a placeholder (x) to the encrypted password stored in /etc/shadow
file.
UID
- User ID of the user.
GID
- Group ID
Comment
- This field is to provide description about the user.
home directory
- Abousulte path of the user's home directory. This directory gets created once the user is added.
shell
- This field contains the absolute path of the shell that will be used by the respective user.
adduser user_name --shell=/bin/false --no-create-home
You can also add a user and then edit /etc/passwd.
su command. Use su - to switch to root
What is the UID the root user? What about a regular user?UID of root user is 0
Default values of UID_MIN and UID_MAX in /etc/login.defs
UID_MIN
is 1000
UID_MAX
is 60000
Actually, we can change this value. But UID < 1000 are reserved for system accounts.
Therefore, as per the default configuration, for regular user UID starts from 1000
.
Re-install the OS IS NOT the right answer :)
What is /etc/skel?/etc/skel
is a directory, that contains files or directories, so when a new user is created, these files/directories created under /etc/skel
will be copied to user's home directory.
Using the last
command.
useradd
- Command for creating new users
usermod
- Modify the users setting
whoami
- Outputs, the username that we are currently logged in
id
- Prints the
grep $(whoami) /etc/passwd
but the output is empty. What might be a possible reason for that?The user you are using isn't defined locally but originates from services like LDAP.
You can verify with: getent passwd
/proc/cpuinfo
You can also use nproc
for number of processors
dmidecoode
How can you print all the information on connected block devices in your system?lsblk
True or False? In user space, applications don't have full access to hardware resourcesTrue. Only in kernel space they have full access to hardware resources.
One way is using openssl this way:
openssl genrsa -aes256 -out ca-private-key.pem 4096
openssl req -new -x509 -days 730 -key [private key file name] -sha256 -out ca.pem
If using the private key from the previous question then the command would be:
openssl req -new -x509 -days 730 -key ca-private-key.pem -sha256 -out ca.pem
True. Inside the namespace it's PID 1 while to the parent namespace the PID is a different one.
True or False? In a child PID namespace all processes are aware of parent PID namespace and processes and the parent PID namespace has no visibility of child PID namespace processesFalse. The opposite is true. Parent PID namespace is aware and has visibility of processes in child PID namespace and child PID namespace has no visibility as to what is going on in the parent PID namespace.
True or False? By default, when creating two separate network namespaces, a ping from one namespace to another will work fineFalse. Network namespace has its own interfaces and routing table. There is no way (without creating a bridge for example) for one network namespace to reach another.
True or False? With UTS namespaces, processes may appear as if they run on different hosts and domains while running on the same hostTrue
True or False? It's not possible to have a root user with ID 0 in child user namespacesFalse. In every child user namespace, it's possible to have a separate root user with uid of 0.
What time namespaces are used for?In time namespaces processes can use different system time.
Is an open source virtualization technology used to operate on x86 hardware.
From the official docs Recommended read:
What is Libvirt?It's an open source collection of software used to manage virtual machines. It can be used with: KVM, Xen, LXC and others. It's also called Libvirt Virtualization API.
From the official docs Hypervisor supported docs
awk
command does? Have you used it? What for?From Wikipedia: "AWK is domain-specific language designed for text processing and typically used as a data extraction and reporting tool"
How to print the 4th column in a file?awk '{print $4}' file
awk 'length($0) > 79' file
lsof
command does? Have you used it? What for?Using system calls
fork() is used for creating a new process. It does so by cloning the calling process but the child process has its own PID and any memory locks, I/O operations and semaphores are not inherited.
What is the return value of fork()?Not enough memory to create a new process
Why do we need the wait() system call?wait() is used by a parent process to wait for the child process to finish execution. If wait is not used by a parent process then a child process might become a zombie process.
How the kernel notifies the parent process about child process termination?The kernel notifies the parent by sending the SIGCHLD to the parent.
How the waitpid() is different from wait()?The waitpid() is a non-blocking version of the wait() function.
It also supports using library routine (e.g. system()) to wait a child process without messing up with other children processes for which the process has not waited.
True in most cases though there are cases where wait() returns before the child exits.
Explain the exec() system callIt transforms the current running program into another program.
Given the name of an executable and some arguments, it loads the code and static data from the specified executable and overwrites its current code segment and current static code data. After initializing its memory space (like stack and heap) the OS runs the program passing any arguments as the argv of that process.
True
Since a succesful exec replace the current process, it can't return anything to the process that made the call.
fork(), exec() and the wait() system call is also included in this workflow.
What execve() does?Executes a program. The program is passed as a filename (or path) and must be a binary executable or a script.
What is the return value of malloc?"Pipes provide a unidirectional interprocess communication channel. A pipe has a read end and a write end. Data written to the write end of a pipe can be read from the read end of the pipe. A pipe is created using pipe(2), which returns two file descriptors, one referring to the read end of the pipe, the other referring to the write end."
What happens when you executels -l
?Shell reads the input using getline() which reads the input file stream and stores into a buffer as a string
The buffer is broken down into tokens and stored in an array this way: {"ls", "-l", "NULL"}
Shell checks if an expansion is required (in case of ls *.c)
Once the program in memory, its execution starts. First by calling readdir()
Notes:
ls -l *.log
?alias x=y
does?This way provides a lot of flexibility. It allows the shell for example, to run code after the call to fork() but before the call to exec(). Such code can be used to alter the environment of the program it about to run.
Describe shortly what happens when you execute a command in the shellThe shell figures out, using the PATH variable, where the executable of the command resides in the filesystem. It then calls fork() to create a new child process for running the command. Once the fork was executed successfully, it calls a variant of exec() to execute the command and finally, waits the command to finish using wait(). When the child completes, the shell returns from wait() and prints out the prompt again.
There are a couple of ways to do that:
open("/my/file") = 5
read(5, "file content")
These system calls are reading the file /my/file
and 5 is the file descriptor number.
From wikipedia: a context switch is the process of storing the state of a process or thread, so that it can be restored and resume execution at a later point
You found there is a server with high CPU load but you didn't find a process with high CPU. How is that possible?ip a
you see there is a device called 'lo'. What is it and why do we need it?traceroute
command does? How does it works?Another common way to task this questions is "what part of the tcp header does traceroute modify?"
What is network bonding? What types are you familiar with?This is a good article about the topic: https://ops.tips/blog/how-linux-creates-sockets
You executed a script and while still running, it got accidentally removed. Is it possible to restore the script while it's still running?MemFree - The amount of unused physical RAM in your system MemAvailable - The amount of available memory for new workloads (without pushing system to use swap) based on MemFree, Active(file), Inactive(file), and SReclaimable.
What is the difference between paging and swapping?201.7.19.90 - - [05/Jun/1985:13:42:99 +0000] "GET /site HTTP/1.1" 200 32421
echo $line | sed 's/.*\[//g;s/].*//g;s/:.*//g'
One way is to run the following: cat /proc/sys/kernel/random/uuid
/etc/*-release
file/etc/redhat-release
and for Amazon it will be /etc/os-release
lsb_release
is a common command you can use in multiple different distributions
ls, wc, dd, df, du, ps, ip, cp, cd ...
What ways are there for creating a new empty file?$OLDPWD
List three ways to print all the files in the current directoryA good answer can be found here
Explain "environment variables". How do you list all environment variables?X=2
for example. But this will persist to new shells. To have it in new shells as well, use export X=2
It's used in commands to mark the end of commands options. One common example is when used with git to discard local changes: git checkout -- some_file
/dev
Why there are different sections in man? What is the difference between the sections?GPL v2
Name | Topic | Objective & Instructions | Solution | Comments |
---|---|---|---|---|
Fork 101 | Fork | Link | Link | |
Fork 102 | Fork | Link | Link |
From the book "Operating Systems: Three Easy Pieces":
"responsible for making it easy to run programs (even allowing you to seemingly run many at the same time), allowing programs to share memory, enabling programs to interact with devices, and other fun stuff like that".
A process is a running program. A program is one or more instructions and the program (or process) is executed by the operating system.
If you had to design an API for processes in an operating system, what would this API look like?It would support the following:
False. It was true in the past but today's operating systems perform lazy loading which means only the relevant pieces required for the process to run are loaded first.
What are different states of a process?Even when using a system with one physical CPU, it's possible to allow multiple users to work on it and run programs. This is possible with time sharing where computing resources are shared in a way it seems to the user the system has multiple CPUs but in fact it's simply one CPU shared by applying multiprogramming and multi-tasking.
What is "space sharing"?Somewhat the opposite of time sharing. While in time sharing a resource is used for a while by one entity and then the same resource can be used by another resource, in space sharing the space is shared by multiple entities but in a way where it's not being transferred between them.
It's used by one entity until this entity decides to get rid of it. Take for example storage. In storage, a file is yours until you decide to delete it.
CPU scheduler
The kernel is part of the operating system and is responsible for tasks like:
True
What is POSIX?Buffer: Reserved place in RAM which is used to hold data for temporary purposes Cache: Cache is usually used when processes reading and writing to the disk to make the process faster by making similar data used by different programs easily accessible.
Virtualization uses software to create an abstraction layer over computer hardware that allows the hardware elements of a single computer—processors, memory, storage and more - to be divided into multiple virtual computers, commonly called virtual machines (VMs).
What is a hypervisor?Red Hat: "A hypervisor is software that creates and runs virtual machines (VMs). A hypervisor, sometimes called a virtual machine monitor (VMM), isolates the hypervisor operating system and resources from the virtual machines and enables the creation and management of those VMs."
Read more here
What types of hypervisors are there?Hosted hypervisors and bare-metal hypervisors.
What are the advantages and disadvantges of bare-metal hypervisor over a hosted hypervisor?Due to having its own drivers and a direct access to hardware components, a baremetal hypervisor will often have better performances along with stability and scalability.
On the other hand, there will probably be some limitation regarding loading (any) drivers so a hosted hypervisor will usually benefit from having a better hardware compatibility.
What types of virtualization are there?Operating system virtualization Network functions virtualization Desktop virtualization
Is containerization is a type of Virtualization?Yes, it's a operating-system-level virtualization, where the kernel is shared and allows to use multiple isolated user-spaces instances.
How the introduction of virtual machines changed the industry and the way applications were deployed?The introduction of virtual machines allowed companies to deploy multiple business applications on the same hardware while each application is separated from each other in secured way, where each is running on its own separate operating system.
Name | Topic | Objective & Instructions | Solution | Comments |
---|---|---|---|---|
Identify the data type | Data Types | Exercise | Solution | |
Identify the data type - Advanced | Data Types | Exercise | Solution | |
Reverse String | Strings | Exercise | Solution | |
Compress String | Strings | Exercise | Solution |
1. It is a high level general purpose programming language created in 1991 by Guido Van Rosum.
2. The language is interpreted, being the CPython (Written in C) the most used/maintained implementation.
3. It is strongly typed. The typing discipline is duck typing and gradual.
4. Python focuses on readability and makes use of whitespaces/identation instead of brackets { }
5. The python package manager is called PIP "pip installs packages", having more than 200.000 available packages.
6. Python comes with pip installed and a big standard library that offers the programmer many precooked solutions.
7. In python **Everything** is an object.
What built-in types Python has?List
Dictionary
Set
Numbers (int, float, ...)
String
Bool
Tuple
Frozenset
What is mutability? Which of the built-in types in Python are mutable?Mutability determines whether you can modify an object of specific type.
The mutable data types are:
List
Dictionary
Set
The immutable data types are:
Numbers (int, float, ...)
String
Bool
Tuple
Frozenset
bool("") -> evaluates to False
bool(" ") -> evaluates to True
[] is not []
? explain the resultIt evaluates to True.
The reason is that the two created empty list are different objects. x is y
only evaluates to true when x and y are the same object.
True-True
?0
True
How to check if a string starts with a letter?Regex:
import re
if re.match("^[a-zA-Z]+.*", string):
string built-in:
if string and string[0].isalpha():
How to check if all characters in a given string are digits?string.isdigit
string.rstrip('/')
char = input("Insert a character: ")
if char == "a" or char == "o" or char == "e" or char =="u" or char == "i":
print("It's a vowel!")
char = input("Insert a character: ") # For readablity
if lower(char[0]) in "aieou": # Takes care of multiple characters and separate cases
print("It's a vowel!")
OR
if lower(input("Insert a character: ")[0]) in "aieou": # Takes care of multiple characters and small/Capital cases
print("It's a vowel!")
def sum(a, b):
return (a + b)
In Python, functions are first-class objects. What does it mean?In general, first class objects in programming languages are objects which can be assigned to variable, used as a return value and can be used as arguments or parameters.
In python you can treat functions this way. Let's say we have the following function
def my_function():
return 5
You can then assign a function to a variables like this x = my_function
or you can return functions as return values like this return my_function
from typing import Union
def isNumberPalindrome(number: Union[int, str]) -> bool:
if isinstance(number, int):
number = str(number)
return number == number[::-1]
print(isNumberPalindrome("12321"))
def isNumberPalindrome(number: int | str) -> bool:
if isinstance(number, int):
number = str(number)
return number == number[::-1]
print(isNumberPalindrome("12321"))
Note: Using slicing to reverse a list could be slower than other options like reversed
that return an iterator.
True
x = ['a', 'b', 'c']
for i in x:
if i == 'b':
x = ['z', 'y']
print(i)
a
b
c
By definition inheritance is the mechanism where an object acts as a base of another object, retaining all its
properties.
So if Class B inherits from Class A, every characteristics from class A will be also available in class B.
Class A would be the 'Base class' and B class would be the 'derived class'.
This comes handy when you have several classes that share the same functionalities.
The basic syntax is:
class Base: pass
class Derived(Base): pass
A more forged example:
class Animal:
def __init__(self):
print("and I'm alive!")
def eat(self, food):
print("ñom ñom ñom", food)
class Human(Animal):
def __init__(self, name):
print('My name is ', name)
super().__init__()
def write_poem(self):
print('Foo bar bar foo foo bar!')
class Dog(Animal):
def __init__(self, name):
print('My name is', name)
super().__init__()
def bark(self):
print('woof woof')
michael = Human('Michael')
michael.eat('Spam')
michael.write_poem()
bruno = Dog('Bruno')
bruno.eat('bone')
bruno.bark()
>>> My name is Michael
>>> and I'm alive!
>>> ñom ñom ñom Spam
>>> Foo bar bar foo foo bar!
>>> My name is Bruno
>>> and I'm alive!
>>> ñom ñom ñom bone
>>> woof woof
Calling super() calls the Base method, thus, calling super().__init__() we called the Animal __init__.
There is a more advanced python feature called MetaClasses that aid the programmer to directly control class creation.
Explain and demonstrate class attributes & instance attributesIn the following block of code x
is a class attribute while self.y
is a instance attribute
class MyClass(object):
x = 1
def __init__(self, y):
self.y = y
# Note that you generally don't need to know the compiling process but knowing where everything comes from
# and giving complete answers shows that you truly know what you are talking about.
Generally, every compiling process have a two steps.
- Analysis
- Code Generation.
Analysis can be broken into:
1. Lexical analysis (Tokenizes source code)
2. Syntactic analysis (Check whether the tokens are legal or not, tldr, if syntax is correct)
for i in 'foo'
^
SyntaxError: invalid syntax
We missed ':'
3. Semantic analysis (Contextual analysis, legal syntax can still trigger errors, did you try to divide by 0,
hash a mutable object or use an undeclared function?)
1/0
ZeroDivisionError: division by zero
These three analysis steps are the responsible for error handlings.
The second step would be responsible for errors, mostly syntax errors, the most common error.
The third step would be responsible for Exceptions.
As we have seen, Exceptions are semantic errors, there are many builtin Exceptions:
ImportError
ValueError
KeyError
FileNotFoundError
IndentationError
IndexError
...
You can also have user defined Exceptions that have to inherit from the `Exception` class, directly or indirectly.
Basic example:
class DividedBy2Error(Exception):
def __init__(self, message):
self.message = message
def division(dividend,divisor):
if divisor == 2:
raise DividedBy2Error('I dont want you to divide by 2!')
return dividend / divisor
division(100, 2)
>>> __main__.DividedBy2Error: I dont want you to divide by 2!
Explain Exception Handling and how to use it in PythonExceptions: Errors detected during execution are called Exceptions.
Handling Exception: When an error occurs, or exception as we call it, Python will normally stop and generate an error message.
Exceptions can be handled using try
and except
statement in python.
Example: Following example asks the user for input until a valid integer has been entered.
If user enter a non-integer value it will raise exception and using except it will catch that exception and ask the user to enter valid integer again.
while True:
try:
a = int(input("please enter an integer value: "))
break
except ValueError:
print("Ops! Please enter a valid integer value.")
For more details about errors and exceptions follow this https://docs.python.org/3/tutorial/errors.html
What is the result of running the following function?def true_or_false():
try:
return True
finally:
return False
It is used to emulate callable objects. It allows a class instance to be called as a function.
class Foo:
def __init__(self: object) -> None:
pass
def __call__(self: object) -> None:
print("Called!")
f = Foo()
f()
Called!
Do classes has the __call__ method as well? What for?A lambda
expression is an 'anonymous' function, the difference from a normal defined function using the keyword `def`` is the syntax and usage.
The syntax is:
lambda[parameters]: [expresion]
Examples:
x = lambda a: a + 10
print(x(10))
addition = lambda x, y: x + y
print(addition(10, 20))
square = lambda x : x ** 2
print(square(5))
Generally it is considered a bad practice under PEP 8 to assign a lambda expresion, they are meant to be used as parameters and inside of other defined functions.
x, y = y, x
Explain the following object's magic variables:
First you ask the user for the amount of numbers that will be use. Use a while loop that runs until amount_of_numbers becomes 0 through subtracting amount_of_numbers by one each loop. In the while loop you want ask the user for a number which will be added a variable each time the loop runs.
def return_sum():
amount_of_numbers = int(input("How many numbers? "))
total_sum = 0
while amount_of_numbers != 0:
num = int(input("Input a number. "))
total_sum += num
amount_of_numbers -= 1
return total_sum
Print the average of [2, 5, 6]. It should be rounded to 3 decimal placesli = [2, 5, 6]
print("{0:.3f}".format(sum(li)/len(li)))
A tuple is a built-in data type in Python. It's used for storing multiple items in a single variable.
List, like a tuple, is also used for storing multiple items. What is then, the difference between a tuple and a list?List, as opposed to a tuple, is a mutable data type. It means we can modify it and at items to it.
How to add the number 2 to the listx = [1, 2, 3]
x.append(2)
len(sone_list)
some_list[-1]
Don't use append
unless you would like the list as one item.
my_list[0:3] = []
Maximum: max(some_list)
Minimum: min(some_list)
How to get the top/biggest 3 items from a list?sorted(some_list, reverse=True)[:3]
Or
some_list.sort(reverse=True)
some_list[:3]
How to insert an item to the beginning of a list? What about two items?numbers = [1, 2, 3, 4, 5]
numbers.insert(0, 0)
print(numbers)
numbers_1 = [2, 3, 4, 5]
numbers_2 = [0, 1]
numbers_1 = numbers_2 + numbers_1
print(numbers_1)
How to sort list by the length of items?sorted_li = sorted(li, key=len)
Or without creating a new list:
li.sort(key=len)
Do you know what is the difference between list.sort() and sorted(list)?sorted(list) will return a new list (original list doesn't change)
list.sort() will return None but the list is change in-place
sorted() works on any iterable (Dictionaries, Strings, ...)
list.sort() is faster than sorted(list) in case of Lists
[['1', '2', '3'], ['4', '5', '6']]
nested_li = [['1', '2', '3'], ['4', '5', '6']]
[[int(x) for x in li] for li in nested_li]
How to merge two sorted lists into one sorted list?sorted(li1 + li2)
Another way:
i, j = 0
merged_li = []
while i < len(li1) and j < len(li2):
if li1[i] < li2[j]:
merged_li.append(li1[i])
i += 1
else:
merged_li.append(li2[j])
j += 1
merged_li = merged_li + merged_li[i:] + merged_li[j:]
How to check if all the elements in a given lists are unique? so [1, 2, 3] is unique but [1, 1, 2, 3] is not unique because 1 exists twiceThere are many ways of solving this problem:
# Note: :list and -> bool are just python typings, they are not needed for the correct execution of the algorithm.
Taking advantage of sets and len:
def is_unique(l:list) -> bool:
return len(set(l)) == len(l)
This one is can be seen used in other programming languages.
def is_unique2(l:list) -> bool:
seen = []
for i in l:
if i in seen:
return False
seen.append(i)
return True
Here we just count and make sure every element is just repeated once.
def is_unique3(l:list) -> bool:
for i in l:
if l.count(i) > 1:
return False
return True
This one might look more convulated but hey, one liners.
def is_unique4(l:list) -> bool:
return all(map(lambda x: l.count(x) < 2, l))
You have the following function
def my_func(li = []):
li.append("hmm")
print(li)
If we call it 3 times, what would be the result each call?
['hmm']
['hmm', 'hmm']
['hmm', 'hmm', 'hmm']
How to iterate over a list?for item in some_list:
print(item)
How to iterate over a list with indexes?for i, item in enumerate(some_list):
print(i)
How to start list iteration from 2nd index?Using range like this
for i in range(1, len(some_list)):
some_list[i]
Another way is using slicing
for i in some_list[1:]:
How to iterate over a list in reverse order?Method 1
for i in reversed(li):
...
Method 2
n = len(li) - 1
while n > 0:
...
n -= 1
Sort a list of lists by the second item of each nested listli = [[1, 4], [2, 1], [3, 9], [4, 2], [4, 5]]
sorted(li, key=lambda l: l[1])
or
li.sort(key=lambda l: l[1)
Combine [1, 2, 3] and ['x', 'y', 'z'] so the result is [(1, 'x'), (2, 'y'), (3, 'z')]nums = [1, 2, 3]
letters = ['x', 'y', 'z']
list(zip(nums, letters))
What is List Comprehension? Is it better than a typical loop? Why? Can you demonstrate how to use it?From Docs: "List comprehensions provide a concise way to create lists. Common applications are to make new lists where each element is the result of some operations applied to each member of another sequence or iterable, or to create a subsequence of those elements that satisfy a certain condition.".
It's better because they're compact, faster and have better readability.
number_lists = [[1, 7, 3, 1], [13, 93, 23, 12], [123, 423, 456, 653, 124]]
odd_numbers = []
for number_list in number_lists:
for number in number_list:
if number % 2 == 0:
odd_numbers.append(number)
print(odd_numbers)
number_lists = [[1, 7, 3, 1], [13, 93, 23, 12], [123, 423, 456, 653, 124]]
odd_numbers = [number for number_list in number_lists for number in number_list if number % 2 == 0]
print(odd_numbers)
You have the following list: [{'name': 'Mario', 'food': ['mushrooms', 'goombas']}, {'name': 'Luigi', 'food': ['mushrooms', 'turtles']}]
Extract all type of foods. Final output should be: {'mushrooms', 'goombas', 'turtles'}brothers_menu = \
[{'name': 'Mario', 'food': ['mushrooms', 'goombas']}, {'name': 'Luigi', 'food': ['mushrooms', 'turtles']}]
# "Classic" Way
def get_food(brothers_menu) -> set:
temp = []
for brother in brothers_menu:
for food in brother['food']:
temp.append(food)
return set(temp)
# One liner way (Using list comprehension)
set([food for bro in x for food in bro['food']])
my_dict = dict(x=1, y=2) OR my_dict = {'x': 1, 'y': 2} OR my_dict = dict([('x', 1), ('y', 2)])
How to remove a key from a dictionary?del my_dict['some_key']
you can also use my_dict.pop('some_key')
which returns the value of the key.
{k: v for k, v in sorted(x.items(), key=lambda item: item[1])}
How to sort a dictionary by keys?dict(sorted(some_dictionary.items()))
How to merge two dictionaries?some_dict1.update(some_dict2)
Convert the string "a.b.c" to the dictionary {'a': {'b': {'c': 1}}}
output = {}
string = "a.b.c"
path = string.split('.')
target = reduce(lambda d, k: d.setdefault(k, {}), path[:-1], output)
target[path[-1]] = 1
print(output)
with open('file.txt', 'w') as file:
file.write("My insightful comment")
How to print the 12th line of a file?import json
with open('file.json', 'w') as f:
f.write(json.dumps(dict_var))
import os
print(os.getcwd())
Given the path /dir1/dir2/file1
print the file name (file1)import os
print(os.path.basename('/dir1/dir2/file1'))
# Another way
print(os.path.split('/dir1/dir2/file1')[1])
Given the path /dir1/dir2/file1
Print the path without the file name (/dir1/dir2)
Print the name of the directory where the file resides (dir2)
import os
dirpath = os.path.dirname('/dir1/dir2/file1') print(dirpath)
print(os.path.basename(dirpath))
How do you execute shell commands using Python?/home
and luig
will result in /home/luigi
Using the re module
How to substitute the string "green" with "blue"?While you iterate through the characters, store them in a dictionary and check for every character whether it's already in the dictionary.
def firstRepeatedCharacter(str):
chars = {}
for ch in str:
if ch in chars:
return ch
else:
chars[ch] = 0
How to extract the unique characters from a string? for example given the input "itssssssameeeemarioooooo" the output will be "mrtisaoe"x = "itssssssameeeemarioooooo"
y = ''.join(set(x))
Find all the permutations of a given stringdef permute_string(string):
if len(string) == 1:
return [string]
permutations = []
for i in range(len(string)):
swaps = permute_string(string[:i] + string[(i+1):])
for swap in swaps:
permutations.append(string[i] + swap)
return permutations
print(permute_string("abc"))
Short way (but probably not acceptable in interviews):
from itertools import permutations
[''.join(p) for p in permutations("abc")]
Detailed answer can be found here: http://codingshell.com/python-all-string-permutations
How to check if a string contains a sub string?>> ', '.join(["One", "Two", "Three"])
>> " ".join("welladsadgadoneadsadga".split("adsadga")[:2])
>> "".join(["c", "t", "o", "a", "o", "q", "l"])[0::2]
>>> 'One, Two, Three'
>>> 'well done'
>>> 'cool'
If x = "pizza"
, what would be the result of x[::-1]
?It will reverse the string, so x would be equal to azzip
.
"".join(["a", "h", "m", "a", "h", "a", "n", "q", "r", "l", "o", "i", "f", "o", "o"])[2::3]
mario
for i in range(3, 3):
print(i)
No output :)
What isyeild
? When would you use it?[['Mario', 90], ['Geralt', 82], ['Gordon', 88]]
How to sort the list by the numbers in the nested lists?One way is:
the_list.sort(key=lambda x: x[1])
Explain the following:For the following slicing exercises, assume you have the following list: my_list = [8, 2, 1, 10, 5, 4, 3, 9]
pdb :D
How to check how much time it took to execute a certain script or block of code?return
returns?Short answer is: It returns a None object.
We could go a bit deeper and explain the difference between
def a ():
return
>>> None
And
def a ():
pass
>>> None
Or we could be asked this as a following question, since they both give the same result.
We could use the dis module to see what's going on:
2 0 LOAD_CONST 0 (<code object a at 0x0000029C4D3C2DB0, file "<dis>", line 2>)
2 LOAD_CONST 1 ('a')
4 MAKE_FUNCTION 0
6 STORE_NAME 0 (a)
5 8 LOAD_CONST 2 (<code object b at 0x0000029C4D3C2ED0, file "<dis>", line 5>)
10 LOAD_CONST 3 ('b')
12 MAKE_FUNCTION 0
14 STORE_NAME 1 (b)
16 LOAD_CONST 4 (None)
18 RETURN_VALUE
Disassembly of <code object a at 0x0000029C4D3C2DB0, file "<dis>", line 2>:
3 0 LOAD_CONST 0 (None)
2 RETURN_VALUE
Disassembly of <code object b at 0x0000029C4D3C2ED0, file "<dis>", line 5>:
6 0 LOAD_CONST 0 (None)
2 RETURN_VALUE
An empty return
is exactly the same as return None
and functions without any explicit return
will always return None regardless of the operations, therefore
def sum(a, b):
global c
c = a + b
>>> None
How to improve the following block of code?
li = []
for i in range(1, 10):
li.append(i)
[i for i in range(1, 10)]
Given the following function
def is_int(num):
if isinstance(num, int):
print('Yes')
else:
print('No')
What would be the result of is_int(2) and is_int(False)?
The reason we need to implement in the first place, it's because a linked list isn't part of Python standard library.
To implement a linked list, we have to implement two structures: The linked list itself and a node which is used by the linked list.
Let's start with a node. A node has some value (the data it holds) and a pointer to the next node
class Node(object):
def __init__(self, data):
self.data = data
self.next = None
Now the linked list. An empty linked list has nothing but an empty head.
class LinkedList(object):
def __init__(self):
self.head = None
Now we can start using the linked list
ll = Linkedlist()
ll.head = Node(1)
ll.head.next = Node(2)
ll.head.next.next = Node(3)
What we have is:
| 1 | -> | 2 | -> | 3 |
Usually, more methods are implemented, like a push_head() method where you insert a node at the beginning of the linked list
def push_head(self, value):
new_node = Node(value)
new_node.next = self.head
self.head = new_node
Add a method to the Linked List class to traverse (print every node's data) the linked listdef print_list(self): node = self.head while(node): print(node.data) node = node.next
Write a method to that will return a boolean based on whether there is a loop in a linked list or notLet's use the Floyd's Cycle-Finding algorithm:
def loop_exists(self):
one_step_p = self.head
two_steps_p = self.head
while(one_step_p and two_steps_p and two_steps_p.next):
one_step_p = self.head.next
two_step_p = self.head.next.next
if (one_step_p == two_steps_p):
return True
return False
PEP8 is a list of coding conventions and style guidelines for Python
5 style guidelines:
1. Limit all lines to a maximum of 79 characters.
2. Surround top-level function and class definitions with two blank lines.
3. Use commas when making a tuple of one element
4. Use spaces (and not tabs) for indentation
5. Use 4 spaces per indentation level
How to test if an exception was raised?assert
does in Python?assert
in non-test/production code?There are multiple ways to map a URL with a function in Python.
app
. This app
decorator is the instance of the Flask
class. And route it's a method of this class.@app.route('/')
def home():
return 'main website'
add_url_rule
method: This is a method of the Flask class. We can also use it for map the URL with a function.def home():
return 'main website'
app.add_url_rule('/', view_func=home)
What is a blueprint in Flask?x = [1, 2, 3]
, what is the result of list(zip(x))?[(1,), (2,), (3,)]
What is the result of each of the following:
list(zip(range(5), range(50), range(50)))
list(zip(range(5), range(50), range(-2)))
[(0, 0, 0), (1, 1, 1), (2, 2, 2), (3, 3, 3), (4, 4, 4)]
[]
Read about descriptors here
What would be the result of runninga.num2
assuming the following code
class B:
def __get__(self, obj, objtype=None):
reuturn 10
class A:
num1 = 2
num2 = Five()
some_car = Car("Red", 4)
assuming the following code
class Print:
def __get__(self, obj, objtype=None):
value = obj._color
print("Color was set to {}".format(valie))
return value
def __set__(self, obj, value):
print("The color of the car is {}".format(value))
obj._color = value
class Car:
color = Print()
def __ini__(self, color, age):
self.color = color
self.age = age
def add(num1, num2):
return num1 + num2
def sub(num1, num2):
return num1 - num2
def mul(num1, num2):
return num1*num2
def div(num1, num2):
return num1 / num2
operators = {
'+': add,
'-': sub,
'*': mul,
'/': div
}
if __name__ == '__main__':
operator = str(input("Operator: "))
num1 = int(input("1st number: "))
num2 = int(input("2nd number: "))
print(operators[operator](num1, num2))
What data types are you familiar with that are not Python built-in types but still provided by modules which are part of the standard library?This is a good reference https://docs.python.org/3/library/datatypes.html
Explain what is a decoratordef wee(word):
return word
def oh(f):
return f + "Ohh"
>>> oh(wee("Wee"))
<<< Wee Ohh
This allows us to control the before execution of any given function and if we added another function as wrapper, (a function receiving another function that receives a function as parameter) we could also control the after execution.
Sometimes we want to control the before-after execution of many functions and it would get tedious to write
f = function(function_1())
f = function(function_1(function_2(*args)))
every time, that's what decorators do, they introduce syntax to write all of this on the go, using the keyword '@'.
Can you show how to write and use decorators?
These two decorators (ntimes and timer) are usually used to display decorators functionalities, you can find them in lots of
tutorials/reviews. I first saw these examples two years ago in pyData 2017. https://www.youtube.com/watch?v=7lmCu8wz8ro&t=3731s
Simple decorator:
def deco(f):
print(f"Hi I am the {f.__name__}() function!")
return f
@deco
def hello_world():
return "Hi, I'm in!"
a = hello_world()
print(a)
>>> Hi I am the hello_world() function!
Hi, I'm in!
This is the simplest decorator version, it basically saves us from writting a = deco(hello_world())
.
But at this point we can only control the before execution, let's take on the after:
def deco(f):
def wrapper(*args, **kwargs):
print("Rick Sanchez!")
func = f(*args, **kwargs)
print("I'm in!")
return func
return wrapper
@deco
def f(word):
print(word)
a = f("************")
>>> Rick Sanchez!
************
I'm in!
deco receives a function -> f wrapper receives the arguments -> *args, **kwargs
wrapper returns the function plus the arguments -> f(*args, **kwargs) deco returns wrapper.
As you can see we conveniently do things before and after the execution of a given function.
For example, we could write a decorator that calculates the execution time of a function.
import time
def deco(f):
def wrapper(*args, **kwargs):
before = time.time()
func = f(*args, **kwargs)
after = time.time()
print(after-before)
return func
return wrapper
@deco
def f():
time.sleep(2)
print("************")
a = f()
>>> 2.0008859634399414
Or create a decorator that executes a function n times.
def n_times(n):
def wrapper(f):
def inner(*args, **kwargs):
for _ in range(n):
func = f(*args, **kwargs)
return func
return inner
return wrapper
@n_times(4)
def f():
print("************")
a = f()
>>>************
************
************
************
Write a decorator that calculates the execution time of a functionclass Car:
def __init__(self, model, color):
self.model = model
self.color = color
def __eq__(self, other):
if not isinstance(other, Car):
return NotImplemented
return self.model == other.model and self.color == other.color
>> a = Car('model_1', 'red')
>> b = Car('model_2', 'green')
>> c = Car('model_1', 'red')
>> a == b
False
>> a == c
True
Explain Context Managertail
command in Python? Bonus: implement head
as wellGoogle: "Monitoring is one of the primary means by which service owners keep track of a system’s health and availability".
What is wrong with the old approach of watching for a specific value and trigger an email/phone alert while value is exceeded?This approach require from a human to always check why the value exceeded and how to handle it while today, it is more effective to notify people only when they need to take an actual action. If the issue doesn't require any human intervention, then the problem can be fixed by some processes running in the relevant environment.
What types of monitoring outputs are you familiar with and/or used in the past?Alerts
Tickets
Logging
From Prometheus documentation: "if you need 100% accuracy, such as for per-request billing".
Describe Prometheus architecture and componentsPrometheus server is responsible for scraping and storing the data
Push gateway is used for short-lived jobs
Alert manager is responsible for alerts ;)
Go also has good community.
What is the difference betweenvar x int = 2
and x := 2
?The result is the same, a variable with the value 2.
With var x int = 2
we are setting the variable type to integer while with x := 2
we are letting Go figure out by itself the type.
False. We can't redeclare variables but yes, we must used declared variables.
What libraries of Go have you used?This should be answered based on your usage but some examples are:
func main() {
var x float32 = 13.5
var y int
y = x
}
package main
import "fmt"
func main() {
var x int = 101
var y string
y = string(x)
fmt.Println(y)
}
It looks what unicode value is set at 101 and uses it for converting the integer to a string.
If you want to get "101" you should use the package "strconv" and replace y = string(x)
with y = strconv.Itoa(x)
package main
func main() {
var x = 2
var y = 3
const someConst = x + y
}
Constants in Go can only be declared using constant expressions.
But x
, y
and their sum is variable.
const initializer x + y is not a constant
package main
import "fmt"
const (
x = iota
y = iota
)
const z = iota
func main() {
fmt.Printf("%v\n", x)
fmt.Printf("%v\n", y)
fmt.Printf("%v\n", z)
}
Go's iota identifier is used in const declarations to simplify definitions of incrementing numbers. Because it can be used in expressions, it provides a generality beyond that of simple enumerations.
x
and y
in the first iota group, z
in the second.
Iota page in Go Wiki
It avoids having to declare all the variables for the returns values.
It is called the blank identifier.
answer in SO
package main
import "fmt"
const (
_ = iota + 3
x
)
func main() {
fmt.Printf("%v\n", x)
}
Since the first iota is declared with the value 3
( + 3
), the next one has the value 4
package main
import (
"fmt"
"sync"
"time"
)
func main() {
var wg sync.WaitGroup
wg.Add(1)
go func() {
time.Sleep(time.Second * 2)
fmt.Println("1")
wg.Done()
}()
go func() {
fmt.Println("2")
}()
wg.Wait()
fmt.Println("3")
}
Output: 2 1 3
What will be the output of the following block of code?:package main
import (
"fmt"
)
func mod1(a []int) {
for i := range a {
a[i] = 5
}
fmt.Println("1:", a)
}
func mod2(a []int) {
a = append(a, 125) // !
for i := range a {
a[i] = 5
}
fmt.Println("2:", a)
}
func main() {
s1 := []int{1, 2, 3, 4}
mod1(s1)
fmt.Println("1:", s1)
s2 := []int{1, 2, 3, 4}
mod2(s2)
fmt.Println("2:", s2)
}
Output:
1 [5 5 5 5]
1 [5 5 5 5]
2 [5 5 5 5 5]
2 [1 2 3 4]
In mod1
a is link, and when we're using a[i]
, we're changing s1
value to.
But in mod2
, append
creats new slice, and we're changing only a
value, not s2
.
Aritcle about arrays,
Blog post about append
package main
import (
"container/heap"
"fmt"
)
// An IntHeap is a min-heap of ints.
type IntHeap []int
func (h IntHeap) Len() int { return len(h) }
func (h IntHeap) Less(i, j int) bool { return h[i] < h[j] }
func (h IntHeap) Swap(i, j int) { h[i], h[j] = h[j], h[i] }
func (h *IntHeap) Push(x interface{}) {
// Push and Pop use pointer receivers because they modify the slice's length,
// not just its contents.
*h = append(*h, x.(int))
}
func (h *IntHeap) Pop() interface{} {
old := *h
n := len(old)
x := old[n-1]
*h = old[0 : n-1]
return x
}
func main() {
h := &IntHeap{4, 8, 3, 6}
heap.Init(h)
heap.Push(h, 7)
fmt.Println((*h)[0])
}
Output: 3
MongoDB advantages are as followings:
The main difference is that SQL databases are structured (data is stored in the form of tables with rows and columns - like an excel spreadsheet table) while NoSQL is unstructured, and the data storage can vary depending on how the NoSQL DB is set up, such as key-value pair, document-oriented, etc.
In what scenarios would you prefer to use NoSQL/Mongo over SQL?db.books.find({"name": /abc/})
db.books.find().sort({x:1})
Name | Topic | Objective & Instructions | Solution | Comments |
---|---|---|---|---|
Functions vs. Comparisons | Query Improvements | Exercise | Solution |
SQL (Structured Query Language) is a standard language for relational databases (like MySQL, MariaDB, ...).
It's used for reading, updating, removing and creating data in a relational database.
The main difference is that SQL databases are structured (data is stored in the form of tables with rows and columns - like an excel spreadsheet table) while NoSQL is unstructured, and the data storage can vary depending on how the NoSQL DB is set up, such as key-value pair, document-oriented, etc.
When is it best to use SQL? NoSQL?SQL - Best used when data integrity is crucial. SQL is typically implemented with many businesses and areas within the finance field due to it's ACID compliance.
NoSQL - Great if you need to scale things quickly. NoSQL was designed with web applications in mind, so it works great if you need to quickly spread the same information around to multiple servers
Additionally, since NoSQL does not adhere to the strict table with columns and rows structure that Relational Databases require, you can store different data types together.
For these questions, we will be using the Customers and Orders tables shown below:
Customers
Customer_ID | Customer_Name | Items_in_cart | Cash_spent_to_Date |
---|---|---|---|
100204 | John Smith | 0 | 20.00 |
100205 | Jane Smith | 3 | 40.00 |
100206 | Bobby Frank | 1 | 100.20 |
ORDERS
Customer_ID | Order_ID | Item | Price | Date_sold |
---|---|---|---|---|
100206 | A123 | Rubber Ducky | 2.20 | 2019-09-18 |
100206 | A123 | Bubble Bath | 8.00 | 2019-09-18 |
100206 | Q987 | 80-Pack TP | 90.00 | 2019-09-20 |
100205 | Z001 | Cat Food - Tuna Fish | 10.00 | 2019-08-05 |
100205 | Z001 | Cat Food - Chicken | 10.00 | 2019-08-05 |
100205 | Z001 | Cat Food - Beef | 10.00 | 2019-08-05 |
100205 | Z001 | Cat Food - Kitty quesadilla | 10.00 | 2019-08-05 |
100204 | X202 | Coffee | 20.00 | 2019-04-29 |
Select *
From Customers;
Select Items_in_cart
From Customers
Where Customer_Name = "John Smith";
Select SUM(Cash_spent_to_Date) as SUM_CASH
From Customers;
Select count(1) as Number_of_People_w_items
From Customers
where Items_in_cart > 0;
You would join them on the unique key. In this case, the unique key is Customer_ID in both the Customers table and Orders table
How would you show which customer ordered which items?Select c.Customer_Name, o.Item
From Customers c
Left Join Orders o
On c.Customer_ID = o.Customer_ID;
with cat_food as (
Select Customer_ID, SUM(Price) as TOTAL_PRICE
From Orders
Where Item like "%Cat Food%"
Group by Customer_ID
)
Select Customer_name, TOTAL_PRICE
From Customers c
Inner JOIN cat_food f
ON c.Customer_ID = f.Customer_ID
where c.Customer_ID in (Select Customer_ID from cat_food);
Although this was a simple statement, the "with" clause really shines when a complex query needs to be run on a table before joining to another. With statements are nice, because you create a pseudo temp when running your query, instead of creating a whole new table.
The Sum of all the purchases of cat food weren't readily available, so we used a with statement to create the pseudo table to retrieve the sum of the prices spent by each customer, then join the table normally.
Which of the following queries would you use?SELECT count(*) SELECT count(*)
FROM shawarma_purchases FROM shawarma_purchases
WHERE vs. WHERE
YEAR(purchased_at) == '2017' purchased_at >= '2017-01-01' AND
purchased_at <= '2017-31-12'
SELECT count(*)
FROM shawarma_purchases
WHERE
purchased_at >= '2017-01-01' AND
purchased_at <= '2017-31-12'
When you use a function (YEAR(purchased_at)
) it has to scan the whole database as opposed to using indexes and basically the column as it is, in its natural state.
Microsoft Docs: "The Azure portal is a web-based, unified console that provides an alternative to command-line tools. With the Azure portal, you can manage your Azure subscription by using a graphical user interface."
What is Azure Marketplace?Microsoft Docs: "Azure marketplace helps connect users with Microsoft partners, independent software vendors, and startups that are offering their solutions and services, which are optimized to run on Azure."
Explain availability sets and availability zonesAn availability set is a logical grouping of VMs that allows Azure to understand how your application is built to provide redundancy and availability. It is recommended that two or more VMs are created within an availability set to provide for a highly available application and to meet the 99.95% Azure SLA.
What is Azure Policy?Windows or Linux virtual machines
What "Azure Virtual Machine Scale Sets" service is used for?Scaling Linux or Windows virtual machines used in Azure
What "Azure Functions" service is used for?Azure Functions is the serverless compute service of Azure.
What "Azure Container Instances" service is used for?Running containerized applications (without the need to provision virtual machines).
What "Azure Batch" service is used for?Running parallel and high-performance computing applications
What "Azure Service Fabric" service is used for?It's a monitoring service that provides threat protection across all of the services in Azure. More specifically, it:
Azure AD is a cloud-based identity service. You can use it as a standalone service or integrate it with existing Active Directory service you already running.
What is Azure Advanced Threat Protection?startap-script
What the following commands does? `gcloud deployment-manager deployments create`fun fact: Anthos is flower in greek, they grow in the ground (earth) but need rain from the clouds to flourish.
List the technical components that make up AnthosOn GCP the kubernetes api-server is the only control plane component exposed to customers whilst compute engine manages instances in the project.
Which load balancing options are available?It is a core component of the Anthos stack which provides platform, service and security operators with a single, unified approach to multi-cluster management that spans both on-premises and cloud environments. It closely follows K8s best practices, favoring declarative approaches over imperative operations, and actively monitors cluster state and applies the desired state as defined in Git. It includes three key components as follows:
It follows common modern software development practices which makes cluster configuration, management and policy changes auditable, revertable, and versionable easily enforcing IT governance and unifying resource management in an organisation.
What is Anthos Service Mesh?It is part of the Anthos stack that brings a serverless container experience to Anthos, offering a high-level platform experience on top of K8s clusters. It is built with Knative, an open-source operator for K8s that brings serverless application serving and eventing capabilities.
How does Cloud Run for Anthos simplify operations?Platform teams in organisations that wish to offer developers additional tools to test, deploy and run applications can use Knative to enhance this experience on Anthos as Cloud Run. Below are some of the benefits;
As it does not support stateful applications or sticky sessions, it is suitable for running stateless applications such as:
Copy or snapshot instances
GUI for viewing and modifying resources
Block Storage
Manage virtual instances
Glance - Images Service. Also used for copying or snapshot instances
Horizon - GUI for viewing and modifying resources
Cinder - Block Storage
Nova - Manage virtual instances
You can read about TripleO right here
There are many reasons for that. One for example: you can't remove router if there are active ports assigned to it.
What is a provider network?Not by default. Object Storage API limits the maximum to 5GB per object but it can be adjusted.
Explain the following in regards to Swift:False. Two objects can have the same name if they are in different containers.
Role
Tenant/Project
Service
Endpoint
Token
Role - A list of rights and privileges determining what a user or a project can perform
Tenant/Project - Logical representation of a group of resources isolated from other groups of resources. It can be an account, organization, ...
Service - An endpoint which the user can use for accessing different resources
Endpoint - a network address which can be used to access a certain OpenStack service
Token - Used for access resources while describing which resources can be accessed by using a scope
Using:
A list of services and their endpoints
Swift
Sahara
Ironic
Trove
Aodh
Ceilometer
Swift - highly available, distributed, eventually consistent object/blob store
Sahara - Manage Hadoop Clusters
Ironic - Bare Metal Provisioning
Trove - Database as a service that runs on OpenStack
Aodh - Alarms Service
Ceilometer - Track and monitor usage
Database as a service which runs on OpenStack
Bare Metal Provisioning
Track and monitor usage
Alarms Service
Manage Hadoop Clusters
highly available, distributed, eventually consistent object/blob store
Database as a service which runs on OpenStack - Trove
Bare Metal Provisioning - Ironic
Track and monitor usage - Ceilometer
Alarms Service - Aodh
Manage Hadoop Clusters
Manage Hadoop Clusters - Sahara
highly available, distributed, eventually consistent object/blob store - Swift
nova-api
nova-compuate
nova-conductor
nova-cert
nova-consoleauth
nova-scheduler
nova-api - responsible for managing requests/calls
nova-compute - responsible for managing instance lifecycle
nova-conductor - Mediates between nova-compute and the database so nova-compute doesn't access it directly
The Elastic Stack consists of:
Elasticserach, Logstash and Kibana are also known as the ELK stack.
Explain what is ElasticsearchFrom the official docs:
"Elasticsearch is a distributed document store. Instead of storing information as rows of columnar data, Elasticsearch stores complex data structures that have been serialized as JSON documents"
What is Logstash?From the blog:
"Logstash is a powerful, flexible pipeline that collects, enriches and transports data. It works as an extract, transform & load (ETL) tool for collecting log messages."
Explain what beats areBeats are lightweight data shippers. These data shippers installed on the client where the data resides.
Examples of beats: Filebeat, Metricbeat, Auditbeat. There are much more.
From the official docs:
"Kibana is an open source analytics and visualization platform designed to work with Elasticsearch. You use Kibana to search, view, and interact with data stored in Elasticsearch indices. You can easily perform advanced data analysis and visualize your data in a variety of charts, tables, and maps."
Describe what happens from the moment an app logged some information until it's displayed to the user in a dashboard when the Elastic stack is usedThe process may vary based on the chosen architecture and the processing you may want to apply to the logs. One possible workflow is:
This is where data is stored and also where different processing takes place (e.g. when you search for a data).
What is a master node?Par of a master node responsibilites:
While there can be multiple master nodes in reality only of them is the elected master node.
What is an ingest node?A node which responsible for parsing the data. In case you don't use logstash then this node can recieve data from beats and parse it, similarly to how it can be parsed in Logstash.
What is Coordinating node?A Coordinating node responsible for routing requests out and in to the cluser (data nodes).
How data is stored in elasticsearch?Index in Elastic is in most cases compared to a whole database from the SQL/NoSQL world.
You can choose to have one index to hold all the data of your app or have multiple indices where each index holds different type of your app (e.g. index for each service your app is running).
The official docs also offer a great explanation (in general, it's really good documentation, as every project should have):
"An index can be thought of as an optimized collection of documents and each document is a collection of fields, which are the key-value pairs that contain your data"
Explain ShardsAn index is split into shards and documents are hashed to a particular shard. Each shard may be on a different node in a cluster and each one of the shards is a self contained index.
This allows Elasticsearch to scale to an entire cluster of servers.
From the official docs:
"An inverted index lists every unique word that appears in any document and identifies all of the documents each word occurs in."
What is a Document?Continuing with the comparison to SQL/NoSQL a Document in Elastic is a row in table in the case of SQL or a document in a collection in the case of NoSQL. As in NoSQL a Document is a JSON object which holds data on a unit in your app. What is this unit depends on the your app. If your app related to book then each document describes a book. If you are app is about shirts then each document is a shirt.
You check the health of your elasticsearch cluster and it's red. What does it mean? What can cause the status to be yellow instead of green?Red means some data is unavailable. Yellow can be caused by running single node cluster instead of multi-node.
True or False? Elasticsearch indexes all data in every field and each indexed field has the same data structure for unified and quick query abilityFalse. From the official docs:
"Each indexed field has a dedicated, optimized data structure. For example, text fields are stored in inverted indices, and numeric and geo fields are stored in BKD trees."
What reserved fields a document has?In a network/cloud environment where failures can be expected any time, it is very useful and highly recommended to have a failover mechanism in case a shard/node somehow goes offline or disappears for whatever reason. To this end, Elasticsearch allows you to make one or more copies of your index’s shards into what are called replica shards, or replicas for short.
Can you explain Term Frequency & Document Frequency?Term Frequency is how often a term appears in a given document and Document Frequency is how often a term appears in all documents. They both are used for determining the relevance of a term by calculating Term Frequency / Document Frequency.
You check "Current Phase" under "Index lifecycle management" and you see it's set to "hot". What does it mean?"The index is actively being written to". More about the phases here
What this command does?curl -X PUT "localhost:9200/customer/_doc/1?pretty" -H 'Content-Type: application/json' -d'{ "name": "John Doe" }'
It creates customer index if it doesn't exists and adds a new document with the field name which is set to "John Dow". Also, if it's the first document it will get the ID 1.
What will happen if you run the previous command twice? What about running it 100 times?Bulk API is used when you need to index multiple documents. For high number of documents it would be significantly faster to use rather than individual requests since there are less network roundtrips.
From the official docs:
"In the query context, a query clause answers the question “How well does this document match this query clause?” Besides deciding whether or not the document matches, the query clause also calculates a relevance score in the _score meta-field."
"In a filter context, a query clause answers the question “Does this document match this query clause?” The answer is a simple Yes or No — no scores are calculated. Filter context is mostly used for filtering structured data"
Describe how would an architecture of production environment with large amounts of data would be different from a small-scale environmentThere are several possible answers for this question. One of them is as follows:
A small-scale architecture of elastic will consist of the elastic stack as it is. This means we will have beats, logstash, elastcsearch and kibana.
A production environment with large amounts of data can include some kind of buffering component (e.g. Reddis or RabbitMQ) and also security component such as Nginx.
A logstash plugin which modifies information in one format and immerse it in another.
How grok works?The raw data as it is stored in the index. You can search and filter it.
You see in Kibana, after clicking on Discover, "561 hits". What does it mean?Total number of documents matching the search results. If not query used then simply the total number of documents.
What can you find under "Visualize"?"Visualize" is where you can create visual representations for your data (pie charts, graphs, ...)
What visualization types are supported/included in Kibana?Read here
True or False? a single harvester harvest multiple files, according to the limits set in filebeat.ymlFalse. One harvester harvests one file.
What are filebeat modules?You can generate certificates with the provided elastic utils and change configuration to enable security using certificates model.
According to Martin Kleppmann:
"Many processes running on many machines...only message-passing via an unreliable network with variable delays, and the system may suffer from partial failures, unreliable clocks, and process pauses."
Another definition: "Systems that are physically separated, but logically connected"
What can cause a system to fail?According to the CAP theorem, it's not possible for a distributed data store to provide more than two of the following at the same time:
Ways to improve:
It's an architecture in which data is and retrieved from a single, non-shared, source usually exclusively connected to one node as opposed to architectures where the request can get to one of many nodes and the data will be retrieved from one shared location (storage, memory, ...).
Explain the Sidecar Pattern (Or sidecar proxy)Name | Topic | Objective & Instructions | Solution | Comments |
---|---|---|---|---|
Highly Available "Hello World" | Exercise | Solution |
TODO: add more details!
I like this definition from blog.christianposta.com:
"An explicitly and purposefully defined interface designed to be invoked over a network that enables software developers to get programmatic access to data and functionality within an organization in a controlled and comfortable way."
What is an API specification?From swagger.io:
"An API specification provides a broad understanding of how an API behaves and how the API links with other APIs. It explains how the API functions and the results to expect when using the API"
True or False? API Definition is the same as API SpecificationFalse. From swagger.io:
"An API definition is similar to an API specification in that it provides an understanding of how an API is organized and how the API functions. But the API definition is aimed at machine consumption instead of human consumption of APIs."
What is a Payload in API?Automation is the act of automating tasks to reduce human intervention or interaction in regards to IT technology and systems.
While automation focuses on a task level, Orchestration is the process of automating processes and/or workflows which consists of multiple tasks that usually across multiple systems.
Data about data. Basically, it describes the type of information that an underlying data will hold.
You can use one of the following formats: JSON, YAML, XML. Which one would you use? Why?I can't answer this for you :)
What's KPI?Domain Specific Language (DSLs) are used to create a customised language that represents the domain such that domain experts can easily interpret it.
What's the difference between KPI and OKR?Data serialization language used by many technologies today like Kubernetes, Ansible, etc.
True or False? Any valid JSON file is also a valid YAML fileTrue. Because YAML is superset of JSON.
What is the format of the following data?{
applications: [
{
name: "my_app",
language: "python",
version: 20.17
}
]
}
applications:
- app: "my_app"
language: "python"
version: 20.17
someMultiLineString: |
look mama
I can write a multi-line string
I love YAML
It's good for use cases like writing a shell script where each line of the script is a different command.
What is the difference betweensomeMultiLineString: |
to someMultiLineString: >
?using >
will make the multi-line string to fold into a single line
someMultiLineString: >
This is actually
a single line
do not let appearances fool you
What are placeholders in YAML?They allow you reference values instead of directly writing them and it is used like this:
username: {{ my.user_name }}
How can you define multiple YAML components in one file?Using this: ---
For Examples:
document_number: 1
---
document_number: 2
Wikipedia: "In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide hardware abstraction services to higher-level software such as operating systems."
False. It doesn't maintain state for incoming request.
How HTTP request looks like?It consists of:
HTTP is stateless. To share state, we can use Cookies.
TODO: explain what is actually a Cookie
What is HTTP Pipelining?The server didn't receive a response from another server it communicates with in a timely manner.
What is a proxy?Wikipedia: "The X-Forwarded-For (XFF) HTTP header field is a common method for identifying the originating IP address of a client connecting to a web server through an HTTP proxy or load balancer."
A load balancer accepts (or denies) incoming network traffic from a client, and based on some criteria (application related, network, etc.) it distributes those communications out to servers (at least one).
Why to used a load balancer?L4 and L7
Can you perform load balancing without using a dedicated load balancer instance?Yes, you can use DNS for performing load balancing.
What is DNS load balancing? What its advantages? When would you use it?Recommended read:
Cons:
You would like to make sure the user doesn't lose the current session data.
What sticky sessions use for enabling the "stickiness"?Cookies. There are application based cookies and duration based cookies.
Explain application-based cookiesThe maximum timeout value can be set between 1 and 3,600 seconds on both GCP and AWS.
In Copyleft, any derivative work must use the same licensing while in permissive licensing there are no such condition. GPL-3 is an example of copyleft license while BSD is an example of permissive license.
CPU cache. Source
What is a memory leak?SSH HTTP DHCP DNS ...
What is Cache API?https://idiallo.com/blog/c10k-2016
A list of questions you as a candidate can ask the interviewer during or after the interview. These are only a suggestion, use them carefully. Not every interviewer will be able to answer these (or happy to) which should be perhaps a red flag warning for your regarding working in such place but that's really up to you.
What do you like about working here?Be careful when asking this question - all companies, regardless of size, have some level of tech debt.
Phrase the question in the light that all companies have the deal with this, but you want to see the current
pain points they are dealing with
This is a great way to figure how managers deal with unplanned work, and how good they are at setting expectations with projects.
Why I should NOT join you? (or 'what you don't like about working here?')This can give you insights in some of the cool projects a company is working on, and if you would enjoy working on projects like these. This is also a good way to see if the managers are allowing employees to learn and grow with projects outside of the normal work you'd do.
If you could change one thing about your day to day, what would it be?Similar to the tech debt question, this helps you identify any pain points with the company.
Additionally, it can be a great way to show how you'd be an asset to the team.
For Example, if they mention they have problem X, and you've solved that in the past, you can show how you'd be able to mitigate that problem.
Let's say that we agree and you hire me to this position, after X months, what do you expect that I have achieved?Not only this will tell you what is expected from you, it will also provide big hint on the type of work you are going to do in the first months of your job.
Name | Topic | Objective & Instructions | Solution | Comments |
---|---|---|---|---|
Message Board Tables | Relational DB Tables | Exercise | Solution |
ACID stands for Atomicity, Consistency, Isolation, Durability. In order to be ACID compliant, the database must meet each of the four criteria
Atomicity - When a change occurs to the database, it should either succeed or fail as a whole.
For example, if you were to update a table, the update should completely execute. If it only partially executes, the update is considered failed as a whole, and will not go through - the DB will revert back to it's original state before the update occurred. It should also be mentioned that Atomicity ensures that each transaction is completed as it's own stand alone "unit" - if any part fails, the whole statement fails.
Consistency - any change made to the database should bring it from one valid state into the next.
For example, if you make a change to the DB, it shouldn't corrupt it. Consistency is upheld by checks and constraints that are pre-defined in the DB. For example, if you tried to change a value from a string to an int when the column should be of datatype string, a consistent DB would not allow this transaction to go through, and the action would not be executed
Isolation - this ensures that a database will never be seen "mid-update" - as multiple transactions are running at the same time, it should still leave the DB in the same state as if the transactions were being run sequentially.
For example, let's say that 20 other people were making changes to the database at the same time. At the time you executed your query, 15 of the 20 changes had gone through, but 5 were still in progress. You should only see the 15 changes that had completed - you wouldn't see the database mid-update as the change goes through.
Durability - Once a change is committed, it will remain committed regardless of what happens (power failure, system crash, etc.). This means that all completed transactions must be recorded in non-volatile memory.
Note that SQL is by nature ACID compliant. Certain NoSQL DB's can be ACID compliant depending on how they operate, but as a general rule of thumb, NoSQL DB's are not considered ACID compliant
What is sharding?Sharding is a horizontal partitioning.
Are you able to explain what is it good for?
You find out your database became a bottleneck and users experience issues accessing data. How can you deal with such situation?Not much information provided as to why it became a bottleneck and what is current architecture, so one general approach could be
to reduce the load on your database by moving frequently-accessed data to in-memory structure.
Connection Pool is a cache of database connections and the reason it's used is to avoid an overhead of establishing a connection for every query done to a database.
What is a connection leak?A connection leak is a situation where database connection isn't closed after being created and is no longer needed.
What is Table Lock?"A data warehouse is a subject-oriented, integrated, time-variant and non-volatile collection of data in support of organisation's decision-making process"
Explain what is a time-series databaseA database index is a data structure that improves the speed of operations in a table. Indexes can be created using one or more columns, providing the basis for both rapid random lookups and efficient ordering of access to records.
What data types are there in relational databases?Data that is used multiple times in a database should be stored once and referenced with a foreign key.
This has the clear benefit of ease of maintenance where you need to change a value only in a single place to change it everywhere.
Primary Key: each row in every table should a unique identifier that represents the row.
Foreign Key: a reference to another table's primary key. This allows you to join table together to retrieve all the information you need without duplicating data.
Wikipedia: "is a programming technique for converting data between incompatible type systems using object-oriented programming languages"
In regards to the relational databases:
Wikipedia: "In the context of SQL, data definition or data description language (DDL) is a syntax for creating and modifying database objects such as tables, indices, and users."
Given a text file, perform the following exercises
Bonus: extract the last word of each line
Extract all the IP addressesThis article provides a great explanation.
Explain "Loose Coupling"The ability easily grow in size and capacity based on demand and usage.
Explain ElasticityThe ability to grow but also to reduce based on what is required
Explain Disaster RecoveryFault Tolerance - The ability to self-heal and return to normal capacity. Also the ability to withstand a failure and remain functional.
High Availability - Being able to access a resource (in some use cases, using different platforms)
What is the difference between high availability and Disaster Recovery?wintellect.com: "High availability, simply put, is eliminating single points of failure and disaster recovery is the process of getting a system back to an operational state when a system is rendered inoperative. In essence, disaster recovery picks up when high availability fails, so HA first."
Explain Vertical ScalingVertical Scaling is the process of adding resources to increase power of existing servers. For example, adding more CPUs, adding more RAM, etc.
What are the disadvantages of Vertical Scaling?With vertical scaling alone, the component still remains a single point of failure. In addition, it has hardware limit where if you don't have more resources, you might not be able to scale vertically.
Which type of cloud services usually support vertical scaling?Databases, cache. It's common mostly for non-distributed systems.
Explain Horizontal ScalingHorizontal Scaling is the process of adding more resources that will be able handle requests as one unit
What is the disadvantage of Horizontal Scaling? What is often required in order to perform Horizontal Scaling?A load balancer. You can add more resources, but if you would like them to be part of the process, you have to serve them the requests/responses. Also, data inconsistency is a concern with horizontal scaling.
Explain in which use cases will you use vertical scaling and in which use cases you will use horizontal scalingThe load on the producers or consumers may be high which will then cause them to hang or crash.
Instead of working in "push mode", the consumers can pull tasks only when they are ready to handle them. It can be fixed by using a streaming platform like Kafka, Kinesis, etc. This platform will make sure to handle the high load/traffic and pass tasks/messages to consumers only when the ready to get them.
Take a look here
Which cache replacement policies are you familiar with?You can find a list here
Explain the following cache policies:Read about it here
Why not writing everything to cache instead of a database/datastore?You can mention:
roll-back & roll-forward cut over dress rehearsals DNS redirection
Explain "Branch by Abstraction" techniqueAdditional exercises can be found in system-design-notebook repository.
A central processing unit (CPU) performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program. This contrasts with external components such as main memory and I/O circuitry, and specialized processors such as graphics processing units (GPUs).
What is RAM?RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor. RAM is the main memory in a computer. It is much faster to read from and write to than other kinds of storage, such as a hard disk drive (HDD), solid-state drive (SSD) or optical drive.
What is an embedded system?An embedded system is a computer system - a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system. It is embedded as part of a complete device often including electrical or electronic hardware and mechanical parts.
Can you give an example of an embedded system?Raspberry Pi
What types of storage are there?As defined by Doug Laney:
DataOps seeks to reduce the end-to-end cycle time of data analytics, from the origin of ideas to the literal creation of charts, graphs and models that create value. DataOps combines Agile development, DevOps and statistical process controls and applies them to data analytics.
What is Data Architecture?An answer from talend.com:
"Data architecture is the process of standardizing how organizations collect, store, transform, distribute, and use data. The goal is to deliver relevant data to people who need it, when they need it, and help them make sense of it."
Explain the different formats of dataWikipedia's explanation on Data Warehouse Amazon's explanation on Data Warehouse
What is Data Lake?Responsible for managing the compute resources in clusters and scheduling users' applications
Explain Hadoop MapReduceA programming model for large-scale data processing
Explain Hadoop Distributed File Systems (HDFS)In general, Packer automates machine images creation. It allows you to focus on configuration prior to deployment while making the images. This allows you start the instances much faster in most cases.
Packer follows a "configuration->deployment" model or "deployment->configuration"?A configuration->deployment which has some advantages like:
If you are looking for a way to prepare for a certain exam this is the section for you. Here you'll find a list of certificates, each references to a separate file with focused questions that will help you to prepare to the exam. Good luck :)
Thanks to all of our amazing contributors who make it easy for everyone to learn new things :)
Logos credits can be found here