Top 50 Selendroid interview questions and answers

General Questions Element Identification and Interaction Multiple Device Support Native and Hybrid App Automation WebView Automation Testing Framework Integration Gestures and Actions Test Configuration and Management Error Handling and Debugging…

Read more »

Top 50 Pagerduty Interview Questions & Answer

1) If you were asked to review a colleague’s code that they had written, what key things would you look for? For this question, your interviewer will obviously be looking…

Read more »

Top 50 Exim Interview Questions & Answer

1) You are not given the tools you need to be successful. How would you change that In Exim? State a business case to your manager / leader as to…

Read more »

Top 50 RabbitMQ Interview Questions & Answer

1) What is RabbitMQ? RabbitMQ is an open-source message-broker software is also known as message queueing technology. It defines queues to which applications communicate for data transfer, or message transmission….

Read more »

Top 50 haproxy Interview Questions & Answer

1) Is HAProxy a load balancer? HAProxy (High Availability Proxy) is open source proxy and load balancing server software. It provides high availability at the network (TCP) and application (HTTP/S)…

Read more »

Top 50 traefik Interview Questions & Answer

1) What is Traefik software? Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer that makes deploying microservices easy. Traefik integrates with your existing infrastructure components (Docker,…

Read more »

Top 50 linkerd Interview Questions & Answer

1) Who owns Linkerd? the Cloud Native Computing FoundationLinkerd is hosted by the Cloud Native Computing Foundation (CNCF). The CNCF owns the trademark; the copyright is held by the Linkerd…

Read more »

Top 50 Consul interview questions and answers

1) What Is Checkpoint? / Does Consul Call Home? Consul makes use of a HashiCorp service called Checkpoint which is used to check for updates and critical security bulletins. Only…

Read more »

Top 50 istio interview questions and answers

1) What is Istio and how it works? An Istio service mesh is logically split into a data plane and a control plane. The data plane is composed of a…

Read more »

Top 50 Envoy interview questions and answers

1) What is Envoy software used for? Envoy’s workplace platform has redefined how companies welcome visitors, keep employees safe, book desks and conference rooms, and manage deliveries in over 14,000…

Read more »

Top 50 Appium interview questions and answers

1) Describe various types of mobile applications Mobile applications are of the following three types: Native Applications: Applications that are created with the help of iOS and Android SDK are…

Read more »

Top 50 Jmeter interview questions and answers

1) Explain what is JMeter? JMeter is a Java tool, which is used for performance Load Testing. 2) Explain how JMeter works? JMeter acts like a group of users sending…

Read more »

Top 50 Springboot interview questions and answers

1) What is Spring boot? Sprint boot is a Java-based spring framework used for Rapid Application Development (to build stand-alone microservices). It has extra support of auto-configuration and embedded application…

Read more »

Top 50 Zabbix interview questions and answers

1) What can be monitored using Zabbix? Zabbix provides monitoring metrics, such as network utilization, CPU load and disk space consumption. The software monitors operations on Linux, Hewlett Packard Unix…

Read more »

Top 100 laravel interview questions and answers

1) What is Laravel? Laravel is an open-source widely used PHP framework. The platform was intended for the development of web application by using MVC architectural pattern. Laravel is released…

Read more »

Setup Docker service to use insecure(http) registry instead of https

By default docker use https to connect to docker registry. But there can be use cases to use insecure registry. Here are the steps to use insecure registry. In ubuntuedit…

Read more »

DDOS attack and HTTP flood attack on AWS from AWS EC2 instance using New Relic Synthetics & infalted aws bill to $3000

How I prevented DDOS attack and HTTP flood attack from New Relic Synthetics Monitoring of AWS EC2 Instance? 5 Dec 2020 – DDOS attack and HTTP flood attack Start Date…

Read more »
Api

Refresher on RESTful Services.

Let’s have a look at the structure a RESTful service generally has, or how it works. Here we have, well, parts of a RESTful service. We’ve got some API endpoints,…

Read more »

Exploring Directory Structure in laravel.

Laravel applications follow the Model-View-Controller architecture design pattern. Models represent the entities in the database and help you to query the database and return the data Views are the pages that will be displayed…

Read more »

How to pass http proxy to ansible using environment variables?

It is quite possible that you may need to get package updates through a proxy, or even get some package updates through a proxy and access other packages not through…

Read more »