Configuration Management Flashcards

1
Q

Config management dashboard widgets

A

1) Toolbar
2) Most used secrets
3) User with most admin roles
4) Policy violations
5) CIS Docker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Toolbar of the cm dashboaord

A

1) Policies
2) Infra: nodes, clusters, deployments, image, secrets, ns
3) RBAC: user & groups, roles service accounts
4) Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is CIS

A

Center for Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you find out the number of controls, sa or secrets in a cluster?

A

Go to Confguration Management
In toolbar, select Infrastructure
Then select clusters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you find out the number of controls, sa or secrets in a namespace?

A

Go to Confguration Management
In toolbar, select Infrastructure
Then select namespaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of Config Management policies

A

1) Using emergency annotation to avoid admission controller
2) Using secrets in env variables
3) Exposing ssh port
4) Privileged containers
5) No resource requests and limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you configure ACS?

A

Platform Configuration > System Configuration > Edit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are ACS configuration options?

A

Data Retention Configuration
Header Configuration
Footer Configuration
Login Configuration
Cluster deletion configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you determine ACS System Health?

A

Platform Configuration > System Health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the key groups in the health dashboard?

A

1) Cluster health
2) Vulnerabilities definition
3) Notifier integration
4) Image Integration
5) Backup Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are elements of cluster health?

A

1) Cluster overview
2) Admission controller status
3) Sensor status
4) Collector status
5) Sensor Upgrade
6) Credentials expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the types of roles you have in ACS?

A

1) System roles: created by Red Hat and cannot be changed.
2) Custom roles: Created by admins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are permission sets?

A

set of permissions that define what actions a role can perform on a given resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Different types of permission sets

A

1) System permission sets: created by Red Hat and cannot be changed.

2) Custom permission sets: created by admins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define access scopes

A

set of Kubernetes and OpenShift resources that users can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do access scopes, permission sets, and roles relate together?

A

permission sets and access scopes are part of roles. You give permission sets on access scopes.