Container Orchestration Flashcards

1
Q

What two problems do containers solve?

A

1) Managing the dependencies of an application
2) Runs much more efficiently than spinning up a lot of virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is one of the earliest ancestors of modern container technologies?

A

chroot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the “chroot” command do?

A

The chroot command can isolate a process from the root filesystem, “hide” the files from the process and simulate a new root directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the eight namespaces of the Linux 5.6 Kernel?

A

1) pid (process id)
2) net (network)
3) mnt (mount)
4) ipc (inter-process communication)
5) user
6) uts (Unix time sharing)
7) cgroup
8) time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between a virtual machine and a container?

A

A virtual machine emulates a complete machine and has its operating system and kernel. Containers share the kernel of the host machine and are isolated processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False

You need to use Docker to run industry-standard containers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the name of the container runtime reference implementation that the Open Container Initiative maintains?

A

runC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary use of runC?

A

runC is a low-level runtime used in a variety of tools to start containers, including Docker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the runtime-spec describe?

A

The runtime-spec describes how to unpack a container image and manage the complete container lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__________ provides a similar API as Docker and can be used as a drop-in replacement.

A

Podman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a container image?

A

A container image is a lightweight, standalone, executable package of software that includes everything needed to run an application, including code, runtime, system tools, system libraries and settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do container images consist of?

A

Container images consist of a filesystem bundle and metadata.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Images can be built by reading the instructions from a buildfile called a __________.

A

Dockerfile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a container registry?

A

Container registries act as a container distribution serve, where developers can upload and download different container images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one of the biggest security risks of containers and why?

A

One of the biggest security risks of containers is that they share the same kernel as the machine they run on. This is a security risk because containers can run kernel processes with elevated privileges, which could unintentionally alter the host system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False.

Public image registries are completely safe to use.

A

False

17
Q

What are the 4C’s of Cloud Native security?

A

Code, container, cluster, cloud

18
Q

What problems can be solved by container orchestration?

A

1) Providing compute resources like virtual machines where containers can run on
2) Schedule containers to servers in an efficient way
3) Allocate resources like CPU and memory to containers
4) Manage the availability of containers and replace them if they fail
5) Scale containers if load increases
6) Provide networking to connect containers together
7) Provision storage if containers need to persist data

19
Q

What do container orchestration systems provide?

A

Container orchestration systems provide a way to build a cluster of multiple servers and host the containers on top.

20
Q

A ________ is responsible for the management of containers and __________ host the containers.

A

Control plane; worker nodes

21
Q

__________ namespaces allow each container is have their own unique ___________.

A

Network; IP address

22
Q

True or False.

Containers have the ability to map a port from the container to a port from the host system.

A

True

23
Q

What is the chroot isolated environment sometimes called?

A

chroot jail

24
Q

Define Service Discovery.

A

Service Discovery is finding other services in the network and requesting information about them.

25
Q

In container orchestration, where is service information stored?

A

In a Service Registry

26
Q

What are the two most-used approaches to Service Discovery?

A

DNS and Key-Value-Store

27
Q

What is a proxy?

A

A proxy is a server application that sits between the client and server and can modify or filter network traffic before it reaches the server.

28
Q

What are some common proxy technologies?

A

1) nginx
2) haproxy
3) envoy

29
Q

What does a service mesh do?

A

A service mesh adds a proxy server to every container.

30
Q

What are the two most popular service meshes?

A

1) istio
2) linkerd

31
Q

The proxies in a service mesh form a ______ ______.

A

data plane

32
Q

What does a data plane do?

A

Data planes implement network rules and shape traffic flow.

33
Q

Networking rules are managed centrally in the ______ ______ of a service mesh.

A

control plane

34
Q

What does a service mesh control plane do?

A

It defines how traffic flows between services and what configuration should be applied to the proxies.

35
Q

If a container needs to persist data on a host, a ______ can be used to achieve that.

A

Volume

36
Q

What is the primary weakness of container volumes?

A

They give access to the host filesystem.

37
Q

Container orchestration systems like Kubernetes can help to mitigate the problems with using container volumes, but always require a robust ______ _______ system that is attached to the host servers.

A

Central storage