SRE Projects Flashcards
What is MTU (3)
MEASUREMENT
In networking, maximum transmission unit (MTU) is a measurement representing the largest data packet that a network-connected device will accept. Imagine it as being like a height limit for freeway underpasses or tunnels: Cars and trucks that exceed the height limit cannot fit through, just as packets that exceed the MTU of a network cannot pass through that network.
FRAGMENTATION
However, unlike cars and trucks, data packets that exceed MTU are broken up into smaller pieces so that they can fit through. This process is called fragmentation. Fragmented packets are reassembled once they reach their destination.
BYTES
MTU is measured in bytes — a “byte” is equal to 8 bits of information, meaning 8 ones and zeroes. 1,500 bytes is the maximum MTU size.
Define MSS (4)
Maximum segment size
MSS is used by TCP at layer 4 of the Internet, the transport layer, instead of layer 3. MSS is only concerned with the size of the payload within each packet. It is calculated by subtracting the length of TCP and IP headers from MTU.
While packets that exceed a router’s MTU are either fragmented or dropped, packets that exceed the MSS are always dropped.
What is a GRE tunnel (2)
Generic Routing Encapsulation
Tunneling protocol that can encapsulate a wide variety of network layer protocols
What is the difference between Apache Kafka and Confluent Kafka (3)
Apache Kafka is an open source message broker that provides high throughput, high availability, and low latency.
Apache Kafka can be used either on its own or with the additional technology from Confluent.
Confluent Kafka provides additional technologies that sit on top of Apache Kafka.
Confluent Kafka provides companies with a stream data platform to help harness their high volume real-time data streams.
What is Helm? (1)
What do Helm charts do? (2)
Helm a package manager for Kubernetes…. that makes it easy to take applications and services that are either highly repeatable or used in multiple scenarios and deploy them to a typical K8s cluster
Helm Charts help you define, install, and upgrade even the most complex Kubernetes application.
What is Kafka used for? (2)
Apache Kafka is a real-time data streaming technology capable of handling trillions of events per day.
Define Kubernetes (1)
What is it used for (1)
Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.
What is GitLab? (3)
GitLab is a web-based Git repository that provides free open and private repositories, issue-following capabilities, and wikis.
It is a complete DevOps platform that enables professionals to perform all the tasks in a project—from project planning and source code management to monitoring and security.
What is network encryption (2)
Network encryption is the security applied to an organization’s network to protect and control this data internally.
Network layer encryption involves encrypting data as it is sent from one node, and decrypting it on arrival at another.
TLS (1)
Transport Layer Security (TLS) encrypts data sent over the Internet…
to ensure that eavesdroppers and hackers are unable to see what you transmit which is particularly useful for private and sensitive information such as passwords, credit card numbers, and personal correspondence.
SSL Cert (1)
Bonus analogy (1)
An SSL certificate is a bit of code on your web server that provides security for online communications….
When a web browser contacts your secured website, the SSL certificate enables an encrypted connection.
Bonus - It’s kind of like sealing a letter in an envelope before sending it through the mail.
SSL (3)
Secure Sockets Layer (SSL)
is a standard security technology for establishing an encrypted link between a server and a client—
typically a web server (website) and a browser, or a mail server and a mail client (e.g., Outlook).
What is Vault?
How does it work?
It is a secrets management tool designed to control access to sensitive credentials
By encrypting each secret to help prevent unauthorized users from gaining access
They function mostly as an active storage container for secrets as well as an account management system for dealing with multiple privileged accounts across the company.
Helm Chart auto-testing
Traefik (2)
a modern HTTP reverse proxy and load balancer that makes deploying microservices easy