Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

How Can You Create A Token?

Answer»

USERS first NEED to authenticate their KEYSTONE CREDENTIALS to create a token.

Users first need to authenticate their Keystone credentials to create a token.

2.

What Is Identity Service In Openstack?

Answer»

KEYSTONE is the most IMPORTANT and PREFERRED Identity SERVICE in OpenStack and executes the complete OpenStack Identity API.

Keystone is the most important and preferred Identity Service in OpenStack and executes the complete OpenStack Identity API.

3.

Mention What Are The Three Components That Make Modular Architecture Of Openstack?

Answer»

The three components that make modular architecture for OpenStack are:

  1. OpenStack Compute: For managing large networks of the virtual machine
  2. OpenStack Object STORAGE: A storage system that provides support for both block storage and object storage
  3. IMAGE Service: The delivery service provides discovery and registration for virtual DISK images

The three components that make modular architecture for OpenStack are:

4.

What Does It Mean For The Cloud Ecosystem?

Answer»

Wide adoption of an open-source, open-standards CLOUD should be huge for everyone. It means customers won’t have to fear lock-in and technology companies can participate in a growing MARKET that spans cloud providers. Companies are already using OpenStack to provide public clouds, support, training and system integration services and HARDWARE and software products.

A GREAT analogy comes from the early days of the Internet: the transition away from fractured, proprietary flavors of UNIX toward open-source Linux. An open cloud stands to provide the same benefits for large-scale cloud COMPUTING that the Linux standard provided inside the server.

Wide adoption of an open-source, open-standards cloud should be huge for everyone. It means customers won’t have to fear lock-in and technology companies can participate in a growing market that spans cloud providers. Companies are already using OpenStack to provide public clouds, support, training and system integration services and hardware and software products.

A great analogy comes from the early days of the Internet: the transition away from fractured, proprietary flavors of UNIX toward open-source Linux. An open cloud stands to provide the same benefits for large-scale cloud computing that the Linux standard provided inside the server.

5.

Who Is Openstack For?

Answer»

OpenStack is for service providers, enterprises, government agencies and academic institutions that want to BUILD PUBLIC or private clouds. Industries range from IT & telco to SAAS and eCommerce to finance and HEALTHCARE. You can read more about how organizations are becoming agile, reducing costs and avoiding vendor lock-in with OpenStack.

OpenStack is for service providers, enterprises, government agencies and academic institutions that want to build public or private clouds. Industries range from IT & telco to SaaS and eCommerce to finance and healthcare. You can read more about how organizations are becoming agile, reducing costs and avoiding vendor lock-in with OpenStack.

6.

How You Will Install Dhcp Agent ?

Answer»

# apt-get INSTALL neutron-dhcp-agent

# apt-get install neutron-dhcp-agent

7.

What You Will Do In Case Of Server Failure ?

Answer»

If a server is having hardware issues, it is a good idea to MAKE sure the Object Storage SERVICES are not running. This will allow Object Storage to work AROUND the failure while you troubleshoot.

If the server just needs a reboot, or a small amount of work that should only last a couple of hours, then it is probably best to let Object Storage work around the failure and get the machine fixed and back online. When the machine COMES back online, replication will make sure that anything that is missing during the downtime will get updated.

If you cannot replace the drive immediately, then it is best to leave it unmounted, and remove the drive from the ring. This will allow all the replicas that were on that drive to be REPLICATED elsewhere until the drive is replaced. Once the drive is replaced, it can be re-added to the ring.

If a server is having hardware issues, it is a good idea to make sure the Object Storage services are not running. This will allow Object Storage to work around the failure while you troubleshoot.

If the server just needs a reboot, or a small amount of work that should only last a couple of hours, then it is probably best to let Object Storage work around the failure and get the machine fixed and back online. When the machine comes back online, replication will make sure that anything that is missing during the downtime will get updated.

If you cannot replace the drive immediately, then it is best to leave it unmounted, and remove the drive from the ring. This will allow all the replicas that were on that drive to be replicated elsewhere until the drive is replaced. Once the drive is replaced, it can be re-added to the ring.

8.

What You Will Do In Case Of Drive Failure ?

Answer»

In the event that a drive has failed, the FIRST step is to make sure the drive is unmounted. This will make it easier for Object Storage to WORK around the failure until it has been resolved. If the drive is GOING to be replaced immediately, then it is just best to replace the drive, format it, remount it, and LET replication FILL it up.

In the event that a drive has failed, the first step is to make sure the drive is unmounted. This will make it easier for Object Storage to work around the failure until it has been resolved. If the drive is going to be replaced immediately, then it is just best to replace the drive, format it, remount it, and let replication fill it up.

9.

What Is Use Of Account Reaper ?

Answer»

In the BACKGROUND, the ACCOUNT REAPER removes data from the deleted ACCOUNTS.

In the background, the account reaper removes data from the deleted accounts.

10.

What Is Orchestration ?

Answer»

Orchestration is an orchestration ENGINE that provides the possibility to launch multiple COMPOSITE CLOUD applications based on templates in the FORM of text files that can be treated like CODE.

Orchestration is an orchestration engine that provides the possibility to launch multiple composite cloud applications based on templates in the form of text files that can be treated like code.

11.

How You Can Change Behavior Of Dhcp Server ?

Answer»

The BEHAVIOR of dnsmasq can be CUSTOMIZED by CREATING a dnsmasq CONFIGURATION FILE

The behavior of dnsmasq can be customized by creating a dnsmasq configuration file

12.

How To Migrate Running Instances From One Openstack Compute Server To Another Openstack Compute Server ?

Answer»
  • CHECK the ID of the instance to be migrated
  • Check the INFORMATION associated with the instance
  • Select the compute node the instance will be migrated to.
  • Check that Host has ENOUGH resources for MIGRATION
  • Migrate the instance using the $ NOVA live-migration SERVER HOST_NAME command.

13.

What Is Alarm In Openstack ?

Answer»

Alarms provide user-oriented MONITORING-as-a-Service for resources running on OpenStack. This type of monitoring ensures you can automatically scale in or out a GROUP of instances through the Orchestration MODULE, but you can also USE alarms for general-purpose awareness of your cloud resources’ health.

Alarms provide user-oriented Monitoring-as-a-Service for resources running on OpenStack. This type of monitoring ensures you can automatically scale in or out a group of instances through the Orchestration module, but you can also use alarms for general-purpose awareness of your cloud resources’ health.

14.

Where Caching Configuration Is Stored ?

Answer»

The MAJORITY of the CACHING CONFIGURATION options are SET in the [cache] SECTION of the keystone.conf file.

The majority of the caching configuration options are set in the [cache] section of the keystone.conf file.

15.

What Is Job Of User Crud ?

Answer»

The user CRUD FILTER ENABLES users to use a HTTP PATCH to change their own PASSWORD.

The user CRUD filter enables users to use a HTTP PATCH to change their own password.

16.

How To See A List Of Roles And The Associated Ids In Our Environment ?

Answer»

KEYSTONE role-list

keystone role-list

17.

How To Display Images Using Nova Client ?

Answer»

NOVA image-list

nova image-list

18.

How You Can Remove A Rule From Security Group ?

Answer»

NOVA secgroup-delete-rule WEBSERVER TCP 443 443 0.0.0.0/0

nova secgroup-delete-rule webserver tcp 443 443 0.0.0.0/0

19.

How You Assign A Project To A User ?

Answer»

SUDO nova-manage PROJECT ADD –project=project_name

–user=user_name

sudo nova-manage project add –project=project_name

–user=user_name

20.

How To Create A Normal User In Openstack ?

Answer»

SUDO nova-manage USER CREATE user-name

sudo nova-manage user create user-name

21.

What Is Sanitization Process ?

Answer»

The sanitization process removes information from the media such that the information cannot be retrieved or RECONSTRUCTED. Sanitization techniques, including CLEARING, purging, cryptographic erase, and destruction, PREVENT the disclosure of information to unauthorized individuals when such media is REUSED or released for disposal.

The sanitization process removes information from the media such that the information cannot be retrieved or reconstructed. Sanitization techniques, including clearing, purging, cryptographic erase, and destruction, prevent the disclosure of information to unauthorized individuals when such media is reused or released for disposal.

22.

What Are Data Privacy Concerns In Openstack, How Those Can Be Remediated?

Answer»

Data residency: Concerns over who owns data in the cloud and whether the cloud operator can be ultimately trusted as a custodian of this data have been significant issues in the past.

Data disposal:– Best practices SUGGEST that the operator SANITIZE cloud system media (digital and non-digital) PRIOR to disposal, release out of organization CONTROL or release for reuse.

Data not securely erased:- This may be remediated with database and/or system configuration for auto vacuuming and periodic free-space wiping.

Instance memory scrubbing, Cinder volume data, Image service DELAY delete feature.

Data residency: Concerns over who owns data in the cloud and whether the cloud operator can be ultimately trusted as a custodian of this data have been significant issues in the past.

Data disposal:– Best practices suggest that the operator sanitize cloud system media (digital and non-digital) prior to disposal, release out of organization control or release for reuse.

Data not securely erased:- This may be remediated with database and/or system configuration for auto vacuuming and periodic free-space wiping.

Instance memory scrubbing, Cinder volume data, Image service delay delete feature.

23.

Why Compliance Is Required In Openstack ?

Answer»

Compliance MEANS adhering to regulations, specifications, standards and laws.

An OpenStack DEPLOYMENT may require compliance activities for many purposes, such as REGULATORY and legal requirements, customer need, privacy CONSIDERATIONS, and SECURITY best practices. The Compliance function is important for the business and its customers.

Compliance means adhering to regulations, specifications, standards and laws.

An OpenStack deployment may require compliance activities for many purposes, such as regulatory and legal requirements, customer need, privacy considerations, and security best practices. The Compliance function is important for the business and its customers.

24.

Give An Example Where Logs Help In Openstack Security ?

Answer»

For instance, ANALYZING the access logs of Identity service or its replacement authentication system would alert us to failed LOGINS, frequency, origin IP, WHETHER the events are RESTRICTED to select accounts and other pertinent information. Log analysis supports DETECTION.

For instance, analyzing the access logs of Identity service or its replacement authentication system would alert us to failed logins, frequency, origin IP, whether the events are restricted to select accounts and other pertinent information. Log analysis supports detection.

25.

How You Can View The Rules ?

Answer»

RULES can be VIEWED with the COMMAND:

$ NOVA secgroup-list-rules myservers

Rules can be viewed with the command:

$ nova secgroup-list-rules myservers

26.

What Are Commands To Generate Keypairs ?

Answer»
  • SSH-keygen
  • CD .ssh
  • NOVA keypair-add –pub_key id_rsa.pub mykey

27.

What Do You Understand By Horizon ?

Answer»

Horizon the web based dashboard can be used to MANAGE /administer OPENSTACK SERVICES.

Horizon the web based dashboard can be used to manage /administer OpenStack services.

28.

What Are Functions And Features Of Swift ?

Answer»
  • Storage of large SIZED objects
  • Storage of large NUMBER of objects
  • Data REDUNDANCY
  • Archival capabilities – Work with large datasets
  • Data CONTAINER for virtual machines and cloud apps
  • Media Streaming capabilities
  • Secure storage of objects
  • EXTREME scalability
  • Backup and archival

29.

What Is Rabbit Mq Server ?

Answer»

OpenStack COMMUNICATES among themselves USING the MESSAGE QUEUE via AMQP.

OpenStack communicates among themselves using the message queue via AMQP.

30.

What Is Job Of Api-server ?

Answer»

The API Server provides an interface for the outside WORLD to interact with the CLOUD infrastructure.

The API Server provides an interface for the outside world to interact with the cloud infrastructure.

31.

What Are Components Of Openstack Compute ?

Answer»

Nova CLOUD Fabric is COMPOSED of the following major components:

  • API Server (nova-api)
  • Message Queue (rabbit-mq server)
  • Compute WORKERS (nova-compute)
  • Network Controller (nova-network)
  • Volume Worker (nova-volume)
  • Scheduler (nova-scheduler)

Nova Cloud Fabric is composed of the following major components:

32.

What Are Functions Of “nova” ?

Answer»
  • INSTANCE life cycle management
  • Management of compute resources
  • NETWORKING and Authorization
  • REST-based API
  • ASYNCHRONOUS eventually consistent communication
  • HYPERVISOR agnostic : support for Xen, XenServer/XCP, KVM, UML, VMware vSphere and Hyper-V

33.

What Is The Command Used To List Ip Address Information?

Answer»

$ NOVA floating-ip-pool-list

$ nova floating-ip-pool-list

34.

What Is Bare-metal Node And What Does It Comprised Of?

Answer»
  • It GIVES access to control bare metal driver, through which user can control PHYSICAL hardware RESOURCES on the same network.
  • Bare metal node is comprised of two separate components
  • Bare metal node Operating SYSTEM: It is a base software, which RUNS on each node in the cluster.
  • Bare metal node Orchestrator: It’s a management software, which acts as a dispatcher to all nodes in the cluster.

35.

What Is The Meaning Of Term “flavor” In Openstack?

Answer»

A flavour is an AVAILABLE hardware CONFIGURATION for a server, which defines the SIZE of a virtual server that can be LAUNCHED.

A flavour is an available hardware configuration for a server, which defines the size of a virtual server that can be launched.

36.

What Is The Command To Manage Floating Ip Addresses In Openstack?

Answer»

NOVA floating-ip-*

nova floating-ip-*

37.

Mention What Are The Networking Options Used In Openstack?

Answer»

The networking options USED in OPENSTACK are:

VLAN NETWORK Manager: Compute creates a VLAN and bridge; DHCP server is started for each VLAN to pass out IP addresses to VM instances.
Flat DHCP Network Manager: IP addresses for VM instances are fetched from the subnet specified by the network administrator
Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch

The networking options used in OpenStack are:

VLAN Network Manager: Compute creates a VLAN and bridge; DHCP server is started for each VLAN to pass out IP addresses to VM instances.
Flat DHCP Network Manager: IP addresses for VM instances are fetched from the subnet specified by the network administrator
Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch

38.

For Networking, What Hardware Is Used In Openstack?

Answer»

In OpenStack, networking is DONE in following ways :

In OpenStack, networking is done in following ways :

39.

Explain What Is Cells In Openstack?

Answer»

Cells FUNCTIONALITY enables you to scale an OpenStack COMPUTE cloud in a more simplistic way. When this functionality is enabled, the hosts in an OpenStack Compute cloud are partitioned into GROUP CALLED cells. Cells are configured as trees.

Cells functionality enables you to scale an OpenStack Compute cloud in a more simplistic way. When this functionality is enabled, the hosts in an OpenStack Compute cloud are partitioned into group called cells. Cells are configured as trees.

40.

Explain What Is Token In Openstack?

Answer»

Token is an alpha-numeric string which ALLOWS access to a CERTAIN SET of SERVICES depending UPON the access level of the user

Token is an alpha-numeric string which allows access to a certain set of services depending upon the access level of the user

41.

Explain About Openstack Python Sdk?

Answer»

For writing python scripts and managing in Openstack CLOUD, SDK (Software Development Kit) is used. The SDK implements Python BINDING to the OpenStack API, which enables you to achieve AUTOMATION tasks in Python by making CALLS on Python objects instead of making REST calls directly.

For writing python scripts and managing in Openstack cloud, SDK (Software Development Kit) is used. The SDK implements Python binding to the OpenStack API, which enables you to achieve automation tasks in Python by making calls on Python objects instead of making REST calls directly.

42.

List Out The Storage Locations For Vm Images In Openstack?

Answer»

OPENSTACK Object Storage :

OpenStack Object Storage :

43.

Explain What Is The Function Of Cinder Scheduler?

Answer»

CINDER SCHEDULER or ROUTING VOLUME create requests to the appropriate volume SERVICE

Cinder Scheduler or routing volume create requests to the appropriate volume service

44.

Mention What Is The Command To Remove Network Interface From Bare-metal Node?

Answer»

To remove NETWORK INTERFACE from bare-metal node COMMAND used is bare-metal – interface remove.

To remove network interface from bare-metal node command used is bare-metal – interface remove.

45.

What Are The Main Components Of Identity User Management?

Answer»

Users: It is a digital representation of a person, SERVICE or system who uses OpenStack cloud services
Roles: A role includes a set of rights and privileges. A role determines what operations a user is permitted to PERFORM in a GIVEN tenant
Tenants: A container used to group or ISOLATE resource or identity objects. Depending on service operator a tenant may map to a customer, account, organization or project.

Users: It is a digital representation of a person, service or system who uses OpenStack cloud services
Roles: A role includes a set of rights and privileges. A role determines what operations a user is permitted to perform in a given tenant
Tenants: A container used to group or isolate resource or identity objects. Depending on service operator a tenant may map to a customer, account, organization or project.

46.

Explain How You Can Transfer Volume From One Owner To Another In Openstack?

Answer»

You can TRANSFER a volume from one OWNER to another by using the command CINDER transfer*.

You can transfer a volume from one owner to another by using the command cinder transfer*.

47.

What Is The Command Used For Unpause And Pause An Instance?

Answer»

48.

What Is The Meaning Of Term “cinder” In Openstack Service?

Answer»

Cinder is USED for HANDLING persistent storage in OpenStack.The one that is UTILIZED by default is LVM, CALLED Cinder-Volumes.

Cinder is used for handling persistent storage in OpenStack.The one that is utilized by default is LVM, called Cinder-Volumes.

49.

Explain What Hypervisor Is And What Type Of Hypervisor Does Openstack Supports?

Answer»

In virtualization TECHNOLOGY, hypervisor is a SOFTWARE program that manages multiple operating systems (or multiple instances of the same operating system) on a single COMPUTER system.

The types of hypervisor that OpenStack SUPPORTS are :

  • KVM
  • Containers
  • Xen and HyperV
  • VMware

In virtualization technology, hypervisor is a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system.

The types of hypervisor that OpenStack supports are :

50.

Explain Modular Architecture Of Openstack?

Answer»

The three components that MAKE MODULAR architecture for OpenStack are:

OpenStack COMPUTE: For managing large networks of the virtual machine.
Image Service: The delivery service provides discovery and registration for virtual DISK images.
OpenStack Object Storage: A storage SYSTEM that provides support for both block storage and object storage.

The three components that make modular architecture for OpenStack are:

OpenStack Compute: For managing large networks of the virtual machine.
Image Service: The delivery service provides discovery and registration for virtual disk images.
OpenStack Object Storage: A storage system that provides support for both block storage and object storage.