Refer to Exhibit.Set Configuration Context:[student@node-1] $ | kubectlConfig use-context k8sContextA pod is running on the cluster but it is not responding.Task:The desired behavior is to have Kubemetes restart the pod when an endpoint returns an HTTP 500 on the /healthz endpoint. The service, probe-pod, should never send traffic to the pod while it is failing.Please complete the following:-The application has an endpoint, /started, that will indicate if it can accept traffic by returning an HTTP 200. If the endpoint returns an HTTP 500, the application has not yet finished initialization. -The application has another endpoint /healthz that will indicate if the application is still working as expected by returning an HTTP 200. If the endpoint returns an HTTP 500 the application is no longer responsive.-Configure the probe-pod pod provided to use these endpoints -The probes should use port 8080
Answer(s): A
Solution:To have Kubernetes automatically restart a pod when an endpoint returns an HTTP 500 on the /healthz endpoint, you will need to configure liveness and readiness probes on the pod. First, you will need to create a livenessProbe and a readinessProbe in the pod's definition yaml file. The livenessProbe will check the /healthz endpoint, and if it returns an HTTP 500, the pod will be restarted. The readinessProbe will check the /started endpoint, and if it returns an HTTP 500, the pod will not receive traffic.Here's an example of how you can configure the liveness and readiness probes in the pod definition yaml file:apiVersion: v1kind: Pod metadata:name: probe-pod spec:containers:- name: probe-pod image: <image-name>ports:- containerPort: 8080livenessProbe:httpGet:path: /healthz port: 8080initialDelaySeconds: 15periodSeconds: 10failureThreshold: 3readinessProbe:httpGet:path: /started port: 8080initialDelaySeconds: 15periodSeconds: 10failureThreshold: 3The httpGet specifies the endpoint to check and the port to use. The initialDelaySeconds is the amount of time the pod will wait before starting the probe. periodSeconds is the amount of time between each probe check, and the failureThreshold is the number of failed probes before the pod is considered unresponsive.You can use kubectl to create the pod by running the following command:kubectl apply -f <filename>.yamlOnce the pod is created, Kubernetes will start monitoring it using the configured liveness and readiness probes. If the /healthz endpoint returns an HTTP 500, the pod will be restarted. If the /started endpoint returns an HTTP 500, the pod will not receive traffic. Please note that if the failure threshold is set to 3, it means that if the probe fails 3 times consecutively it will be considered as a failure.The above configuration assumes that the application is running on port 8080 and the endpoints are available on the same port.
Refer to Exhibit.Set Configuration Context:[student@node-1] $ | kubectlConfig use-context k8sContextYou sometimes need to observe a pod's logs, and write those logs to a file for further analysis.Task:Please complete the following;-Deploy the counter pod to the cluster using the provided YAMLspec file at /opt/KDOB00201/counter.yaml-Retrieve all currently available application logs from the running pod and store them in the file /opt/KDOB0020l/log_Output.txt, which has already been created
Solution:To deploy the counter pod to the cluster using the provided YAML spec file, you can use the kubectl apply command. The apply command creates and updates resources in a cluster.kubectl apply -f /opt/KDOB00201/counter.yamlThis command will create the pod in the cluster. You can use the kubectl get pods command to check the status of the pod and ensure that it is running.kubectl get podsTo retrieve all currently available application logs from the running pod and store them in the file /opt/KDOB0020l/log_Output.txt, you can use the kubectl logs command. The logs command retrieves logs from a container in a pod.kubectl logs -f <pod-name> > /opt/KDOB0020l/log_Output.txt Replace <pod-name> with the name of the pod.You can also use -f option to stream the logs.kubectl logs -f <pod-name> > /opt/KDOB0020l/log_Output.txt & This command will retrieve the logs from the pod and write them to the /opt/KDOB0020l/log_Output.txt file.Please note that the above command will retrieve all logs from the pod, including previous logs. If you want to retrieve only the new logs that are generated after running the command, you can add the --since flag to the kubectl logs command and specify a duration, for example --since=24h for logs generated in the last 24 hours.Also, please note that, if the pod has multiple containers, you need to specify the container name using -c option.kubectl logs -f <pod-name> -c <container-name> > /opt/KDOB0020l/log_Output.txt The above command will redirect the logs of the specified container to the file.
Refer to Exhibit.ContextIt is always useful to look at the resources your applications are consuming in a cluster.Task:-From the pods running in namespace cpu-stress , write the name only of the pod that is consuming the most CPU to file /opt/KDOBG030l/pod.txt, which has already been created.
Solution:
ContextAnytime a team needs to run a container on Kubernetes they will need to define a pod within which to run the container.Task:Please complete the following:-Create a YAML formatted pod manifest/opt/KDPD00101/podl.yml to create a pod named app1 that runs a container named app1cont using image Ifccncf/arg-output with these command line arguments: -lines 56 -F-Create the pod with the kubect1 command using the YAML file created in the previous step -When the pod is running display summary data about the pod in JSON format using the kubect1 command and redirect the output to a file named /opt/KDPD00101/out1.json-All of the files you need to work with have been created, empty, for your convenience
Refer to Exhibit.Task:Create a new deployment for running.nginx with the following parameters;-Run the deployment in the kdpd00201 namespace. The namespace has already been created -Name the deployment frontend and configure with 4 replicas -Configure the pod with a container image of lfccncf/nginx:1.13.7 -Set an environment variable of NGINX__PORT=8080 and also expose that port for the container above
Share your comments for Linux Foundation CKAD exam with other users:
thank you for providing such assistance.
nice questions
my 3rd purcahse from this site. these exam dumps are helpful. very helpful.
found it good
excellent material
very helpfull
well explained.
i need the pdf, please.
a good source for exam preparation
i need ielts general training audio guide questions
please make this content available
content is good
latest dumps please
aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.
questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer
90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump
answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.
password lockout being the correct answer for question 37 does not make sense. it should be geofencing.
for question 4, the righr answer is :recover automatically from failures
question number 4s answer is 3, option c. i
very good questions
i am confused about the answers to the questions. are the answers correct?
very usefull
need certification.
great exam prep
i require dump
good morning, could you please upload this exam again,
hi can you please upload the dumps for sap contingent module. thanks
good questions
looking forward to the real exam
good ones for exam preparation
this is a good experience
hi everyone