SIMULATION
Monitor the logs of pod foo and:
1. Extract log lines corresponding to error
2. unable-to-access-website Write them to /opt/KULM00201/foo
SIMULATION
Create and configure the service front-end-service so it's accessible through NodePort and routes to the existing pod named front-end.
SIMULATION
Create a deployment spec file that will:
Launch 7 replicas of the nginx Image with the label app_runtime_stage=dev
deployment name: kual00201
Save a copy of this spec file to /opt/KUAL00201/spec_deployment.yaml (or /opt/KUAL00201/spec_deployment.json).
When you are done, clean up (delete) any new Kubernetes API object that you produced during this task.
SIMULATION Create a deployment as follows: Name: nginx-random Exposed via a service nginx-random Ensure that the serviceand; pod are accessible via their respective DNS records The container(s) within any pod(s) running as a part of this deployment should use the nginx Image Next, use the utility nslookup to look up the DNS records of the service and pod and write the output to /opt/KUNW00601/service.dns and /opt/ KUNW00601/pod.dns respectively.
SIMULATION
Create a snapshot of the etcd instance running at https://127.0.0.1:2379, saving the snapshot to the file path /srv/data/etcd-snapshot.db. The following TLS certificates/key are supplied for connecting to the server with etcdctl:
1.
CA certificate: /opt/KUCM00302/ca.crt
2.
Client certificate: /opt/KUCM00302/etcd-client.crt
3.
Client key: Topt/KUCM00302/etcd-client.key
Create a pod that echo "hello world" and then exists. Have the pod deleted automatically when it's completed
Get list of all the pods showing name and namespace with a jsonpath expression.
CORRECT TEXT
Context
You have been asked to create a new ClusterRole for a deployment pipeline and bind it to a specific ServiceAccount scoped to a specific namespace.
Task
Create a new ClusterRole named deployment-clusterrole, which only allows to create the following resource types:
1.
Deployment
2.
StatefulSet
3.
DaemonSet
Create a new ServiceAccount named cicd-token in the existing namespace app-team1.
Bind the new ClusterRole deployment-clusterrole lo the new ServiceAccount cicd-token , limited to the namespace app-team1.