i
Infosys
Work with us
Filter interviews by
Implement security measures in CI/CD pipelines to protect code, dependencies, and environments throughout the development lifecycle.
Use static code analysis tools (e.g., SonarQube) to identify vulnerabilities in code before deployment.
Integrate dependency scanning tools (e.g., Snyk, OWASP Dependency-Check) to detect known vulnerabilities in third-party libraries.
Implement secrets management solutions (e.g., AWS Se...
AWS is a comprehensive cloud platform offering scalable computing resources, storage, and services for businesses globally.
Scalability: AWS allows businesses to scale resources up or down based on demand, such as using EC2 instances for variable workloads.
Cost-Effectiveness: Pay-as-you-go pricing model helps reduce costs; for example, using S3 for storage only charges for what you use.
Global Reach: AWS has data ce...
Kubernetes is an open-source platform for automating deployment, scaling, and management of containerized applications.
Orchestration: Kubernetes automates the deployment, scaling, and management of containerized applications, reducing manual effort.
Scalability: It allows applications to scale up or down seamlessly based on demand, ensuring optimal resource utilization.
Load Balancing: Kubernetes provides built-in l...
Grant access to S3 bucket securely by using IAM policies and roles.
Create an IAM policy with specific permissions for the S3 bucket
Attach the IAM policy to an IAM role
Assign the IAM role to the user or group that needs access
Use bucket policies for more granular control if needed
IAM role is used to grant permissions to entities, while IAM group is used to group users with similar permissions.
IAM role is used to delegate permissions to entities like EC2 instances or Lambda functions
IAM group is used to group users with similar permissions for easier management
IAM role can be assumed by trusted entities, while IAM group is used for managing user permissions
Ingress controls the external access to services in a cluster, while service defines a set of pods and how they can be accessed.
Ingress manages external access to services in a cluster
Service defines a set of pods and how they can be accessed
Ingress can provide load balancing, SSL termination, and routing based on hostnames or paths
Service can be of type ClusterIP, NodePort, LoadBalancer, or ExternalName
Pods communicate with other pods through network communication within the same Kubernetes cluster.
Pods can communicate with each other using services, which provide a stable endpoint for communication.
Pods can use DNS names to communicate with other pods within the same cluster.
Pods can also communicate directly using IP addresses within the cluster network.
Communication between pods can be secured using network p...
Ingress controller is a Kubernetes resource that manages external access to services within a cluster.
Ingress controller acts as a traffic manager, routing incoming traffic to the appropriate services based on rules defined in the Ingress resource.
It allows for the configuration of HTTP and HTTPS routing, load balancing, SSL termination, and more.
Popular Ingress controllers include Nginx Ingress Controller, Traefi...
Kubernetes networking is the way in which different pods and services communicate with each other within a Kubernetes cluster.
Kubernetes networking allows pods to communicate with each other across nodes in the cluster.
It uses a flat network model where each pod gets its own IP address.
Kubernetes networking can be implemented using various plugins like Calico, Flannel, or Cilium.
Network policies can be defined to ...
I appeared for an interview in Jun 2025, where I was asked the following questions.
AWS is a comprehensive cloud platform offering scalable computing resources, storage, and services for businesses globally.
Scalability: AWS allows businesses to scale resources up or down based on demand, such as using EC2 instances for variable workloads.
Cost-Effectiveness: Pay-as-you-go pricing model helps reduce costs; for example, using S3 for storage only charges for what you use.
Global Reach: AWS has data centers...
Kubernetes is an open-source platform for automating deployment, scaling, and management of containerized applications.
Orchestration: Kubernetes automates the deployment, scaling, and management of containerized applications, reducing manual effort.
Scalability: It allows applications to scale up or down seamlessly based on demand, ensuring optimal resource utilization.
Load Balancing: Kubernetes provides built-in load b...
Implement security measures in CI/CD pipelines to protect code, dependencies, and environments throughout the development lifecycle.
Use static code analysis tools (e.g., SonarQube) to identify vulnerabilities in code before deployment.
Integrate dependency scanning tools (e.g., Snyk, OWASP Dependency-Check) to detect known vulnerabilities in third-party libraries.
Implement secrets management solutions (e.g., AWS Secrets...
Infrastructure as Code (IaC) automates infrastructure management using code, enhancing consistency and efficiency in deployments.
Enables version control for infrastructure, similar to application code.
Facilitates automated provisioning and configuration of resources.
Reduces manual errors and increases deployment speed.
Examples include tools like Terraform, AWS CloudFormation, and Ansible.
Supports reproducibility of env...
I applied via LinkedIn and was interviewed in Sep 2024. There was 1 interview round.
IAM role is used to grant permissions to entities, while IAM group is used to group users with similar permissions.
IAM role is used to delegate permissions to entities like EC2 instances or Lambda functions
IAM group is used to group users with similar permissions for easier management
IAM role can be assumed by trusted entities, while IAM group is used for managing user permissions
I applied via Recruitment Consulltant and was interviewed before May 2023. There was 1 interview round.
Ingress controls the external access to services in a cluster, while service defines a set of pods and how they can be accessed.
Ingress manages external access to services in a cluster
Service defines a set of pods and how they can be accessed
Ingress can provide load balancing, SSL termination, and routing based on hostnames or paths
Service can be of type ClusterIP, NodePort, LoadBalancer, or ExternalName
I appeared for an interview in Sep 2019.
What people are saying about Infosys
I applied via Recruitment Consultant
I applied via Naukri.com and was interviewed in Jan 2021. There were 3 interview rounds.
Both EC2 and ELB are termed 'elastic' due to their ability to scale resources dynamically based on demand.
EC2 instances can be launched or terminated automatically based on traffic, allowing for flexible resource management.
Elastic Load Balancing distributes incoming application traffic across multiple targets, ensuring high availability and fault tolerance.
For example, during peak traffic, EC2 can scale up by adding m...
Explanation of NACL, Security Groups, Docker Swarm, and Jenkins installation process.
NACL is a stateless firewall that controls inbound and outbound traffic at the subnet level.
Security Groups are stateful firewalls that control inbound and outbound traffic at the instance level.
Docker Swarm is a container orchestration tool that manages a cluster of Docker hosts.
Jenkins can be installed on a server using a package man...
I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.
Error encountered during pod creation can be due to various reasons such as incorrect configuration, resource constraints, network issues, or image availability.
Check the pod configuration file for any syntax errors or misconfigurations
Ensure that there are enough resources available on the cluster for pod creation
Verify network connectivity and DNS resolution within the cluster
Check if the container image specified in...
based on 3 interview experiences
Difficulty level
Duration
based on 18 reviews
Rating in categories
Hyderabad / Secunderabad,
Chennai
+13-8 Yrs
Not Disclosed
Technology Analyst
55.1k
salaries
| ₹4.8 L/yr - ₹10 L/yr |
Senior Systems Engineer
54.4k
salaries
| ₹2.5 L/yr - ₹6.3 L/yr |
Technical Lead
35.4k
salaries
| ₹9.5 L/yr - ₹16.5 L/yr |
System Engineer
32.6k
salaries
| ₹2.4 L/yr - ₹6 L/yr |
Senior Associate Consultant
32.4k
salaries
| ₹8.3 L/yr - ₹15 L/yr |
TCS
Wipro
Cognizant
Accenture