In our previous interview-related question we talked about VPC design, logging system design, monitoring system design, page fault, etc. In this article, we are going to talk about how to calculate how many usage IPs are there in a /24 CIDR. What is a CIDR? CIDR stands for classless inter-domain routing. This is a set
Category: Networking
The math behind public-key cryptography which is also used in SSH.
There is a very basic tool that everyone uses that works with servers and infrastructure. It is ssh, ssh uses both symmetric and public-key cryptography to keep the data safe in transit. In this article, we are going to talk about the math behind public-key cryptography. Public-key cryptography depends on the prime numbers and large
What is a service mesh? Is it born with Kubernetes?
Hi, in our recent few articles we are talking about basic Kubernetes and we talked about how Kube proxy works, what is a control plane, what is an etcd, and what are node components of Kubernetes. If you missed the articles you can find them below. In this article, we are going to look into
What is Optimistic Concurrency? How does is it help to scale the Kubernetes cluster?
In this blog post, we will know how does optimistic concurrency helps Kubernetes to scale and accommodate more and more plugins into it. We will also try to give you certain examples in order for us to understand them better. Brief about Kubernetes. Kubernetes is an orchestration tool which helps us to orchestrate different application
The two extremes of scalability and what you have to consider while using them.
Scaling is the term everyone must have heard of if you are working in the IT industry. So what exactly is scaling, we are not going to discuss scaling in-depth instead we will see the very basics of scaling and the two extremes of scalability. What is scalability? Scalability is the property of the system
What are a honeypot server and its uses?
Every one of you must be aware of the term hacking and on the web, domain hackers have to make malicious requests to take down the servers. There are many kinds of attacks that they try to perform and these honeypot servers are ways to analyze their attack patterns. What is a honeypot server? Honeypot
What should you learn in DevOps and SRE for long term prospect?
I get a lot of questions regarding what should one learn to progress in a career or start a career in this domain. In this article we will talk about what you should learn for a long-term perspective in this field. Linux Yes, this is very important and is still evolving. Keeping a good grip
DevOps Interview Questions: How will you design your cloud VPC and subnets?
In this article, we are going to look into this question. The intent of this question is to find out if you are aware of how you can design your network infra. They want to hear from you about private traffic, public traffic, how the traffic will go out, etc. Let’s start and have a
Points to mind while debugging production issues.
It’s always hectic to debug production issues and it is always wise to have a predefined step to debug any issues. But there can be scenarios where those steps may not work. In those scenarios also you should always have a flow in mind what to check. In this article, we are going to see
Do you know about the AIMD method in TCP congestion control?
In this article, we are going to talk about a very well known method to keep things under control. This method is used in TCP when you see there are congestion and many other places. This method is called AIMD which stands for Additive Increase Multiplicative Decrease. Let’s see what it is and how it