Question
stringlengths 72
390
| Answer
stringlengths 9
15
|
---|---|
Which of these features does Cilium provide?
**Select all answers that apply.**
- a. Network policy enforcement
- b. Visibility into traffic at L3/L4 and L7
- c. Networking between Kubernetes pods
- d. Kubernetes secrets management | Answer: a, b, c |
What is the name of the Cilium component that provides visibility into network traffic?
- a. Hubble
- b. Hobble
- c. Grafana | Answer: a |
Which of these are characteristics of eBPF?
- a. It allows dynamic changes to the kernel
- b. It can be used to drop network packets that are forbidden by the network policy
- c. It enables high-performance networking with security and observability built-in | Answer: d |
What are the different tools for installing Cilium components into a Kubernetes cluster?
**Select all that apply.**
- a. Helm
- b. The Cilium CLI
- c. Curl | Answer: a, b |
A Cilium agent runs on every node in a Kubernetes cluster.
**True/False**
- a. True
- b. False | Answer: a |
How many instances of the Hubble Relay run on each cluster?
- a. One per node
- b. One per pod
- c. One per cluster | Answer: c |
What is the Cilium CLI command for checking that connectivity and policy enforcement is working correctly?
- a. kubectl connectivity test
- b. cilium connectivity test
- c. cilium policy test | Answer: b |
Which network policy resource type does Cilium support?
- a. Standard Kubernetes NetworkPolicy
- b. CiliumNetworkPolicy
- c. CiliumClusterNetworkPolicy
- d. All of the above | Answer: d |
It’s possible to export Layer 3 network policy using the networkpolicy.io’s visual policy editor as CiliumNetworkPolicy YAML files.
**True/False**
- a. True
- b. False | Answer: a |
Which of the following is a true statement?
**Select all that apply.**
- a. The CiliumNetworkPolicy resource supports service name-based egress policy for internal cluster communications
- b. The standard Kubernetes NetworkPolicy resource supports L7 HTTP protocol rules limiting access to specific HTTP paths
- c. The CiliumNetworkPolicy resource supports both TCP and ICMP egress policy | Answer: a |
Hubble flows include packet dumps.
**True/False**
- a. True
- b. False | Answer: b |
You can filter by packet verdict in the Hubble UI service map.
**True/False**
- a. True
- b. False | Answer: a |
Which of the following statements are **TRUE**?
**Select all that apply.**
- a. The Hubble Relay service provides cluster-wide network observability
- b. It's not possible to filter flows by namespace using the Hubble CLI tool
- c. Hubble flows include information about traffic direction
- d. Hubble is optional and needs to be enabled when installing Cilium | Answer: a, c, d |
After Istio is installed on a Kubernetes cluster, any workloads deployed to service mesh are automatically accompanied with sidecars.
**True/False**
a. True
b. False | Answer: b. |
How is outbound traffic from a service routed to the sidecar?
- a. Programmers must revise their code to specifically target the proxy at localhost:15000.
- b. iptables rules within a Pod are applied to transparently effect this change.
- c. Operators must use the istioctl rewire-pod command to transparently effect this change. | Answer: b. |
What identity framework does Istio base its application of workload identity?
- a. Security Assertion Markup Language (SAML)
- b. Open ID Connect (OIDC)
- c. Secure Production Identity Framework for Everyone (SPIFFE)
- d. JSON Web Tokens (JWT) | Answer: c. |
The Istio framework offers the choice between manually configuring Envoy sidecars and letting the Istio control plane manage Envoy.
**True/False**
- a. True
- b. False | Answer: b. |
The _demo_ configuration profile installs only the Istio control plane and the ingress gateway.
**True/False**
- a. True
- b. False | Answer: b. |
Helm installation consists of the following Helm charts:
- a. base, istiod, gateway
- b. istiod, ingress-gateway, egress-gateway
- c. istiod, gateways
- d. base, control-plane, gateway | Answer: a. |
In which section of the IstioOperator resource can we configure Kubernetes resource limits and requests:
- a. global
- b. meshConfig
- c. components
- d. We cannot configure limits and requests. | Answer: c. |
Observability is a concept that is broader than traditional monitoring.
**True/False**
- a. True
- b. False | Answer: a. |
What are the three main components of modern observability?
- a. Graphs, charts, and metrics
- b. Logs, metrics, and traces
- c. Logs, Garbage collection, and Threads | Answer: b. |
With Istio, developers must expose their metrics to Prometheus directly from inside their applications.
**True/False**
- a. True
- b. False | Answer: b. |
Envoy sidecars can initiate and propagate B3 trace headers without any assistance from the running applications.
**True/False**
- a. True
- b. False | Answer: b. |
Istio, Prometheus, Grafana, Jaeger, and Kiali are all open source projects.
**True/False**
- a. True
- b. False | Answer: a. |
The ingress and egress gateways in Istio are single instances of an Envoy proxy.
**True/False**
- a. True
- b. False | Answer: a. |
In which resource can we configure outlier detection and load balancer settings?
- a. VirtualService
- b. DestinationRule
- c. Gateway
- d. ServiceEntry | Answer: b. |
The traffic can be matched on multiple properties and to match the values, we can only use regular expressions.
**True/False**
- a. True
- b. False | Answer: b. |
When Envoy retries a failed request, the endpoint that caused the retry is no longer in the load balancing pool.
**True/False**
- a. True
- b. False | Answer: a. |
Authorization is all about the principal.
**True/False**
- a. True
- b. False | Answer: b. |
Which one of the following resources can we use to configure mTLS for inbound traffic?
- a. PeerAuthentication
- b. DestinationRule
- c. VirtualService
- d. AuthorizationPolicy | Answer: a. |
What do Kubernetes pods use as their identity during runtime?
- a. Kubernetes secrets
- b. Service accounts
- c. JWT tokens
- d. Bearer tokens | Answer: b. |
The clusters section in the Envoy configuration defines how the traffic is sent to the upstream service.
**True/False**
- a. True
- b. False | Answer: a. |
Where in the Envoy configuration is the router filter defined?
- a. Within the HTTP connection manager filter
- b. Within the routes
- c. Within the listener filter
- d. Within the clusters | Answer: a. |
We can apply the Envoy configuration patch only at the namespace level.
**True/False**
- a. True
- b. False | Answer: b. |
When using the **oci://** scheme in the WasmPlugin resource, the Istio agent downloads compiled Wasm plugins from an OCI-compliant registry.
**True/False**
- a. True
- b. False | Answer: a. |
By default, Istio watches all workloads in all namespaces and updates sidecar proxy configuration whenever new workloads are added, removed, or updated.
**True/False**
- a. True
- b. False | Answer: a. |
Which Istio resource can be used to provide the details about the namespace, labels, and service account to the VM workload?
- a. WorkloadEntry
- b. VirtualService
- c. ServiceEntry
- d. ServiceEntry | Answer: a. |
The primary cluster in the multi-cluster deployment scenario runs the control plane.
**True/False**
- a. True
- b. False | Answer: a. |
What is the east-west gateway used for?
- a. Service communication within a single Kubernetes cluster
- b. Communication between Istio control plane and services within one cluster
- c. Communication between workloads in the cluster and VMs
- d. Communication between workloads in the cluster and VMs, VM sidecars, and Istio’s control plane | Answer: d. |
The process of deploying an Envoy proxy alongside each workload is called:
- a. proxy bundling
- b. sidecar injection
- c. sidecar bundling
- d. proxy injection | Answer: d. |
license: mit language: - en
Q&A Dataset for Benchmarking DeepCNCF
This is a question-and-answer dataset using multiple-choice questions created for benchmarking our DeepCNCF LLM. Since there is no reliable LLM benchmark specified for CNCF projects we decided to use it to measure the performance of our model based on its performance on these questions. This dataset was gathered from openly available online courses about CNCF projects. So they are created by humans to measure students' understanding from these projects and could be a good measure to test knowledge of our model about CNCF topics.
Description
It includes the following two columns:
- Question: Multiple choice questions..
- Answer: The corresponding answer to the question. Could have several correct answer(for example: a,b,d)
License
This dataset is available under the MIT license.
Links
- Downloads last month
- 34