Skip to content

Commit e56bf57

Browse files
author
abregman
committed
Add questions on ArgoCD
As well as on other topics.
1 parent 3d12921 commit e56bf57

File tree

7 files changed

+245
-48
lines changed

7 files changed

+245
-48
lines changed

README.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,7 @@
7878
</tr>
7979
<tr>
8080
<td align="center"><a href="topics/kafka/README.md"><img src="images/logos/kafka.png" width="70px;" height="80px;" alt="Kafka"/><br /><b>Kafka</b></a></td>
81+
<td align="center"><a href="topics/argo/README.md"><img src="images/logos/argo.png" width="80px;" height="80px;" alt="Argo"/><br /><b>Argo</b></a></td>
8182
</tr>
8283
</table>
8384
</center>
@@ -5548,6 +5549,23 @@ A configuration->deployment which has some advantages like:
55485549
2. More immutable infrastructure - with configuration->deployment it's not likely to have very different deployments since most of the configuration is done prior to the deployment. Issues like dependencies errors are handled/discovered prior to deployment in this model.
55495550
</b></details>
55505551

5552+
## Release
5553+
5554+
<details>
5555+
<summary>Explain Semantic Versioning</summary><br><b>
5556+
5557+
[This](https://semver.org/) page explains it perfectly:
5558+
5559+
```
5560+
Given a version number MAJOR.MINOR.PATCH, increment the:
5561+
5562+
MAJOR version when you make incompatible API changes
5563+
MINOR version when you add functionality in a backwards compatible manner
5564+
PATCH version when you make backwards compatible bug fixes
5565+
Additional labels for pre-release and build metadata are available as extensions to the MAJOR.MINOR.PATCH format.
5566+
```
5567+
</b></details>
5568+
55515569
## Certificates
55525570

55535571
If you are looking for a way to prepare for a certain exam this is the section for you. Here you'll find a list of certificates, each references to a separate file with focused questions that will help you to prepare to the exam. Good luck :)

images/logos/argo.png

85.5 KB
Loading

topics/argo/README.md

Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
# Argo
2+
3+
## ArgoCD Exercises
4+
5+
TODO
6+
7+
## Argo Questions
8+
9+
### ArgoCD 101
10+
11+
<details>
12+
<summary>What is Argo CD?</summary><br><b>
13+
14+
[ArgoCD](https://argo-cd.readthedocs.io/en/stable): "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes."
15+
16+
As to why Argo CD, they provide the following explanation: "Application definitions, configurations, and environments should be declarative and version controlled. Application deployment and lifecycle management should be automated, auditable, and easy to understand."
17+
18+
</b></details>
19+
20+
<details>
21+
<summary>There been a lot of CI/CD systems before ArgoCD (Jenkins, Teamcity, CircleCI, etc.) What added value ArgoCD brought?</summary><br><b>
22+
23+
Simply said, ArgoCD is running on Kubernetes, it's part of its ecosystem, as opposed to some other CI/CD systems.
24+
25+
Easier to explain the need for ArgoCD by direct comparison to another CI/CD system. Let's use Jenkins for this.
26+
27+
With Jenkins, you need make sure to install k8s related tools and set access for commands like kubectl.
28+
With ArgoCD you simply need to install it in your namespace but no need to install additional tools as it's part of k8s.
29+
30+
With Jenkins, managing access is usually done per pipeline and even if set globally in Jenkins, you still need to configure each pipeline to use that access configuration.
31+
With ArgoCD access management to k8s and other resources is given as it runs already on the cluster, in one or multiple namespaces.
32+
33+
With Jenkins, tracking the status of what got deployed to k8s can be done only as an extra step, by running the pipeline. This is because Jenkins isn't part of the k8s cluster.
34+
With ArgoCD you get much better tracking and visibility of what gets deployed as it runs in the same cluster and the same namespace.
35+
36+
With ArgoCD it's really easy to roll back to a previous version because all the changes done, are done to git which is a versioned source control. So it's enough to get to a previous commit for ArgoCD to detect a change and sync to the cluster. Worth to mention, this point specifically is true for Jenkins as well :)
37+
</b></details>
38+
39+
<details>
40+
<summary>Describe an example of workflow where ArgoCD is used</summary><br><b>
41+
42+
1. A developer submitted change to an application repository
43+
2. Jenkins pipeline is triggered to run CI on the change
44+
3. If the Jenkins Pipeline completed successfully, build an image out of the new code
45+
4. Push to image to a registry
46+
5. Update K8S manifest file(s) in a separate app config repository
47+
6. ArgoCD tracks changes in the app config repository. Since there was a change in the repository, it will apply the changes from the repo
48+
7.
49+
</b></details>
50+
51+
<details>
52+
<summary>True or False? ArgoCD support Kubernetes YAML files but not other manifests formats like Helm Charts and Kustomize</summary><br><b>
53+
54+
False. It supports Kubernetes YAML files as well as Helm Charts and Kustomize.
55+
56+
</b></details>
57+
58+
<details>
59+
<summary>What "GitOps Repository" means in regards to ArgoCD?</summary><br><b>
60+
61+
It's the repository that holds app configuration, the one updated most of the time by CI/CD processes or DevOps, SRE engineers. In regards to ArgoCD it's the repository ArgoCD tracks for changes and apply them when they are detected.
62+
63+
</b></details>
64+
65+
<details>
66+
<summary>What are the advantages in using GitOps approach/repository?</summary><br><b>
67+
68+
* Your whole configuration is one place, defined as code so it's completely transparent, adjustable for changes and easily reproducible
69+
* Everyone go through the same interface hence you have more people experiencing and testing the code, even if not intentionally
70+
* Engineers can use it for testing, development, ... there is no more running manual commands and hoping to reach the same status as in the cluster/cloud.
71+
*
72+
</b></details>
73+
74+
<details>
75+
<summary>What are the advantages in using GitOps approach/repository?</summary><br><b>
76+
77+
* Your whole configuration is one place, defined as code so it's completely transparent, adjustable for changes and easily reproducible
78+
* Everyone go through the same interface hence you have more people experiencing and testing the code, even if not intentionally
79+
* Engineers can use it for testing, development, ... there is no more running manual commands and hoping to reach the same status as in the cluster/cloud.
80+
* Single source of truth: you know that your GitOps is the repo from which changes can be done to the cluster. So even if someone tries to manually override it, it won't work.
81+
</b></details>
82+
83+
<details>
84+
<summary>Sorina, one of the engineers in your team, made manual changes to the cluster that override some of the configuration in a repo traced by ArgoCD. What will happen?</summary><br><b>
85+
86+
Once Sorina made the modifications, ArgoCD will detect the state diverged and will sync the changes from the GitOps repository, overwriting the manual changes done by Sorina.
87+
88+
</b></details>
89+
90+
<details>
91+
<summary>Nate, one of the engineers in your organization, asked whether it's possible if ArgoCD didn't sync for changes done manually to the cluster. What would be your answer?</summary><br><b>
92+
93+
The answer is yes, it's possible. You can configure ArgoCD to sync to desired state when changes done manually and instead do something like sending alerts.
94+
95+
</b></details>
96+
97+
<details>
98+
<summary>How cluster disaster recovery becomes easier with ArgoCD?</summary><br><b>
99+
100+
Imagine you have a cluster in the cloud, in one of the regions. Something happens to that cluster and it's either crashes or simply no longer opertional.
101+
102+
If you have all your cluster configuration in a GitOps repository, ArgoCD can be pointed to that repository while be configured to use a new cluster you've set up and apply that configuration so your cluster is again up and running with the same status as o
103+
</b></details>
104+
105+
106+
### Access Control
107+
108+
<details>
109+
<summary>What is Argo CD?</code></summary><br><b>
110+
111+
[ArgoCD](https://argo-cd.readthedocs.io/en/stable): "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes."
112+
113+
As to why Argo CD, they provide the following explanation: "Application definitions, configurations, and environments should be declarative and version controlled. Application deployment and lifecycle management should be automated, auditable, and easy to understand."
114+
115+
</b></details>

topics/containers/README.md

Lines changed: 28 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,32 +1,30 @@
11
# Containers
22

3-
## Exercises - Index
4-
5-
* [Running Containers](#exercises-running-containers)
6-
* [Images](#exercises-containers-images)
7-
* [Misc](#exercises-containers-misc)
8-
9-
## Questions - Index
10-
11-
* [Containers 101](#questions-containers-101)
12-
* [Common Commands](#questions-common-commands)
13-
* [Images](#questions-containers-images)
14-
* [Tags](#questions-containers-images-tags)
15-
* [Registry](#questions-containers-images-registry)
16-
* [Storage](#questions-containers-storage)
17-
* [Containerfile](#questions-containerfile)
18-
* [Architecture](#questions-architecture)
19-
* [Docker Architecture](#questions-docker-architecture)
20-
* [Docker Compose](#questions-docker-compose)
21-
* [Networking](#questions-networking)
22-
* [Docker Networking](#questions-docker-networking)
23-
* [Security](#questions-security)
24-
* [Docker In Production](#questions-docker-in-production)
25-
* [Rootless Containers](#questions-rootless-containers)
26-
* [OCI](#questions-oci)
27-
* [Scenarios](#questions-scenarios)
28-
29-
## Containers Exercises
3+
- [Containers](#containers)
4+
- [Exercises](#exercises)
5+
- [Running Containers](#running-containers)
6+
- [Images](#images)
7+
- [Misc](#misc)
8+
- [Questions](#questions)
9+
- [Containers 101](#containers-101)
10+
- [Commands Commands](#commands-commands)
11+
- [Images](#images-1)
12+
- [Registry](#registry)
13+
- [Tags](#tags)
14+
- [Containerfile](#containerfile)
15+
- [Storage](#storage)
16+
- [Architecture](#architecture)
17+
- [Docker Architecture](#docker-architecture)
18+
- [Docker Compose](#docker-compose)
19+
- [Networking](#networking)
20+
- [Docker Networking](#docker-networking)
21+
- [Security](#security)
22+
- [Docker in Production](#docker-in-production)
23+
- [OCI](#oci)
24+
- [Scenarios](#scenarios)
25+
26+
27+
## Exercises
3028

3129
<a name="exercises-running-containers"></a>
3230
### Running Containers
@@ -514,8 +512,7 @@ True. For mounted files you can use `podman inspec CONTAINER_NAMD/ID`
514512
Registry
515513
</b></details>
516514

517-
<a name="questions-containers-images-registry"></a>
518-
#### Images - Registry
515+
#### Registry
519516

520517
<details>
521518
<summary>What is a Registry?</summary><br><b>
@@ -582,8 +579,7 @@ You can specify a specific registry: `podman push IMAGE REGISTRY_ADDRESS`
582579
2. Using `podman commit` on a running container after making changes to it
583580
</b></details>
584581

585-
<a name="questions-containers-images-tags"></a>
586-
#### Images - Tags
582+
#### Tags
587583

588584
<details>
589585
<summary>What are image tags? Why is it recommended to use tags when supporting multiple releases/versions of a project?</summary><br><b>
@@ -613,7 +609,7 @@ False. You can run `podman rmi IMAGE:TAG`.
613609
True.
614610
</b></details>
615611

616-
### Containerfile
612+
#### Containerfile
617613

618614
<details>
619615
<summary>What is a Containerfile/Dockerfile?</summary><br><b>
@@ -660,8 +656,6 @@ It specifies the base layer of the image to be used. Every other instruction is
660656

661657
COPY takes in a source and destination. It lets you copy in a file or directory from the build context into the Docker image itself.<br>
662658
ADD lets you do the same, but it also supports two other sources. You can use a URL instead of a file or directory from the build context. In addition, you can extract a tar file from the source directly into the destination.
663-
664-
Although ADD and COPY are functionally similar, generally speaking, COPY is preferred. That’s because it’s more transparent than ADD. COPY only supports the basic copying of files from build context into the container, while ADD has some features (like local-only tar extraction and remote URL support) that are not immediately obvious.
665659
</b></details>
666660

667661
<details>

topics/devops/README.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -433,6 +433,7 @@ Read more [here](https://about.gitlab.com/topics/gitops)
433433

434434
* It introduces limited/granular access to infrastructure
435435
* It makes it easier to trace who makes changes to infrastructure
436+
436437
</b></details>
437438

438439
<details>
@@ -442,6 +443,14 @@ Read more [here](https://about.gitlab.com/topics/gitops)
442443
* Apply review/approval process for changes
443444
</b></details>
444445

446+
<details>
447+
<summary>Two engineers in your team argue on where to put the configuration and infra related files of a certain application. One of them suggests to put it in the same repo as the application repository and the other one suggests to put to put it in its own separate repository. What's your take on that?</summary><br><b>
448+
449+
One might say we need more details as to what these configuration and infra files look like exactly and how complex the application and its CI/CD pipeline(s), but in general, most of the time you will want to put configuration and infra related files in their own separate repository and not in the repository of the application for multiple reasons:
450+
451+
* Every change submitted to the configuration, shouldn't trigger the CI/CD of the application, it should be testing out and applying the modified configuration
452+
</b></details>
453+
445454
#### SRE
446455

447456
<details>

0 commit comments

Comments
 (0)