A Kubernetes node is allocated a /26 CIDR block (64 unique IPs) for its
address space.
If every pod on this node has exactly two containers in it, how many pods can
this address space support on this node?
During development of an application meant to be orchestrated by Kubernetes, you want to mount the /data directory on your laptop into a container.
Will this strategy successfully accomplish this?
Solution: Create a PersistentVolume with storageciass: "" and hostPath: /data, and a persistentVolumeClaim requesting this PV. Then use that PVC to populate a volume in a pod
Is this the purpose of Docker Content Trust?
Solution: Enable mutual TLS between the Docker client and server.
Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume, assuming there are no limitations on the amount and type of available external storage?
Solution: A volume is defined in a pod specification with the key persistentVolume: default.
You want to create a container that is reachable from its host's network. Does this action accomplish this?
Solution:Use either EXPOSE or --publish to access the containers on the bridge network
A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster.
Can this be used to schedule containers to meet the security policy requirements?
Solution: label contraints
Is this statement correct?
Solution.A Dockerfile stores persistent data between deployments of a container
Can this set of commands identify the published port(s) for a container?
Solution. ‘docker port inspect", docker container inspect"
Will this command list all nodes in a swarm cluster from the command line?
Solution. ‘docker inspect nodes
You configure a local Docker engine to enforce content trust by setting the environment variable
DOCKER_CONTENT_TRUST=1.
If myorg/myimage: 1.0 is unsigned, does Docker block this command?
Solution: docker image import