Skip to main content

Mock Exam

Updated Dec 29, 2023 ·

Some of the scenario questions here are based on Kodekloud's CKA course labs.

NOTE

CKAD and CKA can have similar scenario questions. It is recommended to go through the CKAD practice tests.

Shortcuts

First run the two commands below for shortcuts.

export do="--dry-run=client -o yaml" 
export now="--force --grace-period=0"

Questions

  1. Upgrade the current version of kubernetes from 1.26.0 to 1.27.0 exactly using the kubeadm utility. Make sure that the upgrade is carried out one node at a time starting with the controlplane node. To minimize downtime, the deployment gold-nginx should be rescheduled on an alternate node before upgrading each node.

    Upgrade controlplane node first and drain node node01 before upgrading it. Pods for gold-nginx should run on the controlplane node subsequently.

    Answer

    Start with the controlplane first.

    controlplane ~ ➜  k get no
    NAME STATUS ROLES AGE VERSION
    controlplane Ready control-plane 30m v1.26.0
    node01 Ready <none> 29m v1.26.0

    controlplane ~ ➜ k drain controlplane --ignore-daemonsets
    node/controlplane cordoned
    Warning: ignoring DaemonSet-managed Pods: kube-system/kube-proxy-9q57t, kube-system/weave-net-txlpl
    evicting pod kube-system/coredns-787d4945fb-qdt8z
    evicting pod kube-system/coredns-787d4945fb-c4qz4
    pod/coredns-787d4945fb-c4qz4 evicted
    pod/coredns-787d4945fb-qdt8z evicted
    node/controlplane drained

    controlplane ~ ➜ k get no
    NAME STATUS ROLES AGE VERSION
    controlplane Ready,SchedulingDisabled control-plane 30m v1.26.0
    node01 Ready <none> 30m v1.26.0

    controlplane ~ ➜ k get po -o wide
    NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES
    gold-nginx-6c5b9dd56c-4sgh9 1/1 Running 0 3m10s 10.244.192.1 node01 <none> <none>
    apt update
    apt-cache madison kubeadm

    apt-mark unhold kubelet kubectl && \
    apt-get update && apt-get install -y \
    kubeadm=1.27.0-00 \
    kubelet=1.27.0-00 \
    kubectl=1.27.0-00 \
    apt-mark hold kubelet kubectl
    controlplane ~ ➜  kubeadm version
    kubeadm version: &version.Info{Major:"1", Minor:"27", GitVersion:"v1.27.0", GitCommit:"1b4df30b3cdfeaba6024e81e559a6cd09a089d65", GitTreeState:"clean", BuildDate:"2023-04-11T17:09:06Z", GoVersion:"go1.20.3", Compiler:"gc", Platform:"linux/amd64"}

    controlplane ~ ➜ kubectl version
    WARNING: This version information is deprecated and will be replaced with the output from kubectl version --short. Use --output=yaml|json to get the full version.
    Client Version: version.Info{Major:"1", Minor:"27", GitVersion:"v1.27.0", GitCommit:"1b4df30b3cdfeaba6024e81e559a6cd09a089d65", GitTreeState:"clean", BuildDate:"2023-04-11T17:10:18Z", GoVersion:"go1.20.3", Compiler:"gc", Platform:"linux/amd64"}
    Kustomize Version: v5.0.1
    kubeadm upgrade plan
    kubeadm upgrade apply v1.27.0

    sudo systemctl daemon-reload
    sudo systemctl restart kubelet
    controlplane ~ ➜  k uncordon controlplane 
    node/controlplane uncordoned

    controlplane ~ ➜ k get no
    NAME STATUS ROLES AGE VERSION
    controlplane Ready control-plane 38m v1.27.0
    node01 Ready <none> 37m v1.26.0

    controlplane ~ ➜ k get po -o wide
    NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES
    gold-nginx-6c5b9dd56c-4sgh9 1/1 Running 0 10m 10.244.192.1 node01 <none> <none>

    Before going to node01, drain it first.

    controlplane ~ ➜  k get no
    NAME STATUS ROLES AGE VERSION
    controlplane Ready control-plane 39m v1.27.0
    node01 Ready <none> 38m v1.26.0

    controlplane ~ ➜ k drain node01 --ignore-daemonsets
    node/node01 cordoned
    Warning: ignoring DaemonSet-managed Pods: kube-system/kube-proxy-d5t6j, kube-system/weave-net-kwhpv
    evicting pod kube-system/coredns-5d78c9869d-pzbkb
    evicting pod admin2406/deploy2-7b6d9445df-tgp74
    evicting pod admin2406/deploy3-66785bc8f5-22nv7
    evicting pod default/gold-nginx-6c5b9dd56c-4sgh9
    evicting pod admin2406/deploy1-5d88679d77-nvbfc
    evicting pod admin2406/deploy5-7cbf794564-t66r2
    evicting pod kube-system/coredns-5d78c9869d-844r9
    evicting pod admin2406/deploy4-55554b4b4c-zkz7p
    pod/deploy5-7cbf794564-t66r2 evicted
    I0104 05:34:38.455763 17683 request.go:696] Waited for 1.05165341s due to client-side throttling, not priority and fairness, request: GET:https://controlplane:6443/api/v1/namespaces/admin2406/pods/deploy1-5d88679d77-nvbfc
    pod/deploy1-5d88679d77-nvbfc evicted
    pod/deploy4-55554b4b4c-zkz7p evicted
    pod/deploy3-66785bc8f5-22nv7 evicted
    pod/gold-nginx-6c5b9dd56c-4sgh9 evicted
    pod/deploy2-7b6d9445df-tgp74 evicted
    pod/coredns-5d78c9869d-844r9 evicted
    pod/coredns-5d78c9869d-pzbkb evicted
    node/node01 drained

    controlplane ~ ➜ k get no
    NAME STATUS ROLES AGE VERSION
    controlplane Ready control-plane 39m v1.27.0
    node01 Ready,SchedulingDisabled <none> 39m v1.26.0

    Now run the same commands in node-01.

    ssh node01

    apt update
    apt-cache madison kubeadm

    apt-mark unhold kubelet kubectl && \
    apt-get update && apt-get install -y \
    kubeadm=1.27.0-00 \
    kubelet=1.27.0-00 \
    kubectl=1.27.0-00 \
    apt-mark hold kubelet kubectl

    kubeadm version
    kubectl version

    kubeadm upgrade plan
    sudo kubeadm upgrade apply v1.27.0

    sudo systemctl daemon-reload
    sudo systemctl restart kubelet
    root@node01 ~ ✦ ✖ kubeadm version
    kubeadm version: &version.Info{Major:"1", Minor:"27", GitVersion:"v1.27.0", GitCommit:"1b4df30b3cdfeaba6024e81e559a6cd09a089d65", GitTreeState:"clean", BuildDate:"2023-04-11T17:09:06Z", GoVersion:"go1.20.3", Compiler:"gc", Platform:"linux/amd64"}

    root@node01 ~ ✦ ➜ kubectl version
    WARNING: This version information is deprecated and will be replaced with the output from kubectl version --short. Use --output=yaml|json to get the full version.
    Client Version: version.Info{Major:"1", Minor:"27", GitVersion:"v1.27.0", GitCommit:"1b4df30b3cdfeaba6024e81e559a6cd09a089d65", GitTreeState:"clean", BuildDate:"2023-04-11T17:10:18Z", GoVersion:"go1.20.3", Compiler:"gc", Platform:"linux/amd64"}

    Now before we uncordon the node01, we must first make sure that the pod is running on controlplane, as instructed.

    controlplane ~ ✦2 ✖ k get po
    NAME READY STATUS RESTARTS AGE
    gold-nginx-6c5b9dd56c-xjc6c 0/1 Pending 0 3m30s

    controlplane ~ ✦2 ➜ k describe po gold-nginx-6c5b9dd56c-xjc6c | grep -i events -A 5
    Events:
    Type Reason Age From Message
    ---- ------ ---- ---- -------
    Warning FailedScheduling 4m59s default-scheduler 0/2 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/control-plane: }, 1 node(s) were unschedulable. preemption: 0/2 nodes are available: 2 Preemption is not helpful for scheduling.

    controlplane ~ ✦2 ➜ k describe nodes controlplane | grep -i taint
    Taints: node-role.kubernetes.io/control-plane:NoSchedule

    To allow scheduling of pods controlplane, we need to remove the taint on the controlplane.

    controlplane ~ ✦2 ✖ k describe nodes controlplane | grep -i taint
    Taints: node-role.kubernetes.io/control-plane:NoSchedule

    controlplane ~ ✦2 ➜ k taint no controlplane node-role.kubernetes.io/control-plane:NoSchedule-
    node/controlplane untainted

    controlplane ~ ✦2 ➜ k describe nodes controlplane | grep -i taint
    Taints: <none>

    controlplane ~ ✦2 ➜ k get po
    NAME READY STATUS RESTARTS AGE
    gold-nginx-6c5b9dd56c-xjc6c 0/1 ContainerCreating 0 7m10s

    controlplane ~ ✦2 ➜ k get po
    NAME READY STATUS RESTARTS AGE
    gold-nginx-6c5b9dd56c-xjc6c 1/1 Running 0 7m13s

    controlplane ~ ✦2 ➜ k get po -o wide
    NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES
    gold-nginx-6c5b9dd56c-xjc6c 1/1 Running 0 7m17s 10.244.0.4 controlplane <none> <none>

    We can now uncordon node01.

    controlplane ~ ✦2 ➜  k get no
    NAME STATUS ROLES AGE VERSION
    controlplane Ready control-plane 56m v1.27.0
    node01 Ready,SchedulingDisabled <none> 55m v1.27.0

    controlplane ~ ✦2 ➜ k uncordon node01
    node/node01 uncordoned

    controlplane ~ ✦2 ➜ k get no
    NAME STATUS ROLES AGE VERSION
    controlplane Ready control-plane 56m v1.27.0
    node01 Ready <none> 55m v1.27.0

    controlplane ~ ✦2 ➜ k get po -o wide
    NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES
    gold-nginx-6c5b9dd56c-xjc6c 1/1 Running 0 7m44s 10.244.0.4 controlplane <none> <none>
  2. Print the names of all deployments in the admin2406 namespace in the following format:

    DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE

    The data should be sorted by the increasing order of the deployment name.

    Answer
    controlplane ~ ✦2 ➜  k get ns
    NAME STATUS AGE
    admin1401 Active 28m
    admin2406 Active 28m
    alpha Active 28m
    default Active 57m
    kube-node-lease Active 57m
    kube-public Active 57m
    kube-system Active 57m

    controlplane ~ ✦2 ➜ k get deployments.apps -n admin2406
    NAME READY UP-TO-DATE AVAILABLE AGE
    deploy1 1/1 1 1 29m
    deploy2 1/1 1 1 29m
    deploy3 1/1 1 1 29m
    deploy4 1/1 1 1 29m
    deploy5 1/1 1 1 29m

    Use custom columns to specify the headers.

    controlplane ~ ✦2 ➜  k get -n admin2406 deployments.apps -o custom-columns="DEPLOYMENT:a,CONTAINER_IMAGE:b,READY_REPLICAS:c,NAMESPACE:d" 
    DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE
    <none> <none> <none> <none>
    <none> <none> <none> <none>
    <none> <none> <none> <none>
    <none> <none> <none> <none>
    <none> <none> <none> <none>

    Now that we got the format, we just need to supply the values. Let's use one sample first.

    controlplane ~ ✦2 ➜  k get deployments.apps -n admin2406 deploy1 
    NAME READY UP-TO-DATE AVAILABLE AGE
    deploy1 1/1 1 1 35m

    controlplane ~ ✦2 ➜ k get deployments.apps -n admin2406
    NAME READY UP-TO-DATE AVAILABLE AGE
    deploy1 1/1 1 1 35m
    deploy2 1/1 1 1 35m
    deploy3 1/1 1 1 35m
    deploy4 1/1 1 1 35m
    deploy5 1/1 1 1 35m

    controlplane ~ ✦2 ➜ k get deployments.apps -n admin2406 deploy1
    NAME READY UP-TO-DATE AVAILABLE AGE
    deploy1 1/1 1 1 35m

    Determine the values that is needed and use dot notation.

    controlplane ~ ✦2 ➜  k get deployments.apps -n admin2406 deploy1 -o json
    {
    "apiVersion": "apps/v1",
    "kind": "Deployment",
    "metadata": {
    "annotations": {
    "deployment.kubernetes.io/revision": "1"
    },
    "creationTimestamp": "2024-01-04T10:23:24Z",
    "generation": 1,
    "labels": {
    "app": "deploy1"
    },
    "name": "deploy1",
    "namespace": "admin2406",
    "resourceVersion": "6133",
    "uid": "0c04a727-afbd-4242-9a9f-abc45879367b"
    },
    "spec": {
    "progressDeadlineSeconds": 600,
    "replicas": 1,
    "revisionHistoryLimit": 10,
    "selector": {
    "matchLabels": {
    "app": "deploy1"
    }
    },
    "strategy": {
    "rollingUpdate": {
    "maxSurge": "25%",
    "maxUnavailable": "25%"
    },
    "type": "RollingUpdate"
    },
    "template": {
    "metadata": {
    "creationTimestamp": null,
    "labels": {
    "app": "deploy1"
    }
    },
    "spec": {
    "containers": [
    {
    "image": "nginx",
    "imagePullPolicy": "Always",
    "name": "nginx",

    Start with first column:

    Deployment names = {.metadata.name}  
    controlplane ~ ✦2 ➜  k get -n admin2406 deployments.apps -o custom-columns="DEPLOYMENT:{.metadata.name},CONTAINER_IMAGE:b,READY_REPLICAS:c,NAMESPACE:d" 
    DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE
    deploy1 <none> <none> <none>
    deploy2 <none> <none> <none>
    deploy3 <none> <none> <none>
    deploy4 <none> <none> <none>
    deploy5 <none> <none> <none>

    Now the container image.

    {.spec.template.spec.containers[0].image}
    controlplane ~ ✦2 ➜  k get -n admin2406 deployments.apps -o custom-columns="DEPLOYMENT:{.metadata.name},CONTAINER_IMAGE:{.spec.template.spec.containers[0].image},READY_REPLICAS:c,NAMESPACE:d" 
    DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE
    deploy1 nginx <none> <none>
    deploy2 nginx:alpine <none> <none>
    deploy3 nginx:1.16 <none> <none>
    deploy4 nginx:1.17 <none> <none>
    deploy5 nginx:latest <none> <none>

    Now the ready replicas.

    {.status.readyReplicas}
    controlplane ~ ✦2 ➜  k get -n admin2406 deployments.apps -o custom-columns="DEPLOYMENT:{.metadata.name},CONTAINER_IMAGE:{.spec.template.spec.containers[0].image},READY_REPLICAS:{.status.readyReplicas},NAMESPACE:d" 
    DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE
    deploy1 nginx 1 <none>
    deploy2 nginx:alpine 1 <none>
    deploy3 nginx:1.16 1 <none>
    deploy4 nginx:1.17 1 <none>
    deploy5 nginx:latest 1 <none>

    Finally, the namespace.

    {.metadata.namespace}
    controlplane ~ ✦2 ➜  k get -n admin2406 deployments.apps -o custom-columns="DEPLOYMENT:{.metadata.name},CONTAINER_IMAGE:{.spec.template.spec.containers[0].image},READY_REPLICAS:{.status.readyReplicas},NAMESPACE:{.metadata.namespace}" 
    DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE
    deploy1 nginx 1 admin2406
    deploy2 nginx:alpine 1 admin2406
    deploy3 nginx:1.16 1 admin2406
    deploy4 nginx:1.17 1 admin2406
    deploy5 nginx:latest 1 admin2406

    Now sort it by deployment name.

    controlplane ~ ➜  kubectl -n admin2406 get deployment -o custom-columns=DEPLOYMENT:.metadata.name,CONTAINER_IMAGE:.spec.template.spec.containers[].image,READY_REPLICAS:.status.readyReplicas,NAMESPACE:.metadata.namespace --sort-by=.metadata.name
    DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE
    deploy1 nginx 1 admin2406
    deploy2 nginx:alpine 1 admin2406
    deploy3 nginx:1.16 1 admin2406
    deploy4 nginx:1.17 1 admin2406
    deploy5 nginx:latest 1 admin2406

    Finally, forward it to the specified file.

    kubectl -n admin2406 get deployment -o custom-columns=DEPLOYMENT:.metadata.name,CONTAINER_IMAGE:.spec.template.spec.containers[].image,READY_REPLICAS:.status.readyReplicas,NAMESPACE:.metadata.namespace --sort-by=.metadata.name > /opt/admin2406_data
    controlplane ~ ➜  ls -la /opt/admin2406_data 
    -rw-r--r-- 1 root root 348 Jan 4 06:57 /opt/admin2406_data

    controlplane ~ ➜ cat /opt/admin2406_data
    DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE
    deploy1 nginx 1 admin2406
    deploy2 nginx:alpine 1 admin2406
    deploy3 nginx:1.16 1 admin2406
    deploy4 nginx:1.17 1 admin2406
    deploy5 nginx:latest 1 admin2406
  3. A kubeconfig file called admin.kubeconfig has been created in /root/CKA. There is something wrong with the configuration. Troubleshoot and fix it.

    Answer

    Make sure the port for the kube-apiserver is correct. So for this change port from 4380 to 6443.

    Run the below command to know the cluster information:

    controlplane ~ ➜  kubectl cluster-info --kubeconfig /root/CKA/admin.kubeconfig
    E0104 07:00:03.980973 11082 memcache.go:238] couldn't get current server API group list: Get "https://controlplane:4380/api?timeout=32s": dial tcp 192.26.250.9:4380: connect: connection refused
    E0104 07:00:03.981343 11082 memcache.go:238] couldn't get current server API group list: Get "https://controlplane:4380/api?timeout=32s": dial tcp 192.26.250.9:4380: connect: connection refused
    E0104 07:00:03.982790 11082 memcache.go:238] couldn't get current server API group list: Get "https://controlplane:4380/api?timeout=32s": dial tcp 192.26.250.9:4380: connect: connection refused
    E0104 07:00:03.984160 11082 memcache.go:238] couldn't get current server API group list: Get "https://controlplane:4380/api?timeout=32s": dial tcp 192.26.250.9:4380: connect: connection refused
    E0104 07:00:03.985582 11082 memcache.go:238] couldn't get current server API group list: Get "https://controlplane:4380/api?timeout=32s": dial tcp 192.26.250.9:4380: connect: connection refused

    To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'.
    The connection to the server controlplane:4380 was refused - did you specify the right host or port?
    vi /root/CKA/admin.kubeconfig 
    server: https://controlplane:6443
    controlplane ~ ➜  kubectl cluster-info --kubeconfig /root/CKA/admin.kubeconfig
    Kubernetes control plane is running at https://controlplane:6443
    CoreDNS is running at https://controlplane:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy

    To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'.
  4. Create a new deployment called nginx-deploy, with image nginx:1.16 and 1 replica. Next upgrade the deployment to version 1.17 using rolling update.

    Answer
    controlplane ~ ✦2 ➜  k create deployment nginx-deploy --image nginx:1.16 --replicas 1
    deployment.apps/nginx-deploy created

    controlplane ~ ✦2 ➜ k get deployments.apps
    NAME READY UP-TO-DATE AVAILABLE AGE
    gold-nginx 1/1 1 1 44m
    nginx-deploy 1/1 1 1 5s
    controlplane ~ ➜  k set image deploy nginx-deploy nginx=nginx:1.17
    deployment.apps/nginx-deploy image updated

    controlplane ~ ➜ k rollout status deployment nginx-deploy
    deployment "nginx-deploy" successfully rolled out
    controlplane ~ ✦2 ➜  k get deployments.apps 
    NAME READY UP-TO-DATE AVAILABLE AGE
    gold-nginx 1/1 1 1 45m
    nginx-deploy 1/1 1 1 56s

    controlplane ~ ✦2 ➜ k describe deployments.apps nginx-deploy | grep -i image
    Image: nginx:1.17
  5. A new deployment called alpha-mysql has been deployed in the alpha namespace. However, the pods are not running. Troubleshoot and fix the issue. The deployment should make use of the persistent volume alpha-pv to be mounted at /var/lib/mysql and should use the environment variable MYSQL_ALLOW_EMPTY_PASSWORD=1 to make use of an empty root password.

    Answer
    controlplane ~ ✖ k get all -n alpha 
    NAME READY STATUS RESTARTS AGE
    pod/alpha-mysql-5b7b8988c4-r8ls8 0/1 Pending 0 8m8s

    NAME READY UP-TO-DATE AVAILABLE AGE
    deployment.apps/alpha-mysql 0/1 1 0 8m8s

    NAME DESIRED CURRENT READY AGE
    replicaset.apps/alpha-mysql-5b7b8988c4 1 1 0 8m8s

    controlplane ~ ➜ k describe deployments.apps -n alpha alpha-mysql
    Name: alpha-mysql
    Namespace: alpha
    CreationTimestamp: Thu, 04 Jan 2024 06:52:44 -0500
    Labels: app=alpha-mysql
    Annotations: deployment.kubernetes.io/revision: 1
    Selector: app=alpha-mysql
    Replicas: 1 desired | 1 updated | 1 total | 0 available | 1 unavailable
    StrategyType: RollingUpdate
    MinReadySeconds: 0
    RollingUpdateStrategy: 25% max unavailable, 25% max surge
    Pod Template:
    Labels: app=alpha-mysql
    Containers:
    mysql:
    Image: mysql:5.6
    Port: 3306/TCP
    Host Port: 0/TCP
    Environment:
    MYSQL_ALLOW_EMPTY_PASSWORD: 1
    Mounts:
    /var/lib/mysql from mysql-data (rw)
    Volumes:
    mysql-data:
    Type: PersistentVolumeClaim (a reference to a PersistentVolumeClaim in the same namespace)
    ClaimName: mysql-alpha-pvc
    ReadOnly: false
    Conditions:
    Type Status Reason
    ---- ------ ------
    Available False MinimumReplicasUnavailable
    Progressing True ReplicaSetUpdated
    OldReplicaSets: <none>
    NewReplicaSet: alpha-mysql-5b7b8988c4 (1/1 replicas created)
    Events:
    Type Reason Age From Message
    ---- ------ ---- ---- -------
    Normal ScalingReplicaSet 8m19s deployment-controller Scaled up replica set alpha-mysql-5b7b8988c4 to 1

    Look closely at:

    Volumes:
    mysql-data:
    Type: PersistentVolumeClaim (a reference to a PersistentVolumeClaim in the same namespace)
    ClaimName: mysql-alpha-pvc
    ReadOnly: false

    However, there's no PVC with that name.

    controlplane ~ ➜  k get pvc -n alpha 
    NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE
    alpha-claim Pending slow-storage 9m1s

    Create the PVC.

    ## pvc.yml 
    ---
    apiVersion: v1
    kind: PersistentVolumeClaim
    metadata:
    name: mysql-alpha-pvc
    namespace: alpha
    spec:
    accessModes:
    - ReadWriteOnce
    resources:
    requests:
    storage: 1Gi
    storageClassName: slow

    controlplane ~ ➜  k apply -f pvc.yml 
    persistentvolumeclaim/mysql-alpha-pvc created

    controlplane ~ ➜ k get -n alpha pvc
    NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE
    alpha-claim Pending slow-storage 10m
    mysql-alpha-pvc Bound alpha-pv 1Gi RWO slow 11s

    controlplane ~ ➜ k get -n alpha po
    NAME READY STATUS RESTARTS AGE
    alpha-mysql-5b7b8988c4-r8ls8 1/1 Running 0 10m

    controlplane ~ ➜ k get -n alpha deployments.apps
    NAME READY UP-TO-DATE AVAILABLE AGE
    alpha-mysql 1/1 1 1 10m
  6. Take the backup of ETCD at the location /opt/etcd-backup.db on the controlplane node.

    Answer
    controlplane ~ ✦2 ➜  k describe -n kube-system po kube-apiserver-controlplane | grep -i ca
    Priority Class Name: system-node-critical
    Image ID: registry.k8s.io/kube-apiserver@sha256:89b8d9dbef2b905b7d028ca8b7f79d35ebd9baa66b0a3ee2ddd4f3e0e2804b45
    --client-ca-file=/etc/kubernetes/pki/ca.crt

    controlplane ~ ✦2 ➜ k describe -n kube-system po kube-apiserver-controlplane | grep -i server.crt
    --tls-cert-file=/etc/kubernetes/pki/apiserver.crt

    controlplane ~ ✦2 ➜ k describe -n kube-system po kube-apiserver-controlplane | grep -i .key
    --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key
    --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key
    --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key
    --service-account-key-file=/etc/kubernetes/pki/sa.pub
    --service-account-signing-key-file=/etc/kubernetes/pki/sa.key
    --tls-private-key-file=/etc/kubernetes/pki/apiserver.key
    export ETCDCTL_API=3 
    etcdctl \
    --endpoints=127.0.0.1:2379 \
    --cacert=/etc/kubernetes/pki/etcd/ca.crt \
    --cert=/etc/kubernetes/pki/etcd/server.crt \
    --key=/etc/kubernetes/pki/etcd/server.key \
    snapshot save /opt/etcd-backup.db
    controlplane ~ ➜  ls -la /opt/etcd-backup.db 
    -rw-r--r-- 1 root root 2134048 Jan 4 07:05 /opt/etcd-backup.db
  7. Create a pod called secret-1401 in the admin1401 namespace using the busybox image. The container within the pod should be called secret-admin and should sleep for 4800 seconds.

    The container should mount a read-only secret volume called secret-volume at the path /etc/secret-volume. The secret being mounted has already been created for you and is called dotfile-secret.

    Answer
    k run secret-1401 -n admin1401 --image=busybox --dry-run=client -oyaml --command -- sleep 4800 > admin.yaml
    ---
    apiVersion: v1
    kind: Pod
    metadata:
    creationTimestamp: null
    name: secret-1401
    namespace: admin1401
    labels:
    run: secret-1401
    spec:
    volumes:
    - name: secret-volume
    # secret volume
    secret:
    secretName: dotfile-secret
    containers:
    - command:
    - sleep
    - "4800"
    image: busybox
    name: secret-admin
    # volumes' mount path
    volumeMounts:
    - name: secret-volume
    readOnly: true
    mountPath: "/etc/secret-volume"
    controlplane ~ ➜  k get po -n admin1401 
    NAME READY STATUS RESTARTS AGE
    secret-1401 1/1 Running 0 27s
  8. Expose the hr-web-app as service hr-web-app-service application on port 30082 on the nodes on the cluster. The web application listens on port 8080.

    • Name: hr-web-app-service

    • Type: NodePort

    • Endpoints: 2

    • Port: 8080

    • NodePort: 30082

    Answer
    controlplane ~ ✦ ➜  k get po
    NAME READY STATUS RESTARTS AGE
    hr-web-app-57cd7b5799-vzmsz 1/1 Running 0 9m2s
    hr-web-app-57cd7b5799-wqshb 1/1 Running 0 9m2s
    messaging 1/1 Running 0 11m
    nginx-pod 1/1 Running 0 11m
    orange 1/1 Running 0 3m23s
    static-busybox 1/1 Running 0 5m52s

    controlplane ~ ✦ ➜ k get deployments.apps
    NAME READY UP-TO-DATE AVAILABLE AGE
    hr-web-app 2/2 2 2 9m4s

    controlplane ~ ✦ ➜ kubectl expose deployment hr-web-app --type=NodePort --port=8080 --name=hr-web-app-service --dry-run=client -o yaml > hr-web-app-service.yaml

    Modify the YAML file and add the nodeport section:

    ### hr-web-app-service.yaml
    apiVersion: v1
    kind: Service
    metadata:
    creationTimestamp: null
    labels:
    app: hr-web-app
    name: hr-web-app-service
    spec:
    ports:
    - port: 8080
    protocol: TCP
    targetPort: 8080
    nodePort: 30082
    selector:
    app: hr-web-app
    type: NodePort
    status:
    loadBalancer: {}
    controlplane ~ ➜  k get svc
    NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
    hr-web-app-service NodePort 10.106.44.228 <none> 8080:30082/TCP 23s
    kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 128m
    messaging-service ClusterIP 10.100.177.203 <none> 6379/TCP 30m
  9. Create a static pod named static-busybox on the controlplane node that uses the busybox image and the command sleep 1000.

    Answer
    kubectl run --restart=Never --image=busybox static-busybox --dry-run=client -oyaml --command -- sleep 1000 > /etc/kubernetes/manifests/static-busybox.yaml
    controlplane ~ ➜  ls -la /etc/kubernetes/manifests/static-busybox.yaml 
    -rw-r--r-- 1 root root 298 Jan 4 08:12 /etc/kubernetes/manifests/static-busybox.yaml

    controlplane ~ ➜ k get po
    NAME READY STATUS RESTARTS AGE
    hr-web-app-57cd7b5799-vzmsz 1/1 Running 0 26m
    hr-web-app-57cd7b5799-wqshb 1/1 Running 0 26m
    messaging 1/1 Running 0 28m
    nginx-pod 1/1 Running 0 28m
    orange 1/1 Running 0 20m
    static-busybox 1/1 Running 0 23m
  10. Create a Persistent Volume with the given specification: -

    • Volume name: pv-analytics

    • Storage: 100Mi

    • Access mode: ReadWriteMany

    • Host path: /pv/data-analytics

    Answer
    ## pv.yml 
    apiVersion: v1
    kind: PersistentVolume
    metadata:
    name: pv-analytics
    spec:
    capacity:
    storage: 100Mi
    accessModes:
    - ReadWriteMany
    hostPath:
    path: /pv/data-analytics
    controlplane ~ ➜  k apply -f pv.yml 
    persistentvolume/pv-analytics created

    controlplane ~ ➜ k get pv
    NAME CAPACITY ACCESS MODES RECLAIM POLICY STATUS CLAIM STORAGECLASS REASON AGE
    pv-analytics 100Mi RWX Retain Available
  11. Use JSON PATH query to retrieve the osImages of all the nodes and store it in a file /opt/outputs/nodes_os_x43kj56.txt.

    The osImages are under the nodeInfo section under status of each node.

    Answer
    controlplane ~ ➜  k get no -o jsonpath='{.items[*].status.nodeInfo}'
    {"architecture":"amd64","bootID":"1ededf94-06c6-443e-b30a-58a8637de4ad","containerRuntimeVersion":"containerd://1.6.6","kernelVersion":"5.4.0-1106-gcp","kubeProxyVersion":"v1.27.0","kubeletVersion":"v1.27.0","machineID":"73d7539cb95c4ef09a8ddd274b5251bc","operatingSystem":"linux","osImage":"Ubuntu 20.04.6 LTS","systemUUID":"f27b8c4f-18b7-2007-fc27-ce8e34bfff92"}
    controlplane ~ ➜

    controlplane ~ ➜ k get no -o jsonpath='{.items[*].status.nodeInfo.osImage}'
    Ubuntu 20.04.6 LTS
    controlplane ~ ➜

    controlplane ~ ➜ kubectl get nodes -o jsonpath='{.items[*].status.nodeInfo.osImage}' > /opt/outputs/nodes_os_x43kj56.txt

    controlplane ~ ➜

    controlplane ~ ➜ ls -l /opt/outputs/
    total 20
    -rw-r--r-- 1 root root 18 Jan 4 08:19 nodes_os_x43kj56.txt
    -rw-r--r-- 1 root root 12296 Jan 4 07:45 nodes-z3444kd9.json

    controlplane ~ ➜ cat /opt/outputs/nodes_os_x43kj56.txt
    Ubuntu 20.04.6 LTS
  12. Create a new pod called super-user-pod with image busybox:1.28. Allow the pod to be able to set system_time. Pod should sleep for 4800 seconds.

    Answer
    ## super.yml
    apiVersion: v1
    kind: Pod
    metadata:
    creationTimestamp: null
    labels:
    run: super-user-pod
    name: super-user-pod
    spec:
    containers:
    - image: busybox:1.28
    name: super-user-pod
    command: ["sh","-c","sleep 4800"]
    securityContext:
    capabilities:
    add: ["SYS_TIME"]
    resources: {}
    dnsPolicy: ClusterFirst
    restartPolicy: Always
    status: {}
    controlplane ~ ➜  k apply -f super.yml 
    pod/super-user-pod created

    controlplane ~ ➜ k get po
    NAME READY STATUS RESTARTS AGE
    nginx-critical 1/1 Running 0 6m28s
    nginx-deploy-5c95467974-d27mz 1/1 Running 0 12m
    redis-storage 1/1 Running 0 28m
    super-user-pod 1/1 Running 0 3s
  13. A pod definition file is created at /root/CKA/use-pv.yaml. Make use of this manifest file and mount the persistent volume called pv-1. Ensure the pod is running and the PV is bound.

    • mountPath: /data

    • persistentVolumeClaim Name: my-pvc

    This is the given pod YAML file.

    ## /root/CKA/use-pv.yaml
    apiVersion: v1
    kind: Pod
    metadata:
    creationTimestamp: null
    labels:
    run: use-pv
    name: use-pv
    spec:
    containers:
    - image: nginx
    name: use-pv
    resources: {}
    dnsPolicy: ClusterFirst
    restartPolicy: Always
    status: {}
    Answer

    Check the PV.

    controlplane ~ ➜  k get pv
    NAME CAPACITY ACCESS MODES RECLAIM POLICY STATUS CLAIM STORAGECLASS REASON AGE
    pv-1 10Mi RWO Retain Available 18s

    controlplane ~ ➜ k get pvc
    No resources found in default namespace.
    controlplane ~/CKA ➜  k get pv pv-1 -o yaml
    apiVersion: v1
    kind: PersistentVolume
    metadata:
    creationTimestamp: "2024-01-05T04:30:26Z"
    finalizers:
    - kubernetes.io/pv-protection
    name: pv-1
    resourceVersion: "3753"
    uid: ad7d65b3-a7d4-4596-bf05-d12d23f4eeba
    spec:
    accessModes:
    - ReadWriteOnce
    capacity:
    storage: 10Mi
    hostPath:
    path: /opt/data
    type: ""
    persistentVolumeReclaimPolicy: Retain
    volumeMode: Filesystem
    status:
    phase: Available

    Create the PVC yaml file.

    controlplane ~ ➜  cd CKA

    controlplane ~/CKA ➜ ls -l
    total 4
    -rw-r--r-- 1 root root 235 Jan 5 00:10 use-pv.yaml
    ## pvc.yml
    apiVersion: v1
    kind: PersistentVolumeClaim
    metadata:
    name: my-pvc
    spec:
    accessModes:
    - ReadWriteOnce
    resources:
    requests:
    storage: 10Mi
    controlplane ~/CKA ➜  k apply -f  pvc.yml 
    persistentvolumeclaim/my-pvc created

    controlplane ~/CKA ➜ k get pvc
    NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE
    my-pvc Bound pv-1 10Mi RWO 8s

    controlplane ~/CKA ➜ k get pv
    NAME CAPACITY ACCESS MODES RECLAIM POLICY STATUS CLAIM STORAGECLASS REASON AGE
    pv-1 10Mi RWO Retain Bound default/my-pvc 2m18s

    Modify the pod YAML.

    ## use-pv.yml 
    apiVersion: v1
    kind: Pod
    metadata:
    creationTimestamp: null
    labels:
    run: use-pv
    name: use-pv
    spec:
    containers:
    - image: nginx
    name: use-pv
    resources: {}
    volumeMounts:
    - mountPath: "/data"
    name: vol
    volumes:
    - name: vol
    persistentVolumeClaim:
    claimName: my-pvc
    dnsPolicy: ClusterFirst
    restartPolicy: Always
    status: {}
    controlplane ~/CKA ➜  k apply -f use-pv.yaml 
    pod/use-pv created

    controlplane ~/CKA ➜ k get po
    NAME READY STATUS RESTARTS AGE
    redis-storage 1/1 Running 0 6m39s
    super-user-pod 1/1 Running 0 3m39s
    use-pv 1/1 Running 0 25s

    controlplane ~/CKA ➜ k describe pod use-pv | grep Volumes: -A 5
    Volumes:
    vol:
    Type: PersistentVolumeClaim (a reference to a PersistentVolumeClaim in the same namespace)
    ClaimName: my-pvc
    ReadOnly: false
  14. Create a new user called john. Grant him access to the cluster. John should have permission to create, list, get, update and delete pods in the development namespace . The private key exists in the location: /root/CKA/john.key and csr at /root/CKA/john.csr.

    Important Note: As of kubernetes 1.19, the CertificateSigningRequest object expects a signerName.

    • CSR: john-developer Status:Approved

    • Role Name: developer, namespace: development, Resource: Pods

    • Access: User 'john' has appropriate permissions

    Answer

    Follow steps here: https://kubernetes.io/docs/reference/access-authn-authz/certificate-signing-requests/

    controlplane ~ ➜  mkdir user-john

    controlplane ~ ➜ cd user-john/

    controlplane ~/user-john ➜ openssl genrsa -out john.key 2048
    Generating RSA private key, 2048 bit long modulus (2 primes)
    ...+++++
    ..........+++++
    e is 65537 (0x010001)

    controlplane ~/user-john ➜ openssl req -new -key john.key -out john.csr -subj "/CN=john"

    controlplane ~/user-john ➜ ls -l
    total 8
    -rw-r--r-- 1 root root 883 Jan 5 00:28 john.csr
    -rw------- 1 root root 1675 Jan 5 00:27 john.key
    controlplane ~/user-john ➜  cat john.csr | base64 | tr -d "\n"
    LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQ1ZEQ0NBVHdDQVFBd0R6RU5NQXNHQTFVRUF3d0VhbTlvYmpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRApnZ0VQQURDQ0FRb0NnZ0VCQU9sVUVhMFVoK09lVks3TT

    Create the CSR yaml file.

    ## john-csr.yml 
    ---
    apiVersion: certificates.k8s.io/v1
    kind: CertificateSigningRequest
    metadata:
    name: john-developer
    spec:
    signerName: kubernetes.io/kube-apiserver-client
    request: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQ1ZEQ0NBVHdDQVFBd0R6RU5NQXNHQTFVRUF3d0VhbTlvYmpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRApnZ0VQQURDQ0FRb0NnZ0VCQU9sVUVhMFVoK09lVk
    usages:
    - digital signature
    - key encipherment
    - client auth
    controlplane ~/user-john ➜  k apply -f john-csr.yml 
    certificatesigningrequest.certificates.k8s.io/john-developer created

    controlplane ~/user-john ➜ k get csr
    NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION
    csr-pd24m 25m kubernetes.io/kube-apiserver-client-kubelet system:node:controlplane <none> Approved,Issued
    csr-qsk2x 24m kubernetes.io/kube-apiserver-client-kubelet system:bootstrap:k93sdz <none> Approved,Issued
    john-developer 6s kubernetes.io/kube-apiserver-client kubernetes-admin <none> Pending

    controlplane ~/user-john ➜ kubectl certificate approve john-developer
    certificatesigningrequest.certificates.k8s.io/john-developer approved

    controlplane ~/user-john ➜ k get csr
    NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION
    csr-pd24m 25m kubernetes.io/kube-apiserver-client-kubelet system:node:controlplane <none> Approved,Issued
    csr-qsk2x 25m kubernetes.io/kube-apiserver-client-kubelet system:bootstrap:k93sdz <none> Approved,Issued
    john-developer 47s kubernetes.io/kube-apiserver-client kubernetes-admin <none> Approved,Issued

    Next, create the role and rolebinding.

    ## dev-role.yml 
    apiVersion: rbac.authorization.k8s.io/v1
    kind: Role
    metadata:
    namespace: development
    name: developer
    rules:
    - apiGroups: [""] # "" indicates the core API group
    resources: ["pods"]
    verbs: ["create","get","update","delete","list"]
    ## dev-rolebinding.yml 
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
    name: developer-role-binding
    namespace: development
    subjects:
    - kind: User
    apiGroup: rbac.authorization.k8s.io
    roleRef:
    kind: Role #this must be Role or ClusterRole
    name: developer # this must match the name of the Role or ClusterRole you wish to bind to
    apiGroup: rbac.authorization.k8s.io
    controlplane ~/user-john ➜  k apply -f  dev-role.yml 
    role.rbac.authorization.k8s.io/developer created

    controlplane ~/user-john ➜ k apply -f dev-rolebinding.yml
    rolebinding.rbac.authorization.k8s.io/developer-role-binding created

    controlplane ~/user-john ✖ k get -n development role | grep dev
    developer 2024-01-05T05:47:57Z

    controlplane ~/user-john ➜ k get -n development rolebindings.rbac.authorization.k8s.io | grep dev
    developer-role-binding Role/developer 21s

    To verify:

    controlplane ~/user-john ➜  kubectl auth can-i update pods --as=john -n development
    yes
  15. Create a nginx pod called nginx-resolver using image nginx, expose it internally with a service called nginx-resolver-service. Test that you are able to look up the service and pod names from within the cluster. Use the image: busybox:1.28 for dns lookup. Record results in /root/CKA/nginx.svc and /root/CKA/nginx.pod

    Answer
    controlplane ~/CKA ➜  k run nginx-resolver --image nginx
    pod/nginx-resolver created

    controlplane ~/CKA ✖ k get po
    NAME READY STATUS RESTARTS AGE
    nginx-deploy-5c95467974-7l68p 1/1 Running 0 102s
    nginx-resolver 1/1 Running 0 11s
    redis-storage 1/1 Running 0 12m
    super-user-pod 1/1 Running 0 9m57s
    use-pv 1/1 Running 0 6m43s

    Take note of the word "internally", this means that the port type is a ClusterIP.

    controlplane ~/user-john ➜  k expose pod nginx-resolver \
    --name nginx-resolver-service \
    --port 80 \
    --target-port 80 \
    --type=ClusterIP

    service/nginx-resolver-service exposed

    controlplane ~ ➜ k get svc
    NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
    kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 26m
    nginx-resolver-service ClusterIP 10.106.113.53 <none> 80/TCP 4s

    For testing, we'll create another pod.

    ontrolplane ~ ➜  k run pod-tester --image  busybox:1.28 --restart Never --rm -it -- nslookup nginx-resolver-service
    If you don't see a command prompt, try pressing enter.
    warning: couldn't attach to pod/pod-tester, falling back to streaming logs: unable to upgrade connection: container pod-tester not found in pod pod-tester_default
    Server: 10.96.0.10
    Address 1: 10.96.0.10 kube-dns.kube-system.svc.cluster.local

    Name: nginx-resolver-service
    Address 1: 10.106.113.53 nginx-resolver-service.default.svc.cluster.local
    pod "pod-tester" deleted

    controlplane ~ ➜ k run pod-tester --image busybox:1.28 --restart Never --rm -it -- nslookup nginx-resolver-service > /root/CKA/nginx.svc

    controlplane ~ ➜ ls -l /root/CKA/nginx.svc
    -rw-r--r-- 1 root root 217 Jan 5 01:00 /root/CKA/nginx.svc

    controlplane ~ ➜ cat /root/CKA/nginx.svc
    Server: 10.96.0.10
    Address 1: 10.96.0.10 kube-dns.kube-system.svc.cluster.local

    Name: nginx-resolver-service
    Address 1: 10.106.113.53 nginx-resolver-service.default.svc.cluster.local
    pod "pod-tester" deleted

    Try using the pod IP.

    controlplane ~ ➜  k get po nginx-resolver -o wide
    NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES
    nginx-resolver 1/1 Running 0 4m54s 10.244.192.1 node01 <none> <none>

    ontrolplane ~ ✦ ➜ k run pod-tester --image busybox:1.28 --restart Never --rm -it -- nslookup 10.244.192.1
    Server: 10.96.0.10
    Address 1: 10.96.0.10 kube-dns.kube-system.svc.cluster.local

    Name: 10.244.192.1
    Address 1: 10.244.192.1 10-244-192-1.nginx-resolver-service.default.svc.cluster.local
    pod "pod-tester" deleted

    controlplane ~ ✦ ➜ k run pod-tester --image busybox:1.28 --restart Never --rm -it -- nslookup 10.244.192.1 > /root/CKA/nginx.pod

    controlplane ~ ✦ ➜ ls -l /root/CKA/nginx.pod
    -rw-r--r-- 1 root root 219 Jan 5 01:02 /root/CKA/nginx.pod

    controlplane ~ ✦ ➜ cat /root/CKA/nginx.pod
    Server: 10.96.0.10
    Address 1: 10.96.0.10 kube-dns.kube-system.svc.cluster.local

    Name: 10.244.192.1
    Address 1: 10.244.192.1 10-244-192-1.nginx-resolver-service.default.svc.cluster.local
    pod "pod-tester" deleted
  16. Create a static pod on node01 called nginx-critical with image nginx and make sure that it is recreated/restarted automatically in case of a failure.

    Use /etc/kubernetes/manifests as the Static Pod path for example.

    Answer

    Read carefully again. The static pod needs to be created in node01, not in the controlplane. Generate the YAML first and copy it onto node01.

    controlplane ~ ➜ k run nginx-critical --image nginx -o yaml > nginx-critical.yml

    controlplane ~ ➜ scp nginx-critical.yml node01:/root
    nginx-critical.yml 100% 1577 2.1MB/s 00:00

    controlplane ~ ➜ ssh node01
    Last login: Fri Jan 5 01:06:59 2024 from 192.10.251.4

    root@node01 ~ ➜ ls -l
    total 4
    -rw-r--r-- 1 root root 1577 Jan 5 01:08 nginx-critical.yml

    Then create the required directory.

    root@node01 ~ ➜ mkdir -p /etc/kubernetes/manifests

    root@node01 ~ ➜ cp nginx-critical.yml /etc/kubernetes/manifests/

    root@node01 ~ ➜ ls -l /etc/kubernetes/manifests/
    total 4
    -rw-r--r-- 1 root root 1577 Jan 5 01:09 nginx-critical.yml

    Check the statisPdPath. It should be set to manifest directory.

    root@node01 ~ ➜  grep -i static /var/lib/kubelet/config.yaml 
    staticPodPath: /etc/kubernetes/manifests

    Back at controlplane:

    controlplane ~ ➜  k get po -o wide
    NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES
    nginx-critical 1/1 Running 0 7m21s 10.244.192.1 node01 <none> <none>
  17. Create a new service account with the name pvviewer. Grant this Service account access to list all PersistentVolumes in the cluster by creating an appropriate cluster role called pvviewer-role and ClusterRoleBinding called pvviewer-role-binding. Next, create a pod called pvviewer with the image: redis and serviceAccount: pvviewer in the default namespace.

    Answer
    controlplane ~ ➜  k create sa pvviewer --dry-run=client -o yaml > pvviewer.yml

    controlplane ~ ➜ ls -l
    total 8
    drwxr-xr-x 2 root root 4096 Jan 5 05:11 CKA
    -rw-r--r-- 1 root root 89 Jan 5 05:13 pvviewer.yml
    -rw-rw-rw- 1 root root 0 Dec 13 05:39 sample.yaml

    controlplane ~ ➜ cat pvviewer.yml
    apiVersion: v1
    kind: ServiceAccount
    metadata:
    creationTimestamp: null
    name: pvviewer
    controlplane ~ ➜  k create clusterrole pvviewer-role --verb list --resource="persistentvolumes" $do > pvviewer-role.yml

    controlplane ~ ➜ ls -l
    total 12
    drwxr-xr-x 2 root root 4096 Jan 5 05:11 CKA
    -rw-r--r-- 1 root root 197 Jan 5 05:15 pvviewer-role.yml
    -rw-r--r-- 1 root root 89 Jan 5 05:14 pvviewer.yml
    -rw-rw-rw- 1 root root 0 Dec 13 05:39 sample.yaml

    controlplane ~ ➜ cat pvviewer-role.yml
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
    creationTimestamp: null
    name: pvviewer-role
    rules:
    - apiGroups:
    - ""
    resources:
    - persistentvolumes
    verbs:
    - list
    controlplane ~ ➜  k create clusterrolebinding pvviewer-role-binding --clusterrole pvviewer-role --serviceaccount default:pvviewer $do > pvviewer-role-binding.yml

    controlplane ~ ➜ ls -l
    total 16
    drwxr-xr-x 2 root root 4096 Jan 5 05:11 CKA
    -rw-r--r-- 1 root root 292 Jan 5 05:17 pvviewer-role-binding.yml
    -rw-r--r-- 1 root root 197 Jan 5 05:15 pvviewer-role.yml
    -rw-r--r-- 1 root root 89 Jan 5 05:14 pvviewer.yml
    -rw-rw-rw- 1 root root 0 Dec 13 05:39 sample.yaml

    controlplane ~ ➜ cat pvviewer-role-binding.yml
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
    creationTimestamp: null
    name: pvviewer-role-binding
    roleRef:
    apiGroup: rbac.authorization.k8s.io
    kind: ClusterRole
    name: pvviewer-role
    subjects:
    - kind: ServiceAccount
    name: pvviewer
    namespace: default
    controlplane ~ ➜  k run pvviewer --image redis $do > pvviewer-pod.yml

    controlplane ~ ➜ ls -l
    total 20
    drwxr-xr-x 2 root root 4096 Jan 5 05:11 CKA
    -rw-r--r-- 1 root root 241 Jan 5 05:18 pvviewer-pod.yml
    -rw-r--r-- 1 root root 292 Jan 5 05:17 pvviewer-role-binding.yml
    -rw-r--r-- 1 root root 197 Jan 5 05:15 pvviewer-role.yml
    -rw-r--r-- 1 root root 89 Jan 5 05:14 pvviewer.yml
    -rw-rw-rw- 1 root root 0 Dec 13 05:39 sample.yaml

    Modify the pod YAML and add the service account.

    apiVersion: v1
    kind: Pod
    metadata:
    creationTimestamp: null
    labels:
    run: pvviewer
    name: pvviewer
    spec:
    serviceAccountName: pvviewer
    containers:
    - image: redis
    name: pvviewer
    resources: {}
    dnsPolicy: ClusterFirst
    restartPolicy: Always
    status: {}
    controlplane ~ ➜  ls -l
    total 20
    drwxr-xr-x 2 root root 4096 Jan 5 05:11 CKA
    -rw-r--r-- 1 root root 272 Jan 5 05:20 pvviewer-pod.yml
    -rw-r--r-- 1 root root 292 Jan 5 05:17 pvviewer-role-binding.yml
    -rw-r--r-- 1 root root 197 Jan 5 05:15 pvviewer-role.yml
    -rw-r--r-- 1 root root 89 Jan 5 05:14 pvviewer.yml
    -rw-rw-rw- 1 root root 0 Dec 13 05:39 sample.yaml

    controlplane ~ ➜ k apply -f .
    clusterrolebinding.rbac.authorization.k8s.io/pvviewer-role-binding created
    clusterrole.rbac.authorization.k8s.io/pvviewer-role created
    serviceaccount/pvviewer created
    pod/pvviewer created
    controlplane ~ ➜  k get clusterrole | grep pv
    pvviewer-role 2024-01-05T10:20:58Z
    system:controller:pv-protection-controller 2024-01-05T09:52:44Z
    system:controller:pvc-protection-controller 2024-01-05T09:52:44Z

    controlplane ~ ➜ k get clusterrole | grep pvv
    pvviewer-role 2024-01-05T10:20:58Z

    controlplane ~ ➜ k get clusterrolebinding | grep pvv
    pvviewer-role-binding ClusterRole/pvviewer-role 82s

    controlplane ~ ➜ k get sa | grep pvv
    pvviewer 0 90s

    controlplane ~ ➜ k get po
    NAME READY STATUS RESTARTS AGE
    pvviewer 1/1 Running 0 79s

    controlplane ~ ➜ k describe po pvviewer | grep -i service
    Service Account: pvviewer
  18. List the InternalIP of all nodes of the cluster. Save the result to a file /root/CKA/node_ips. Answer should be in the format:

    InternalIP of controlplane<space>InternalIP of node01 (in a single line)
    Answer
    controlplane ~ ➜  k get no
    NAME STATUS ROLES AGE VERSION
    controlplane Ready control-plane 32m v1.27.0
    node01 Ready <none> 32m v1.27.0

    controlplane ~ ➜ k get no -o jsonpath='{.items[*].status.addresses[*]}'
    {"address":"192.22.238.9","type":"InternalIP"} {"address":"controlplane","type":"Hostname"} {"address":"192.22.238.12","type":"InternalIP"} {"address":"node01","type":"Hostname"}
    controlplane ~ ➜

    controlplane ~ ➜ k get no -o jsonpath='{.items[*].status.addresses[0]}'
    {"address":"192.22.238.9","type":"InternalIP"} {"address":"192.22.238.12","type":"InternalIP"}
    controlplane ~ ➜

    controlplane ~ ➜ k get no -o jsonpath='{.items[*].status.addresses[0].address}'
    192.22.238.9 192.22.238.12
    controlplane ~ ➜

    controlplane ~ ➜ k get no -o jsonpath='{.items[*].status.addresses[0].address}' > /root/CKA/node_ips

    controlplane ~ ➜ ls -la /root/CKA/node_ips
    -rw-r--r-- 1 root root 26 Jan 5 06:11 /root/CKA/node_ips

    controlplane ~ ➜ cat /root/CKA/node_ips
    192.22.238.9 192.22.238.12
  19. Create a pod called multi-pod with two containers.

    • Container 1, name: alpha, image: nginx

    • Container 2: name: beta, image: busybox, command: sleep 4800

    Environment Variables:

    • container 1:

      • name: alpha
    • Container 2:

      • name: beta
    Answer
    controlplane ~ ➜  k run multi-pod --image nginx $do > multi-pod.yml

    controlplane ~ ➜ ls -l
    total 24
    drwxr-xr-x 2 root root 4096 Jan 5 06:11 CKA
    -rw-r--r-- 1 root root 244 Jan 5 06:14 multi-pod.yml

    Modify the pod YAML file.

    apiVersion: v1
    kind: Pod
    metadata:
    creationTimestamp: null
    labels:
    run: multi-pod
    name: multi-pod
    spec:
    containers:
    - image: busybox
    name: beta
    command: ["sh","-c","sleep 4800"]
    env:
    - name: NAME
    value: beta
    - image: nginx
    name: alpha
    env:
    - name: NAME
    value: alpha
    resources: {}
    dnsPolicy: ClusterFirst
    restartPolicy: Always
    status: {}
    controlplane ~ ➜  k apply -f multi-pod.yml 
    pod/multi-pod created

    controlplane ~ ➜ k get po
    NAME READY STATUS RESTARTS AGE
    multi-pod 2/2 Running 0 7s
    pvviewer 1/1 Running 0 10m
    controlplane ~ ➜  k describe po multi-pod | grep Containers -A 40
    Containers:
    beta:
    Container ID: containerd://c2c4de069fcc7ca32732708ea9865e72956fce2c1f25734a2ab3c30a045e064f
    Image: busybox
    Image ID: docker.io/library/busybox@sha256:ba76950ac9eaa407512c9d859cea48114eeff8a6f12ebaa5d32ce79d4a017dd8
    Port: <none>
    Host Port: <none>
    Command:
    sh
    -c
    sleep 4800
    State: Running
    Started: Fri, 05 Jan 2024 06:19:33 -0500
    Ready: True
    Restart Count: 0
    Environment:
    NAME: beta
    Mounts:
    /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-v87xr (ro)
    alpha:
    Container ID: containerd://5ed2a20d88c470c61e6a0766230c95e430b8847f4fcbdc1a12bb46e9d3d49c26
    Image: nginx
    Image ID: docker.io/library/nginx@sha256:2bdc49f2f8ae8d8dc50ed00f2ee56d00385c6f8bc8a8b320d0a294d9e3b49026
    Port: <none>
    Host Port: <none>
    State: Running
    Started: Fri, 05 Jan 2024 06:19:37 -0500
    Ready: True
    Restart Count: 0
    Environment:
    NAME: alpha
    Mounts:
    /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-v87xr (ro)
  20. Create a Pod called non-root-pod , image: redis:alpine

    • runAsUser: 1000

    • fsGroup: 2000

    Answer
    controlplane ~ ➜  k run non-root-pod --image redis:alpine $do > non-root-pod.yml
    apiVersion: v1
    kind: Pod
    metadata:
    creationTimestamp: null
    labels:
    run: non-root-pod
    name: non-root-pod
    spec:
    securityContext:
    runAsUser: 1000
    fsGroup: 2000
    containers:
    - image: redis:alpine
    name: non-root-pod
    resources: {}
    dnsPolicy: ClusterFirst
    restartPolicy: Always
    status: {}
    controlplane ~ ➜  k get po
    NAME READY STATUS RESTARTS AGE
    multi-pod 2/2 Running 0 3m16s
    non-root-pod 1/1 Running 0 6s
    pvviewer 1/1 Running 0 13m
  21. We have deployed a new pod called np-test-1 and a service called np-test-service. Incoming connections to this service are not working. Troubleshoot and fix it. Create NetworkPolicy, by the name ingress-to-nptest that allows incoming connections to the service over port 80.

    Answer
    controlplane ~ ➜  k get po
    NAME READY STATUS RESTARTS AGE
    multi-pod 2/2 Running 0 3m56s
    non-root-pod 1/1 Running 0 46s
    np-test-1 1/1 Running 0 21s
    pvviewer 1/1 Running 0 14m

    controlplane ~ ➜ k get svc
    NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
    kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 40m
    np-test-service ClusterIP 10.106.46.125 <none> 80/TCP 27s
    ## netpol.yml
    ---
    apiVersion: networking.k8s.io/v1
    kind: NetworkPolicy
    metadata:
    name: ingress-to-nptest
    namespace: default
    spec:
    podSelector:
    matchLabels:
    run: np-test-1
    policyTypes:
    - Ingress
    ingress:
    - ports:
    - protocol: TCP
    port: 80
    controlplane ~ ➜  k apply -f netpol.yml 
    networkpolicy.networking.k8s.io/ingress-to-nptest created

    controlplane ~ ➜ k get netpol
    NAME POD-SELECTOR AGE
    default-deny <none> 4m58s
    ingress-to-nptest <none> 8s

    Verify that the port the open by running a test pod which will telnet to the service via port 80.

    controlplane ~ ➜  k get po -o wide
    NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES
    multi-pod 2/2 Running 0 10m 10.244.192.2 node01 <none> <none>
    non-root-pod 1/1 Running 0 7m15s 10.244.192.3 node01 <none> <none>
    np-test-1 1/1 Running 0 6m50s 10.244.192.4 node01 <none> <none>
    pvviewer 1/1 Running 0 20m 10.244.192.1 node01 <none> <none>

    controlplane ~ ➜ k run test-pod --image busybox --rm -it -- telnet np-test-service 80
    If you don't see a command prompt, try pressing enter.
    Connected to np-test-service

    Session ended, resume using 'kubectl attach test-pod -c test-pod -i -t' command when the pod is running
    pod "test-pod" deleted

    controlplane ~ ➜ k run test-pod --image busybox --rm -it -- telnet 10.244.192.4 80
    If you don't see a command prompt, try pressing enter.
    Connected to 10.244.192.4
  22. Taint the worker node node01 to be Unschedulable. Once done, create a pod called dev-redis, image redis:alpine, to ensure workloads are not scheduled to this worker node. Finally, create a new pod called prod-redis and image: redis:alpine with toleration to be scheduled on node01.

    • key: env_type
    • value: production
    • operator: Equal and effect: NoSchedule
    Answer
    controlplane ~ ➜  k taint node controlplane env_type=production:NoSchedule-
    node/controlplane untainted

    controlplane ~ ➜ k taint node node01 env_type=production:NoSchedule
    node/node01 tainted

    controlplane ~ ➜ k describe no node01 | grep -i taint
    Taints: env_type=production:NoSchedule

    controlplane ~ ➜ k get po -o wide
    NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES
    multi-pod 2/2 Running 0 15m 10.244.192.2 node01 <none> <none>
    non-root-pod 1/1 Running 0 11m 10.244.192.3 node01 <none> <none>
    np-test-1 1/1 Running 0 11m 10.244.192.4 node01 <none> <none>
    pvviewer 1/1 Running 0 25m 10.244.192.1 node01 <none> <none>

    Create the dev-redis pod. It should not be scheduled on node01.

    controlplane ~ ➜  k run dev-redis --image redis:alpine
    pod/dev-redis created

    controlplane ~ ➜ k get po -o wide
    NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES
    dev-redis 0/1 ContainerCreating 0 2s <none> controlplane <none> <none>
    multi-pod 2/2 Running 0 15m 10.244.192.2 node01 <none> <none>
    non-root-pod 1/1 Running 0 12m 10.244.192.3 node01 <none> <none>
    np-test-1 1/1 Running 0 12m 10.244.192.4 node01 <none> <none>
    pvviewer 1/1 Running 0 26m 10.244.192.1 node01 <none> <none>

    Next, create the prod-redis with the specified tolerations. It should be schedules on node01.

    controlplane ~ ➜  k run prod-redis --image redis:alpine $do > prod-redis.yml
    ## prod-redis.yml
    apiVersion: v1
    kind: Pod
    metadata:
    creationTimestamp: null
    labels:
    run: prod-redis
    name: prod-redis
    spec:
    tolerations:
    - key: "env_type"
    operator: "Equal"
    value: "production"
    effect: "NoSchedule"
    containers:
    - image: redis:alpine
    name: prod-redis
    resources: {}
    dnsPolicy: ClusterFirst
    restartPolicy: Always
    status: {}
    controlplane ~ ➜  k apply -f prod-redis.yml 
    pod/prod-redis created

    controlplane ~ ➜ k get po -o wide
    NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES
    dev-redis 1/1 Running 0 5m6s 10.244.0.4 controlplane <none> <none>
    multi-pod 2/2 Running 0 21m 10.244.192.2 node01 <none> <none>
    non-root-pod 1/1 Running 0 17m 10.244.192.3 node01 <none> <none>
    np-test-1 1/1 Running 0 17m 10.244.192.4 node01 <none> <none>
    prod-redis 1/1 Running 0 6s 10.244.192.5 node01 <none> <none>
    pvviewer 1/1 Running 0 31m 10.244.192.1 node01 <none> <none>
  23. Create a pod called hr-pod in hr namespace belonging to the production environment and frontend tier .

    • image: redis:alpine

    Use appropriate labels and create all the required objects if it does not exist in the system already.

    Answer
    controlplane ~ ➜  k create ns hr
    namespace/hr created

    controlplane ~ ➜ k run hr-pod --image redis:alpine --namespace hr --labels "environment=production,tier=frontend" $do
    apiVersion: v1
    kind: Pod
    metadata:
    creationTimestamp: null
    labels:
    environment: production
    tier: frontend
    name: hr-pod
    namespace: hr
    spec:
    containers:
    - image: redis:alpine
    name: hr-pod
    resources: {}
    dnsPolicy: ClusterFirst
    restartPolicy: Always
    status: {}

    controlplane ~ ➜ k run hr-pod --image redis:alpine --namespace hr --labels "environment=production,tier=frontend"
    pod/hr-pod created

    controlplane ~ ➜ k get po -n hr
    NAME READY STATUS RESTARTS AGE
    hr-pod 1/1 Running 0 38s

    controlplane ~ ➜ k describe -n hr po hr-pod | grep -i image:
    Image: redis:alpine

    controlplane ~ ➜ k describe -n hr po hr-pod | grep -i label -A 5
    Labels: environment=production
    tier=frontend
  24. A kubeconfig file called super.kubeconfig has been created under /root/CKA. There is something wrong with the configuration. Troubleshoot and fix it.

    Answer
    controlplane ~ ➜  ls -la CKA
    total 24
    drwxr-xr-x 2 root root 4096 Jan 5 06:45 .
    drwx------ 1 root root 4096 Jan 5 06:39 ..
    -rw-r--r-- 1 root root 26 Jan 5 06:11 node_ips
    -rw------- 1 root root 5636 Jan 5 06:45 super.kubeconfig

    controlplane ~ ➜ k cluster-info --kubeconfig CKA/super.kubeconfig
    E0105 06:46:28.819247 20286 memcache.go:265] couldn't get current server API group list: Get "https://controlplane:9999/api?timeout=32s": dial tcp 192.22.238.9:9999: connect: connection refused
    E0105 06:46:28.819555 20286 memcache.go:265] couldn't get current server API group list: Get "https://controlplane:9999/api?timeout=32s": dial tcp 192.22.238.9:9999: connect: connection refused
    E0105 06:46:28.820954 20286 memcache.go:265] couldn't get current server API group list: Get "https://controlplane:9999/api?timeout=32s": dial tcp 192.22.238.9:9999: connect: connection refused
    E0105 06:46:28.822299 20286 memcache.go:265] couldn't get current server API group list: Get "https://controlplane:9999/api?timeout=32s": dial tcp 192.22.238.9:9999: connect: connection refused
    E0105 06:46:28.823566 20286 memcache.go:265] couldn't get current server API group list: Get "https://controlplane:9999/api?timeout=32s": dial tcp 192.22.238.9:9999: connect: connection refused

    To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'.
    The connection to the server controlplane:9999 was refused - did you specify the right host or port?

    Make sure the port is correct in /root/CKA/super.kubeconfig.

    server: https://controlplane:6443
    controlplane ~ ➜  kubectl cluster-info --kubeconfig=/root/CKA/super.kubeconfig
    Kubernetes control plane is running at https://controlplane:6443
    CoreDNS is running at https://controlplane:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy

    To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'.