Skip to main content

Site Reliability Engineer面经@LinkedIn

Make a Donation
FatWallet Coupons and Deals12月上旬面试该职位,2轮电面(已跪)。我之前在地里找过相关内容但是内容很少,后来有人陆续发私信我问我该职位信息,所以我决定发个面经给大家,造福后人,赞人品!!!求offer!!!

1> HR电面:聊简历,聊做过的项目,过了大概聊了15分钟,然后突然说要我点计算机基础知识,包括网络,OS,Linux等。比如常见协议及端口号,Linux常用命令,OS知识等(什么是fork)。

2 >Coding面:用脚本语言来处理些相关的文件,log,以及String处理,我选的Python。题目倒是不难,只要各种脚本语言使用熟练应该没问题,我就是Python玩的不够熟练所以挂了。题目大概我记得的就是有一道类似FizzBuzz的问题,还有一道是给你一大串log,貌似是Apache的日志文件,让你写code,找出在多少小时多少分钟发生的问题,count出现的数量,然后按照他要求的格式输出。这道题我回答的不好,所以挂在这个地方了。

据说这轮过了以后还有电面,这轮纯OS知识大百科,从Kernel到各种System call,signal都会问到。 即使到了Onsite也会被问到大量的网络和网络监控的知识,还是系统服务器优化等等,总之就是要会的东西太杂,要学的东西太多。个人感觉不太适合纯码农申请。但是我感觉这个职位发展还是很不错的,跟面试官聊天说他们LinkedIn的SRE主要都是往FullStack方面发展,不是纯维护site之类的工作。希望有兴趣的朋友可以试试,祝顺利!!!. from: 1point3acres.com/bbs 

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...