<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Debug School: Bimalkumar Patel</title>
    <description>The latest articles on Debug School by Bimalkumar Patel (@bimal).</description>
    <link>https://www.debug.school/bimal</link>
    <image>
      <url>https://www.debug.school/images/CPDdQlGexClW9WOTxwLbEDeLKxuBxqind7bvkmstzXo/rs:fill:90:90/g:sm/mb:500000/ar:1/aHR0cHM6Ly90aGVw/cmFjdGljYWxkZXYu/czMuYW1hem9uYXdz/LmNvbS9pLzk5bXZs/c2Z1NXRmajltN2t1/MjVkLnBuZw</url>
      <title>Debug School: Bimalkumar Patel</title>
      <link>https://www.debug.school/bimal</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://www.debug.school/feed/bimal"/>
    <language>en</language>
    <item>
      <title>Docker Assignment by BIMAL</title>
      <dc:creator>Bimalkumar Patel</dc:creator>
      <pubDate>Sun, 23 Apr 2023 12:20:48 +0000</pubDate>
      <link>https://www.debug.school/bimal/docker-assignment-by-bimal-m9f</link>
      <guid>https://www.debug.school/bimal/docker-assignment-by-bimal-m9f</guid>
      <description>&lt;p&gt;&lt;strong&gt;1.What is Docker and why is it used?&lt;/strong&gt;&lt;br&gt;
Docker is a software platform that allows you to build, test, and deploy applications quickly. Docker packages software into standardized units called containers that have everything the software needs to run including libraries, system tools, code, and runtime.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2.What is a Docker image and how is it different from a Docker container?&lt;/strong&gt;&lt;br&gt;
The key difference between a Docker image vs a container is that a Docker image is a template that defines how a container will be realized. A Docker container is a runtime instance of a Docker image.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3.How do you create a Docker image and run a Docker container?&lt;/strong&gt;&lt;br&gt;
There are three way to create the Docker image.&lt;br&gt;
 A. Take image from Docker hub&lt;br&gt;
 B. Create image from Docker file&lt;br&gt;
 C. Create image from existing Docker containers&lt;br&gt;
Now the steps for create the image and run the container.&lt;br&gt;
root user+installed Docker+service start+create Dockerfile+now build the image from the Dockerfile +then create the container from that image.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4.What is a Dockerfile and how do you use it to create a Docker image?&lt;/strong&gt;&lt;br&gt;
Dockerfile is basically a text file.It contains some set of instruction.&lt;br&gt;
Automation of Docker image creation.&lt;br&gt;
To build image from the Dockerfile we need to use the Docker components so it help to create image and made the automation of the image.&lt;br&gt;
There are some list of components for the different uses,&lt;br&gt;
FROM,RUN,COPY,MAINTAINER,ADD,EXPOSE,WORKDIR,CMD,ENV.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5.How can you inspect the contents of a Docker container and the changes made to a container while it was running?&lt;/strong&gt;&lt;br&gt;
By using "inspect command", we can the contents of a Docker container and the changes made to it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6.How can you share a Docker image with others and pull an image from a Docker registry?&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Create a repository on any registry such as hub.docker.com&lt;/li&gt;
&lt;li&gt;Login to the repository on terminal using "docker login"&lt;/li&gt;
&lt;li&gt;The name of the docker image that you want to share and the repository should be the same. If not the create an alias of the image with the same name as of the repository using command "docker tag imagename repositoryname". &lt;/li&gt;
&lt;li&gt;Push the image on the repository using the command "docker push imagename".&lt;/li&gt;
&lt;li&gt;We can pull an image from a Docker registry by using "docker pull" command.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;7.What are the different network modes available in Docker and how do you choose the right network mode for your application?&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Bridge networks-&amp;gt; it is used within a single host&lt;/li&gt;
&lt;li&gt;Overlay networks-&amp;gt; it is used for multi-host communication&lt;/li&gt;
&lt;li&gt;Macvlan networks-&amp;gt; it is used to connect Docker containers directly to host network interfaces&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;8.How can you mount a volume in a Docker container and share data between the host and container?&lt;/strong&gt;&lt;br&gt;
To mount a volume in a docker container, we use the command "docker run itd -v path", where path is the location of volume.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;9.What is the difference between a Docker Compose file and a Dockerfile, and how are they used in deploying multi-container applications?&lt;/strong&gt;&lt;br&gt;
A Dockerfile is a text file that contains the commands that a user can execut to build an image.&lt;br&gt;
Docker Compose is a tool for defining and running multi-container Docker applications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;10.How can you monitor the performance of a Docker container and diagnose issues with it?&lt;/strong&gt;&lt;br&gt;
We can monitor the performance of a docker container by executing the command "docker stats".&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;11. Components of Docker and its Brief Summary&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;A.Docker engine/Doemen&lt;/em&gt; &lt;br&gt;
  It runs on the host O.S. It is responsible for running container to manages docker services and also it can communicate with the other doemen.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;B.Docker client&lt;/em&gt;&lt;br&gt;
  Docker client uses commands and rest API to communicate with the docker engine.&lt;br&gt;
  When a client runs any server command on the docker client terminal,the client terminal sends these docker command to the docker engine.&lt;br&gt;
  It is possible for docker client to communicate with more then one engine.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;C.Docker Image&lt;/em&gt;&lt;br&gt;
  A Docker image contains set of instructions that are used to create a container.  &lt;/p&gt;

&lt;p&gt;&lt;em&gt;D.Docker Registry&lt;/em&gt;&lt;br&gt;
  A Docker registry is a storage system for Docker images.&lt;br&gt;
  Two types of the registry: &lt;br&gt;
             a.Public registry&lt;br&gt;
             b.Private registry&lt;/p&gt;

&lt;p&gt;&lt;em&gt;E.Docker container&lt;/em&gt;&lt;br&gt;
  Docker containers are standardized,executable components that combine application source code with the operating system and dependencies that are required to run the code in any environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;12.What is the difference between docker pause and unpause?&lt;/strong&gt;&lt;br&gt;
The docker pause command is used to suspend all processes in the specified containers.&lt;br&gt;
The docker unpause command un-suspends all processes in the specified containers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;13.What is the differenet between docker stop and kill?&lt;/strong&gt;&lt;br&gt;
Docker stop command sends SIGTERM signal to running container process. It will stop the process however it takes a while to shutdown the container completely.&lt;br&gt;
Docker kill command is kind of similar to docker stop command however it sends SIGKILL signal to our running container process. SIGKILL signal immediately shuts the container down without taking any pause&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;14.What is the difference between docker exec and attach?&lt;/strong&gt;&lt;br&gt;
The docker exec command is used to run a new command in a running container whereas docker attach command is used to attach the terminal's standard input, output, and error to a running container.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;15.List of dockerfile instructions and its Brief Summary?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A.FROM:&lt;/em&gt; This command is used to create a base image such as an operating system, a programming language, etc.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;B.RUN:&lt;/em&gt; To execute commends,it will create a layer in image.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;C.MAINTAINER:&lt;/em&gt; Author/Owner/Description&lt;/p&gt;

&lt;p&gt;&lt;em&gt;D.COPY:&lt;/em&gt; copy files from the local system (Docker VM). We need &lt;br&gt;
to provide source and the destination.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;E.ADD:&lt;/em&gt; Similar to copy but It provides a feature yo download files from internet,also we extract file at docker image side.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;F.WORKDIR:&lt;/em&gt; To set working directory for a container.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;G.CMD:&lt;/em&gt; Execute commands but during container creation.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;H.ENTRYPOINT:&lt;/em&gt; similar to CMD but it has higher priority over CMD,first commands will be executed by ENTRYPOINT only.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;16.What is the differenet between CMD vs Entry?&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;- CMD:&lt;/em&gt; This command is used to run a docker container by specifying a default command that gets executed for all the containers of that image by default.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;- Entrypoint:&lt;/em&gt; This instruction is used to configure the executables that will always run after the container is initiated.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>AWS Assignment by BIMAL</title>
      <dc:creator>Bimalkumar Patel</dc:creator>
      <pubDate>Sun, 19 Mar 2023 10:24:09 +0000</pubDate>
      <link>https://www.debug.school/bimal/aws-assignment-by-bimal-5dcg</link>
      <guid>https://www.debug.school/bimal/aws-assignment-by-bimal-5dcg</guid>
      <description>&lt;p&gt;&lt;strong&gt;1.What is the difference between Network firewall &amp;amp; Os level firewall?&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Network Firewall&lt;/strong&gt;-A Network Firewall is a security device used to protect illegal access to private networks by using policies defining the only traffic allowed on the network; any other traffic seeking to connect is blocked.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OS firewall&lt;/strong&gt;-A firewall acts as a gatekeeper. It monitors attempts to gain access to your operating system and blocks unwanted traffic or unrecognized sources&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3.What is the diff between public and pvt ip?&lt;/strong&gt;&lt;br&gt;
A public IP address identifies you to the wider internet so that all the information you're searching for that can find you.&lt;br&gt;
A private IP address is used within a private network to connect securely to other devices within that same network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4.What is Region and Availability zone?&lt;/strong&gt;&lt;br&gt;
AWS Regions are large and widely dispersed into separate geographic locations.&lt;br&gt;
Availability Zones are different locations within an AWS Region that are engineered to be isolated from failures in other Availability Zones.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5.What are the types of Storage and use case of it?&lt;/strong&gt;&lt;br&gt;
There are 3 type of storage block storage (system bus/elastic block storage"EBS"),Network storage(elastic file storage"EFS") it connect through network and the last object storage(like google drive).&lt;br&gt;
Block storage's controls on data and device storage.It takes any data and it divided it in to equal blocks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6.What is Policy and Permission in IAM?&lt;/strong&gt;&lt;br&gt;
IAM-Identity and Access Management&lt;br&gt;
IAM policy is a document with a set of rules. Each IAM policy grants a specific set of permissions.Policies are attached to IAM identities like Users, Groups and Roles.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7.Write down and understanding of a concept of network, subnet, network firewall, internet gateway, route table?&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Network&lt;br&gt;
A network is the combination of two or more computers and their connecting links. A physical network is the hardware equipment such as adapters, cables and telephone lines that makes up the network.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Subnet&lt;br&gt;
A subnet is a network inside a network. Subnets make networks more efficient. Through subnetting, network traffic can travel a shorter distance without passing through unnecessary routers to reach its destination.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Network Firewall&lt;br&gt;
A Network Firewall is a security device used to protect illegal access to private networks by using policies defining the only traffic allowed on the network; any other traffic seeking to connect is blocked.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Internet gateway&lt;br&gt;
The gateway converts information one protocol to another. The gateway gives us entry into different networks so we can send email, look at Web pages, buy things online, and more things to do.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Route table&lt;br&gt;
A route table is a set of rules. Mostly it viewed in table format.A routing table is a database that keeps track of paths and uses these to determine which way to forward traffic. &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>Linux Assignment &amp; Excercise by BIMAL</title>
      <dc:creator>Bimalkumar Patel</dc:creator>
      <pubDate>Wed, 08 Mar 2023 21:07:29 +0000</pubDate>
      <link>https://www.debug.school/bimal/linux-assignment-excercise-1khc</link>
      <guid>https://www.debug.school/bimal/linux-assignment-excercise-1khc</guid>
      <description>&lt;p&gt;&lt;strong&gt;1.What is EPEL and Write a instructions to install and use it?&lt;/strong&gt;&lt;br&gt;
EPEL(Extra Package for Enterprise Linux) is a special interest group that provides some additional packages for Redhat family like Ubuntu,CentoOS etc.&lt;/p&gt;

&lt;p&gt;Method to install EPEL on CentOs&lt;br&gt;
Connect to the server via SSH as the root user&lt;br&gt;
install EPEL repository by using command, &lt;br&gt;
yum install epel-release -y &lt;br&gt;
after refresh it then command,&lt;br&gt;
yum repolist &lt;br&gt;
then install the package by using command&lt;br&gt;
yum install pkg&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2.What is diffrence between hypervisor and cloud?&lt;/strong&gt;&lt;br&gt;
A hypervisor, also known as a virtual machine monitor, is software that creates and runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing.&lt;br&gt;
Cloud is a model for delivering computing resources, such as servers, storage, and networking, over the internet.&lt;br&gt;
Cloud providers, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud offer a variety of services that allow users to rent computing resources on demand, without the need to purchase and maintain physical hardware.&lt;br&gt;
The main difference between hypervisors and cloud is the level of control on the hardware.&lt;br&gt;
IN the hypervisor users have control on the hardware on which their VMs are running, and they can install and configure the hypervisor and VMs as they see want.&lt;br&gt;
But in the cloud users do not have direct control on the physical hardware.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3.What are the Network Adaptor(Driver) you have in VirtualBox and write a usecase of it?&lt;/strong&gt;&lt;br&gt;
In the virtualbox there are some options available to connect with the virtual machine.&lt;br&gt;&lt;br&gt;
A. NAT- This allows the VM to connect with the internet&lt;/p&gt;

&lt;p&gt;B. Bridged- The Bridged allows the VM to connect directly to the host machine's network.This is also useful for the accessible VM from the other networks and also to communicate with the other device on the same network.&lt;/p&gt;

&lt;p&gt;C.Host-only- The Host-only allows the VM to communicate with the host machine or other VMs on same host only  networks only. it doesn't allow to communicate with the VMs who has another internet access. This adapter is useful for creating a private network between VMs and the host machine.&lt;/p&gt;

&lt;p&gt;D.Interna- The Internal allows the VM to communicate with other VMs on the same host machine but it does not provide internet access to communication with other devices on the host machine's network.&lt;/p&gt;

&lt;p&gt;E.Generic- The Generic allows the VM to use a filter to connect with the network. This adapter is useful for advanced network configurations for connecting to networks that are not supported by the other adapter types.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>DevOps Assignment 1 by BIMAL</title>
      <dc:creator>Bimalkumar Patel</dc:creator>
      <pubDate>Fri, 24 Feb 2023 23:44:39 +0000</pubDate>
      <link>https://www.debug.school/bimal/devops-assignment-1-1hmk</link>
      <guid>https://www.debug.school/bimal/devops-assignment-1-1hmk</guid>
      <description>&lt;p&gt;&lt;strong&gt;1.What is DevOps in simple terms?&lt;/strong&gt;&lt;br&gt;
  DevOps is a culture. it's removing gap between development and operation team.By working together development and operations teams have focus on improving software quality, less timing and cost reduction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2.What exactly do DevOps do?&lt;/strong&gt;&lt;br&gt;
  DevOps is automation process in which provide quality work with good IT Infrastructure in order to reduce timing period good quality of software. Also it's manage the tools which is associated with the development and operation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3.What are the list of DevOps Tools?&lt;/strong&gt;&lt;br&gt;
  Ansible,Selenium,Git,Jira,CI/CD tools,Puppet,Terraform, Maven, Kubernetes, Docker, etc&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4.How DevOps and SRE are different?&lt;/strong&gt;&lt;br&gt;
  A DevOps team works on a product using an agile method. They build, test, deploy and monitor applications with speed, control, and quality.&lt;br&gt;
  A SRE team regularly provides the feedback to  the developers’team.Their goal is to leverage operations data and software engineering, mostly by automating IT operations tasks so it directly helpful for the fast delivery of software.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5.What is DevSecOps?&lt;/strong&gt;&lt;br&gt;
   It is a combination of 3 teams Development, Security and Operations. DevSecOps is a software development process that put security management during the development process. &lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
