You deploy a pod with a nodeSelector that matches no nodes in your EKS cluster. What will happen to the pod?
Think about how Kubernetes respects nodeSelector constraints when scheduling pods.
Kubernetes will not schedule a pod if no nodes match the nodeSelector. The pod stays Pending until a suitable node appears.
You want to allow a pod in EKS to access AWS S3 securely without using node IAM roles. Which configuration is required?
Consider how IRSA allows pods to assume IAM roles securely.
IRSA uses IAM roles linked to Kubernetes service accounts via annotations, enabling pods to get temporary credentials.
Which statement best describes the availability of the EKS control plane?
Think about how AWS manages the control plane for EKS clusters.
AWS manages the EKS control plane as a highly available service running across multiple AZs, so you don't manage it directly.
What is the best practice to minimize security risks on EKS worker nodes?
Consider how to reduce attack surface and keep nodes secure.
Using the EKS-optimized AMI ensures security patches and minimal privileges. Automatic updates help keep nodes secure.
You want to optimize cost and performance by scaling EKS worker nodes based on workload demand. Which approach is best?
Think about how to balance cost and availability with autoscaling.
Cluster Autoscaler dynamically adjusts node counts. Using multiple node groups with spot instances optimizes cost and performance.