Which of the following is the main advantage of using a managed Kubernetes service like AWS EKS instead of setting up Kubernetes yourself?
Think about what tasks managed services handle for you automatically.
Managed Kubernetes services handle control plane management, updates, and security patches, reducing your operational burden.
What is the expected output when you successfully create an AWS EKS cluster using the AWS CLI command aws eks create-cluster?
aws eks create-cluster --name my-cluster --role-arn arn:aws:iam::123456789012:role/EKSRole --resources-vpc-config subnetIds=subnet-abc123,subnet-def456Right after creation, the cluster status is not yet ACTIVE.
When you create an EKS cluster, the initial status is 'CREATING'. It becomes 'ACTIVE' only after setup completes.
Arrange the steps in the correct order to deploy a containerized app on AWS EKS.
Think about what must exist before you configure tools or deploy apps.
You first create the cluster, then configure kubectl to access it, then push your image, and finally deploy your app manifests.
You created an EKS cluster and a managed node group, but your pods stay in Pending state. What is the most likely cause?
Think about what allows nodes to register with the cluster.
If the node group's IAM role lacks the right permissions, nodes cannot join the cluster, so pods remain Pending.
Which practice is considered best for securing access to your AWS EKS cluster?
Consider how to limit permissions for pods securely.
Using IAM roles for service accounts (IRSA) allows fine-grained, secure permissions for pods without sharing node IAM roles.