0
0
GCPcloud~20 mins

GKE networking (VPC-native) in GCP - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
GKE VPC-native Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
1:30remaining
Understanding VPC-native Clusters in GKE

What is the main advantage of using a VPC-native (alias IP) cluster in Google Kubernetes Engine (GKE)?

APods share the node IP addresses, reducing IP address usage.
BPods get IP addresses from the VPC subnet, enabling direct communication with other VPC resources without NAT.
CPods are isolated in a separate network and cannot communicate with VPC resources.
DPods use external IP addresses to communicate with the internet directly.
Attempts:
2 left
💡 Hint

Think about how pods communicate with other resources inside the same network.

Architecture
intermediate
1:30remaining
Configuring Subnets for VPC-native GKE Clusters

You want to create a VPC-native GKE cluster. Which subnet configuration is required for the cluster's pod IP range?

ACreate a secondary IP range in the VPC subnet dedicated for pods, separate from the primary IP range used by nodes.
BUse the primary IP range of the subnet for both nodes and pods without any secondary ranges.
CUse a separate VPC network exclusively for pods.
DAssign pod IPs from an external IP range outside the VPC subnet.
Attempts:
2 left
💡 Hint

Consider how GKE manages IP address allocation for pods and nodes within the same subnet.

security
advanced
2:00remaining
Securing Pod Communication in VPC-native GKE Clusters

In a VPC-native GKE cluster, which method best restricts pod-to-pod communication across namespaces for security purposes?

AUse Kubernetes Network Policies to define allowed traffic between pods in different namespaces.
BDisable VPC-native mode to isolate pods by default.
CAssign unique external IPs to pods and use firewall rules to restrict traffic.
DUse node-level firewall rules to block pod communication.
Attempts:
2 left
💡 Hint

Think about Kubernetes-native ways to control pod traffic.

service_behavior
advanced
1:30remaining
Behavior of Services with VPC-native Clusters

What happens when you create a LoadBalancer type Service in a VPC-native GKE cluster?

AThe Service cannot be created because LoadBalancer type is unsupported in VPC-native clusters.
BThe Service uses node IPs only, ignoring pod IPs for backend endpoints.
CGKE provisions a cloud load balancer with backend endpoints using pod IPs from the VPC subnet.
DThe Service automatically assigns external IPs to pods.
Attempts:
2 left
💡 Hint

Consider how pod IPs are used in load balancing within VPC-native clusters.

Best Practice
expert
2:30remaining
Optimizing IP Address Usage in Large VPC-native GKE Clusters

You manage a large VPC-native GKE cluster with many nodes and pods. What is the best practice to optimize IP address usage and avoid exhaustion?

AAssign a large secondary IP range to the subnet and disable autoscaling to keep pod count stable.
BCreate multiple VPC networks and split the cluster across them to increase IP availability.
CUse the primary IP range for pods to maximize available IPs and avoid secondary ranges.
DConfigure smaller secondary IP ranges per subnet and enable cluster autoscaling to manage pod density per node.
Attempts:
2 left
💡 Hint

Think about balancing IP allocation and cluster scaling.