Troubleshooting Flashcards

1
Q

Users are complaining about slow response times for a critical application. Walk us through your approach to diagnosing the source of latency.

A
  1. Gather Initial Information (patterns, changes, consistency)
  2. Define Performance Baseline
  3. Network Analysis (packet loss, bandwidth utilisation; use ping or traceroute)
  4. Server Health Check (utilisation)
  5. Database Analysis (utilisation, queries, index usage)
  6. Application Profiling (inefficient code, memory leaks)
  7. Application Dependencies (changes)
  8. Application Logs (errors, tracing)
  9. Web Server Analysis (logs, response times, load)
  10. Load Balancer Examination (configuration, performance)
  11. Client-Side Investigation (browser compatibility)
  12. Performance Monitoring (utilisation, latency, tracing, load testing)
  13. Security (firewalls)
  14. Comparative Analysis (normal vs. slow, patterns)
  15. Collaboration (dev, DB, sys admins)
  16. Testing and Validation (test hypothesis)
    17 Communication and Resolution (stakeholders)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A database serving an essential application goes down unexpectedly. How would you handle this incident? Describe the steps you’d take to bring the database back online while minimizing data loss and service disruption.

A
  1. Initiate incident response process
  2. Communicate with stakeholders
  3. Assess impact and scope
  4. Isolate cause (logs, metrics)
  5. Implement Immediate Fixes (patch, unlock bottleneck, restart service)
  6. Restore from Backups (use backup/restore plan)
  7. Data Recovery (perform point-in-time recovery)
  8. Testing and Verification
  9. Monitor and Stabilise
  10. Identify Preventive Measures (post incident retro, comms, documentation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The application is experiencing an increase in HTTP 500 internal server errors. Outline your process for investigating and resolving these errors, including the possible factors you’d consider and the strategies you’d employ to mitigate the issue.

A
  1. Initial Assessment
  2. Monitoring and Alerting
  3. Error Logs Analysis
  4. Identify Patterns
  5. Code Review
  6. Database Inspection
  7. Infrastructure Assessment
  8. Third-Party Services
  9. Server Configuration
  10. Testing and Reproduction
  11. Rollback Recent Changes
  12. Code Debugging
  13. Error Handling and Logging
  14. Load and Performance Testing
  15. Bug Fixing and Code Deployment
  16. Communication
  17. Post-Incident Review
  18. Documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Users are reporting intermittent connectivity issues, and you suspect a misconfiguration in the load balancer settings. Describe how you would verify the load balancer configuration, identify any misconfigurations, and rectify the issue to restore proper traffic distribution.

A
  1. Gather Information
  2. Logging and Monitoring
  3. Access Load Balancer Configuration
  4. Review Load Balancer Configuration
  5. Check Health Checks
  6. Session Persistence (misconfigured session persistence can lead to uneven distribution of traffic)
  7. Connection Limits and Timeouts
  8. Protocol and Port Settings
  9. Compare with Best Practices
  10. Network Topology and Routing
  11. Backup Configuration
  12. Rectify Misconfigurations
  13. Testing
  14. Verification and Validation
  15. User Feedback
  16. Post-Incident Review
  17. Documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

One of the microservices in a distributed application is exhibiting a memory leak, causing it to gradually consume more memory over time. How would you troubleshoot this issue, identify the service with the leak, and implement a solution to prevent further memory consumption?

A
  1. Gather information
  2. Examine monitoring and logs (memory usage, garbage collection, heap utilisation)
  3. Analyse Memory Dump (capture memory dumps at different time intervals when the leak is suspected)
  4. Identify the Leaking Code (inefficient memory management practices, unclosed resources, excessive object creation)
  5. Analyse Dependencies
  6. Memory Profiling (identify memory hotspots, anything consuming excessive memory)
  7. Heap Analysis (visualise the memory usage patterns)
  8. Testing and Isolation
  9. Fix the Code
  10. Retest and Validate
  11. Post-Incident Review
  12. Documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly