Skip to content

Portal | Level: L1: Foundations | Topics: Cloud Deep Dive | Domain: Cloud

Cloud Providers (AWS/GCP) - Skill Check

Mental model (bottom-up)

Managed Kubernetes adds cloud-specific glue. EKS/GKE handle the control plane, but you own networking (VPC CNI, pod IPs), identity federation (IRSA/Workload Identity), load balancers (ALB/NLB), and storage (EBS/PD). Understanding the cloud layer beneath Kubernetes is what separates operators from admins.

Visual stack

[Application Pod     ]  uses K8s ServiceAccount
|
[Identity Federation ]  IRSA (AWS) / Workload Identity (GCP)
|
[Cloud IAM Role      ]  scoped permissions (S3, KMS, etc.)
|
[VPC Networking      ]  pod IPs from VPC subnets (not overlay)
|
[Load Balancer       ]  ALB (L7) or NLB (L4) → target pods directly
|
[Managed Control Plane]  EKS/GKE runs etcd, apiserver, scheduler

Glossary

  • IRSA - IAM Roles for Service Accounts; maps K8s SA → AWS IAM Role via OIDC
  • Workload Identity - GCP equivalent; maps K8s SA → GCP Service Account
  • VPC CNI - AWS plugin assigning real VPC IPs to pods (not overlay)
  • ALB - Application Load Balancer (Layer 7, HTTP routing, path-based)
  • NLB - Network Load Balancer (Layer 4, TCP/UDP, static IP, low latency)
  • Prefix delegation - VPC CNI feature giving 16 IPs per ENI slot instead of 1
  • Karpenter - node provisioner replacing cluster-autoscaler with faster, smarter scaling

Core questions (easy -> hard)

  • How does a pod get AWS permissions without hardcoded credentials?
  • IRSA: SA annotation → mutating webhook injects role ARN + token → pod calls STS AssumeRoleWithWebIdentity.
  • ALB vs NLB — when do you use each?
  • ALB for HTTP/HTTPS with path/host routing. NLB for TCP/UDP, gRPC, static IPs, or low-latency needs.
  • Pods stuck Pending with "no available addresses." What happened?
  • VPC subnet IPs exhausted. Each EKS pod gets a real VPC IP. Fix: enable prefix delegation or add secondary CIDR.
  • How do you prevent a single pod from accessing all AWS resources on the node?
  • Use IRSA (per-SA roles) instead of node instance roles. Block IMDS access with NetworkPolicy or iptables.
  • GKE vs EKS — key architectural differences?
  • GKE: free control plane, integrated Workload Identity, GKE Autopilot. EKS: $0.10/hr control plane, VPC CNI (real IPs), Fargate option.
  • How do you handle cross-account access from EKS pods?
  • IRSA role in Account A + bucket policy in Account B. Both sides must grant access.
  • Your cloud bill jumped 40%. Investigation plan?
  • Cost Explorer by service/tag/time. Check node count growth, spot fallback, orphaned EBS volumes, data transfer spikes.

Wiki Navigation

  • AWS CloudWatch (Topic Pack, L2) — Cloud Deep Dive
  • AWS Devops Flashcards (CLI) (flashcard_deck, L1) — Cloud Deep Dive
  • AWS EC2 (Topic Pack, L1) — Cloud Deep Dive
  • AWS ECS (Topic Pack, L2) — Cloud Deep Dive
  • AWS General Flashcards (CLI) (flashcard_deck, L1) — Cloud Deep Dive
  • AWS IAM (Topic Pack, L1) — Cloud Deep Dive
  • AWS Lambda (Topic Pack, L2) — Cloud Deep Dive
  • AWS Networking (Topic Pack, L1) — Cloud Deep Dive
  • AWS Route 53 (Topic Pack, L2) — Cloud Deep Dive
  • AWS S3 Deep Dive (Topic Pack, L1) — Cloud Deep Dive