What must be done first in order to visualize log data that has been captured by the ELK stuck included IBM Cloud Private?
What must be done first in order to visualize log data that has been captured by the ELK stuck included IBM Cloud Private?A . Create a search or select a saved searchB . Use the Discover panel to graph the data that to be visualizedC . Define the buckets that...
Within the ELK stack in IBM Cloud Private, what is used to coordinate the management of the Elastisearch cluster?
Within the ELK stack in IBM Cloud Private, what is used to coordinate the management of the Elastisearch cluster?A . Elastisearch master logB . Elastisearch master podC . Elastisearch master nodeD . Elastisearch master recordView AnswerAnswer: D
When setting up Kubernetes inside IBM Cloud Private, how is storage requested?
When setting up Kubernetes inside IBM Cloud Private, how is storage requested?A . Lease requestB . MountStorageContainerC . PersistentVolumeClaimD . StorageClass ApplicationView AnswerAnswer: B
Which field on the metering report shows the number of cores a workload is allowed to use?
Which field on the metering report shows the number of cores a workload is allowed to use?A . vcoresB . ucoresC . ocoresD . ccoresView AnswerAnswer: B
What does issuing the docker container exec command accomplish?
What does issuing the docker container exec command accomplish?A . It creates a containerB . It executes a container to startC . It runs a command in a running containerD . It starts a new container to run a commandView AnswerAnswer: A
When IBM Cloud Private monitors a workload as a black box, how is information captured?
When IBM Cloud Private monitors a workload as a black box, how is information captured?A . Using Grafana as the sourceB . Using log scraping by filebeat agentsC . By capturing API calls to the ELK stackD . By capturing it external to the containerView AnswerAnswer: A
What must be done first before loading a Helm chart?
What must be done first before loading a Helm chart?A . Install calicoctlB . Login to IBM CloudC . Run lint against the yaml fileD . Use docker to push the associated images to the private registryView AnswerAnswer: B
How are availability zones distributed?
How are availability zones distributed?A . Round-robinB . Alphabetical by cluster nameC . Highest amount of CPU availableD . Highest amount of RAM availableView AnswerAnswer: A
Where does Vulnerability Advisor run in the cluster?
Where does Vulnerability Advisor run in the cluster?A . On master nodesB . On every worker nodeC . On dedicated VA nodesD . On worker nodes where analysis is neededView AnswerAnswer: B
Which two underlying components are used extensively within Transformation Advisor?
Which two underlying components are used extensively within Transformation Advisor?A . WebSphere Modernization ToolkitB . WebSphere Configuration Management ToolkitC . WebSphere Application Server Refactoring ToolkitD . WebSphere Application Server Transformation ToolkitE . WebSphere Application Server Migration Toolkit for Application BinariesView AnswerAnswer: A