What must be done first in order to visualize log data that has been captured by the ELK stuck included IBM Cloud Private?

What must be done first in order to visualize log data that has been captured by the ELK stuck included IBM Cloud Private?A . Create a search or select a saved searchB . Use the Discover panel to graph the data that to be visualizedC . Define the buckets that...

October 24, 2020 No Comments READ MORE +

Within the ELK stack in IBM Cloud Private, what is used to coordinate the management of the Elastisearch cluster?

Within the ELK stack in IBM Cloud Private, what is used to coordinate the management of the Elastisearch cluster?A . Elastisearch master logB . Elastisearch master podC . Elastisearch master nodeD . Elastisearch master recordView AnswerAnswer: D

October 24, 2020 No Comments READ MORE +

When setting up Kubernetes inside IBM Cloud Private, how is storage requested?

When setting up Kubernetes inside IBM Cloud Private, how is storage requested?A . Lease requestB . MountStorageContainerC . PersistentVolumeClaimD . StorageClass ApplicationView AnswerAnswer: B

October 24, 2020 No Comments READ MORE +

Which field on the metering report shows the number of cores a workload is allowed to use?

Which field on the metering report shows the number of cores a workload is allowed to use?A . vcoresB . ucoresC . ocoresD . ccoresView AnswerAnswer: B

October 23, 2020 No Comments READ MORE +

What does issuing the docker container exec command accomplish?

What does issuing the docker container exec command accomplish?A . It creates a containerB . It executes a container to startC . It runs a command in a running containerD . It starts a new container to run a commandView AnswerAnswer: A

October 22, 2020 No Comments READ MORE +

When IBM Cloud Private monitors a workload as a black box, how is information captured?

When IBM Cloud Private monitors a workload as a black box, how is information captured?A . Using Grafana as the sourceB . Using log scraping by filebeat agentsC . By capturing API calls to the ELK stackD . By capturing it external to the containerView AnswerAnswer: A

October 21, 2020 No Comments READ MORE +

What must be done first before loading a Helm chart?

What must be done first before loading a Helm chart?A . Install calicoctlB . Login to IBM CloudC . Run lint against the yaml fileD . Use docker to push the associated images to the private registryView AnswerAnswer: B

October 21, 2020 No Comments READ MORE +

How are availability zones distributed?

How are availability zones distributed?A . Round-robinB . Alphabetical by cluster nameC . Highest amount of CPU availableD . Highest amount of RAM availableView AnswerAnswer: A

October 20, 2020 No Comments READ MORE +

Where does Vulnerability Advisor run in the cluster?

Where does Vulnerability Advisor run in the cluster?A . On master nodesB . On every worker nodeC . On dedicated VA nodesD . On worker nodes where analysis is neededView AnswerAnswer: B

October 18, 2020 No Comments READ MORE +

Which two underlying components are used extensively within Transformation Advisor?

Which two underlying components are used extensively within Transformation Advisor?A . WebSphere Modernization ToolkitB . WebSphere Configuration Management ToolkitC . WebSphere Application Server Refactoring ToolkitD . WebSphere Application Server Transformation ToolkitE . WebSphere Application Server Migration Toolkit for Application BinariesView AnswerAnswer: A

October 16, 2020 No Comments READ MORE +