60 Practice Questions & Answers
When configuring Cinder volume backend storage, which parameter defines the physical location where volumes are stored?
-
A
volume_backend_device
-
B
volume_driver
-
C
volume_backend_name
✓ Correct
-
D
backends
Explanation
The volume_backend_name parameter specifies the logical name of a storage backend, which identifies where volumes will be created and stored. This is essential for multi-backend Cinder deployments.
Which OpenStack service is responsible for managing container orchestration and lifecycle?
-
A
Sahara
-
B
Trove
-
C
Zaqar
-
D
Magnum
✓ Correct
Explanation
Magnum is the OpenStack service that manages Kubernetes and other container orchestration engines as first-class resources. The other services handle messaging, data processing, and database services respectively.
In Keystone, what is the primary purpose of using application credentials instead of user passwords?
-
A
To store passwords in a more secure database location
-
B
To enable long-lived API access with limited scope without exposing user credentials
✓ Correct
-
C
To increase the password complexity requirements for all users
-
D
To eliminate the need for token expiration in OpenStack deployments
Explanation
Application credentials provide a secure alternative for API access with restricted permissions and optional expiration dates, reducing the exposure of user passwords while maintaining security boundaries.
Which command-line tool is used to manage Glance image properties and metadata?
-
A
glance image-update
-
B
nova image-property-set
-
C
openstack image set
✓ Correct
-
D
cinder metadata-set
Explanation
The OpenStack CLI unified command 'openstack image set' is the standard way to modify Glance image properties and metadata. While legacy tools like glance CLI exist, the openstack CLI is the recommended approach.
When setting up Nova's PCI passthrough, what is the critical first step in the compute node configuration?
-
A
Launch instances with the --pci-device-id flag
-
B
Configure neutron to recognize PCI hardware addresses in network settings
-
C
Create a PCI alias in nova.conf pointing to the device UUID
-
D
Enable IOMMU in BIOS and kernel parameters, then identify and whitelist PCI devices
✓ Correct
Explanation
PCI passthrough requires IOMMU (Input/Output Memory Management Unit) to be enabled in the system BIOS and kernel, followed by device identification and whitelisting in Nova configuration. This is the prerequisite before any instance configuration.
What is the recommended approach for updating Nova compute nodes in a production environment without service interruption?
-
A
Update Nova API first, then sequentially update compute nodes with service restart
-
B
Use nova-manage cell_v2 discover_hosts followed by rolling updates with evacuation
✓ Correct
-
C
Execute nova service-restart on all compute nodes in parallel with the conductor running
-
D
Disable all instances, update all compute nodes simultaneously, then restart instances
Explanation
Rolling updates with instance evacuation on each compute node minimizes service disruption. The nova-manage command registers new hosts with the cell, and instances are migrated away before updates occur.
In Neutron, which mechanism allows you to isolate tenant traffic using VLAN tagging on a physical network?
-
A
Flat network type with segmentation ID configuration
-
B
VLAN network type with network_vlan_ranges configuration
✓ Correct
-
C
VxLAN network type with vni assignment
-
D
GRE tunnel network type with tunnel ID ranges
Explanation
VLAN network type with properly configured network_vlan_ranges in the ML2 plugin enables tenant isolation using 802.1q VLAN tagging on physical network interfaces. Flat networks don't support tagging, while VxLAN and GRE are overlay technologies.
When configuring Cinder backup, what must be verified to ensure proper functionality with a Swift backend?
-
A
All Cinder volumes must be in 'available' state before backup can be initiated
-
B
The backup_swift_url parameter matches exactly with the Swift endpoint URL
-
C
Backup scheduling must be configured in cron jobs on all Cinder services
-
D
Swift credentials are configured and Cinder service has appropriate permissions to create containers
✓ Correct
Explanation
For Swift-backed Cinder backups, proper credentials must be configured and the Cinder service account requires permissions to create and manage Swift containers. The other options are either false or not specific requirements for Swift backup functionality.
Which Heat parameter type is used for complex data structures with multiple properties and validation rules?
-
A
json
✓ Correct
-
B
map
-
C
string
-
D
object with constraints
Explanation
The 'json' parameter type in Heat allows you to define complex data structures with nested properties, providing validation capabilities for structured data. This is more appropriate than simple string types for complex configurations.
In Ironic, what is the significance of configuring the 'ipmi_address' parameter in node driver data?
-
A
It sets the DHCP server address that will provision the bare metal node
-
B
It specifies the network address for the node's BMC (Baseboard Management Controller) for out-of-band management
✓ Correct
-
C
It defines the primary IP address assigned to the node's operating system network interface
-
D
It configures the storage network address for IPMI log collection across the cluster
Explanation
The ipmi_address in Ironic node driver data specifies the BMC network address, allowing out-of-band management and control of the physical server independent of the operating system.
When troubleshooting Horizon dashboard performance issues, which log file should be examined first?
-
A
/var/log/keystone/keystone.log
-
B
/var/log/nova/nova-api.log
-
C
/var/log/apache2/error.log (or httpd error log depending on distribution)
✓ Correct
-
D
/var/log/horizon/dashboard.log
Explanation
The Apache/httpd error log contains Horizon's application errors and performance issues since Horizon runs as a web application served by Apache. While other logs provide context, the web server log is the primary source for Horizon-specific issues.
Which network plugin configuration in Neutron allows for provider network creation without VLAN or overlay segmentation?
-
A
Shared networks with admin privileges only
-
B
Port security networks with MAC filtering
-
C
Flat provider networks with no segmentation ID
✓ Correct
-
D
External networks with gateway routing enabled
Explanation
Flat provider networks allow network creation using a single physical interface without any segmentation mechanism, useful for direct layer-2 connectivity. This differs from segmented approaches like VLANs or overlays.
In Nova, what happens when an instance is in 'STOPPED' state versus 'SHELVED' state?
-
A
STOPPED keeps instance files on disk; SHELVED moves files to Glance and deallocates compute resources
✓ Correct
-
B
Both states are identical and used interchangeably in Nova terminology
-
C
STOPPED is a transient state; SHELVED is a permanent state requiring image export
-
D
STOPPED deallocates all resources; SHELVED keeps minimal resources allocated on hypervisor
Explanation
STOPPED keeps instance data and resources allocated on the compute node, while SHELVED (shelve-offload) moves the instance to Glance and deallocates compute resources, useful for long-term pause scenarios and resource optimization.
Which Glance setting determines the maximum size of images that can be uploaded to the service?
-
A
image_member_quota limit setting
-
B
image_size_cap in glance-api.conf
✓ Correct
-
C
image_location_quota_size parameter
-
D
max_image_upload_size configuration parameter
Explanation
The image_size_cap setting in glance-api.conf specifies the maximum allowed image size in bytes. This prevents extremely large uploads from consuming excessive resources.
When configuring Cinder volume encryption, which component performs the actual encryption of data?
-
A
The encryption key manager (Barbican) with the volume backend driver
✓ Correct
-
B
The Glance image service during volume snapshot creation
-
C
The Nova compute service on the client side only
-
D
The network layer through Neutron security groups
Explanation
Cinder volume encryption involves Barbican (key manager) for key management and the Cinder volume driver for actual encryption operations at the storage layer, creating encrypted volumes at rest.
Which command correctly evacuates instances from a Nova compute node during maintenance?
-
A
openstack compute service set source-host nova-compute --disable
-
B
nova evacuate instance-id target-host --force
-
C
openstack server evacuate --host=target-host source-host instances
✓ Correct
-
D
nova-manage compute migrate_vm source-host target-host
Explanation
The 'openstack server evacuate' command is the proper way to move instances from a source compute host to another host, with proper syntax for specifying target and source hosts. Option B uses deprecated nova CLI.
In Keystone, what is the difference between implicit and explicit role inheritance?
-
A
Implicit inheritance requires manual role propagation; explicit inheritance is automatic through role hierarchy configuration
✓ Correct
-
B
Implicit inheritance is deprecated; explicit inheritance is the only supported method
-
C
Both terms are synonymous and used interchangeably in Keystone documentation
-
D
Implicit inheritance applies globally; explicit inheritance applies only to specific projects
Explanation
Explicit role inheritance uses Keystone's role hierarchy configuration to automatically grant child roles when parent roles are assigned. Implicit inheritance does not provide this automatic mechanism.
Which Neutron component is responsible for managing the actual configuration of network devices on compute nodes?
-
A
Neutron DHCP agent for all network configuration
-
B
Neutron server with ML2 plugin
-
C
Neutron L2 agent (e.g., openvswitch-agent or linuxbridge-agent)
✓ Correct
-
D
Nova network metadata service
Explanation
The Neutron L2 agent running on compute nodes configures the actual network devices (bridges, ports, VLANs) on the hypervisor based on Neutron server directives.
When using Placement API for scheduling, what does the 'generation' field in a resource provider represent?
-
A
The number of virtual machines running on that resource provider
-
B
The NUMA generation supported by the processor
-
C
The hardware generation model of the physical server
-
D
A version number that changes when resource provider data is modified
✓ Correct
Explanation
The generation field is a version counter in the Placement API that changes whenever resource provider data (like traits or resource classes) is modified, preventing concurrent update conflicts.
What is the primary function of the Nova conductor service in an OpenStack deployment?
-
A
Run database operations and filter/weigh scheduler decisions to improve performance and security
✓ Correct
-
B
Maintain persistent connections to all hypervisors for real-time monitoring
-
C
Handle all incoming API requests from users
-
D
Directly manage VM instance lifecycle on compute nodes
Explanation
The Nova conductor performs database operations and acts as an intermediary for scheduler decisions, reducing the database load on compute nodes and enhancing security by preventing direct database access from compute services.
In a multi-region OpenStack deployment, which Keystone component must be synchronized across regions?
-
A
Keystone tokens must be generated in the primary region and propagated to secondary regions
-
B
The identity backend (LDAP/SQL) for user and project data, while tokens are region-specific
✓ Correct
-
C
Only the token validation cache needs synchronization; identities are always local
-
D
All service catalogs must be identical across every region's Keystone instance
Explanation
In multi-region deployments, the identity backend (users, projects, roles) must be synchronized or shared across regions, but tokens and service catalogs can be region-specific to reflect local services.
Which tool is used to validate and troubleshoot OpenStack configuration files syntax before deployment?
-
A
Ansible playbook syntax checking with --syntax-check
-
B
openstack-config-validator or manual validation with configuration file parsers
✓ Correct
-
C
The openstack CLI with the --validate-config flag
-
D
Python's configparser module directly without additional tools
Explanation
While openstack-config-validator exists for some validations, configuration syntax is typically validated through direct parsing and error messages during service startup. The openstack CLI and Ansible are not configuration validators.
When setting up volume snapshots in Cinder, what consideration must be made for encrypted volumes?
-
A
The Glance service automatically handles snapshot encryption independently
-
B
Encrypted volumes cannot be snapshotted and require volume cloning instead
-
C
Snapshots must be encrypted with a different key than the source volume
-
D
Snapshots inherit the encryption settings from the source volume; decryption keys must remain accessible
✓ Correct
Explanation
Snapshots of encrypted volumes inherit the encryption configuration, and the encryption key must remain available for both snapshot creation and restoration. The snapshot maintains the same encryption properties as the source.
Which Horizon setting enables you to customize the dashboard's appearance and branding for different organizations?
-
A
LOCAL_SETTINGS.py with custom CSS and logo configuration in HORIZON_CONFIG dictionary
✓ Correct
-
B
Keystone domain-specific configurations that apply styling per domain
-
C
The dashboard_branding.conf file in /etc/openstack-dashboard/
-
D
Nova image metadata tags that control Horizon visual themes automatically
Explanation
Horizon customization is done through LOCAL_SETTINGS.py where you can configure HORIZON_CONFIG dictionary with custom logos, CSS, and branding options for different organizations.
In Ironic, what is the purpose of the 'power state' field versus the 'provisioning state' field?
-
A
Power state manages hypervisor power; provisioning state manages storage allocation
-
B
Power state is for the BMC controller; provisioning state is for the operating system kernel
-
C
Both fields serve the same purpose and can be used interchangeably
-
D
Power state indicates hardware power status; provisioning state indicates the OS deployment progress
✓ Correct
Explanation
In Ironic, power state represents the actual hardware power status (on/off), while provisioning state tracks the deployment lifecycle (active, deploying, deployed, error), providing distinct visibility into hardware and software state.
You need to create a new project in OpenStack with specific resource quotas. Which command-line tool would you use to manage project creation and quota assignment?
-
A
horizon dashboard only, CLI tools cannot set quotas
-
B
keystone tenant-create with glance quota-manage
-
C
nova project-create followed by cinder quota-update
-
D
openstack project create with openstack quota set
✓ Correct
Explanation
The openstack project create command creates projects, and openstack quota set configures resource limits. These are the modern, unified OpenStack CLI tools for this task.
An instance is in an ERROR state and needs to be recovered. What is the first diagnostic step you should take?
-
A
Check the instance console log and nova-compute logs for error messages
✓ Correct
-
B
Migrate the instance to another compute node
-
C
Delete the instance and launch a new one
-
D
Immediately hard reboot the instance
Explanation
Checking console logs and nova-compute logs provides the root cause of the error state, allowing for targeted troubleshooting rather than destructive actions.
You are configuring Neutron with ML2 plugin. Which of the following correctly describes the role of mechanism drivers?
-
A
Mechanism drivers handle authentication and authorization for network API requests
-
B
Mechanism drivers manage the core network segmentation and VLAN assignment at the database level
-
C
Mechanism drivers implement the actual configuration on networking hardware and virtual switching infrastructure
✓ Correct
-
D
Mechanism drivers filter incoming network traffic and enforce security policies on the control plane
Explanation
Mechanism drivers are responsible for translating logical network configurations into actual device configurations on switches, hypervisors, and other network infrastructure.
When configuring Cinder for multi-backend support, how do you specify which backend a volume should be created on?
-
A
Through the scheduler_default_filters configuration option
-
B
By setting the default_volume_backend parameter in cinder.conf
-
C
Using the --backend flag when running cinder volume-create
-
D
Through the volume_backend_name in the volume type extra specs
✓ Correct
Explanation
The volume_backend_name property in volume type extra specs is the standard way to direct volume creation to a specific backend in a multi-backend Cinder deployment.
Your OpenStack deployment experiences intermittent connectivity issues between instances on different compute nodes. What is the most likely cause?
-
A
The nova-conductor service is overloaded
-
B
The Glance image cache is full
-
C
Insufficient RAM allocated to instances
-
D
Network connectivity or VXLAN/tunnel configuration issues between compute nodes and network nodes
✓ Correct
Explanation
Inter-node instance connectivity depends on proper overlay network configuration (VXLAN tunnels) and network node connectivity; issues here directly cause intermittent cross-node communication problems.
Which of the following statements about OpenStack role-based access control (RBAC) is correct?
-
A
All users in a project automatically have admin role permissions for that project
-
B
A user can be assigned different roles in different projects or domains
✓ Correct
-
C
Roles are defined globally and cannot be customized per project
-
D
The member role has the same permissions as the admin role but with read-only access
Explanation
Keystone supports flexible role assignment where users can have different roles across different projects and domains, allowing fine-grained access control.
You need to migrate a running instance from one compute node to another with zero downtime. Which migration method should you use?
-
A
Snapshot and restore, which captures the instance state and rebuilds it
-
B
Live migration, which keeps the instance running throughout the migration process
✓ Correct
-
C
Cold migration, which pauses the instance briefly during transfer
-
D
Evacuation, which terminates and restarts the instance on the target node
Explanation
Live migration (also called true migration) maintains instance uptime by transferring memory and disk state while the instance continues running, ensuring zero-downtime migration.
In Keystone, what is the primary purpose of a domain?
-
A
To configure SSL certificates and TLS encryption for API endpoints
-
B
To create an isolated namespace for projects, users, and roles with separate authentication
✓ Correct
-
C
To manage compute resource allocation and scheduling policies
-
D
To define network subnets and routing policies for instances
Explanation
Domains in Keystone provide administrative isolation and separate authentication namespaces, allowing multiple independent project hierarchies within a single OpenStack deployment.
What is the correct order of operations for safely shutting down a compute node in OpenStack?
-
A
Remove the node from the availability zone, wait 30 minutes, then shut down services
-
B
Shut down all instances, then stop the nova-compute service
-
C
Disable the node, migrate or evacuate instances, stop nova-compute, perform maintenance
✓ Correct
-
D
Stop nova-compute immediately, then manually migrate all instances
Explanation
The correct procedure is to disable the node first (preventing new instance scheduling), then migrate running instances away, and finally stop services to ensure a clean shutdown.
You are configuring Swift for a highly available deployment. Which component is responsible for ensuring data replication across multiple servers?
-
A
The Ring and the Replicator daemon
✓ Correct
-
B
The Container Server only
-
C
The Dispatcher service with load balancing configuration
-
D
The Swift Proxy Server
Explanation
The Ring defines data placement across the cluster, and the Replicator daemon actively maintains replicas by copying objects across devices and servers to maintain the desired replication factor.
An image in Glance is marked as 'protected'. What is the primary effect of this setting?
-
A
The image is encrypted and requires a password to access
-
B
The image cannot be downloaded or used to launch instances
-
C
The image is read-only and cannot be modified by any user
-
D
The image cannot be deleted unless the protected flag is removed
✓ Correct
Explanation
The protected flag in Glance prevents accidental deletion of critical images; the image remains fully usable but cannot be deleted while the flag is active.
When configuring Nova with placement service, what is the primary function of placement?
-
A
To encrypt instance data at rest using encryption keys
-
B
To track resource inventory and make scheduling decisions based on available resources
✓ Correct
-
C
To monitor instance performance metrics and health status
-
D
To manage instance networking and assign IP addresses dynamically
Explanation
The Placement service maintains real-time inventory of compute resources and helps Nova's scheduler make intelligent decisions about instance placement based on available resources.
Your organization requires that all block storage volumes be encrypted. Where should this be configured?
-
A
In the volume type definition with encryption settings and key manager configuration
✓ Correct
-
B
At the hypervisor level in libvirt configuration files
-
C
In Horizon dashboard under Project Settings > Storage Encryption
-
D
In the instance launch parameters using the --encrypted flag
Explanation
Volume encryption is configured through volume type definitions in Cinder, specifying the encryption algorithm and integration with a key manager like Barbican.
What is the relationship between Nova flavors and compute node resources?
-
A
Flavors specify instance resource requests that must fit within available compute node resources
✓ Correct
-
B
Flavors automatically scale compute node resources when instances exceed flavor specifications
-
C
Flavors are purely cosmetic and do not affect resource allocation
-
D
Flavors define guaranteed resource allocations that supersede actual physical resources
Explanation
Flavors define vCPU, memory, and disk requirements for instances; the scheduler uses these specifications to ensure instances are placed on compute nodes with sufficient resources.
In an OpenStack deployment with multiple regions, how are user credentials and authentication shared across regions?
-
A
A centralized Keystone service issues tokens that are valid across all regions
✓ Correct
-
B
Users must re-authenticate separately for each region they access
-
C
Regions use federated identity with SAML or OpenID Connect
-
D
Each region maintains separate Keystone deployments with replicated user databases
Explanation
In a multi-region deployment, a centralized Keystone issues tokens with cross-region validity, allowing users to access resources across regions with a single authentication.
When configuring Neutron security groups, which direction of traffic does a security group rule control by default?
-
A
Only ingress traffic; egress is controlled separately
✓ Correct
-
B
Neither, security groups only control east-west traffic between instances
-
C
Both ingress and egress traffic in a single rule
-
D
Only egress traffic; ingress requires network ACLs
Explanation
Security group rules explicitly control either ingress or egress traffic; each rule specifies its direction, and default behavior typically denies all traffic unless explicitly allowed.
You need to reclaim disk space from a Cinder volume that has been deleted. What operation should be performed on the underlying storage backend?
-
A
Run the cinder-manage volume purge command
-
B
Execute filesystem garbage collection and TRIM/UNMAP commands on the storage
✓ Correct
-
C
Manually delete volume files using SSH access to the storage controller
-
D
Restart the cinder-volume service to clear the cache
Explanation
After volume deletion, filesystem-level operations like TRIM/UNMAP commands inform the storage that blocks are no longer in use, allowing the backend to reclaim space.
What is the primary advantage of using Heat orchestration templates in OpenStack?
-
A
To bypass Keystone authentication for faster resource provisioning
-
B
To define and provision complete infrastructure stacks as code with version control
✓ Correct
-
C
To graphically design instance networks without writing code
-
D
To automatically encrypt all resources created by the template
Explanation
Heat templates enable infrastructure-as-code, allowing complex multi-resource applications to be defined declaratively, version controlled, and repeatedly deployed consistently.
In a Neutron deployment using DVR (Distributed Virtual Routing), where does routing occur for instances?
-
A
Routing is determined by external hardware switches and cannot be modified
-
B
All routing is centralized on the network node controller
-
C
Routing occurs on each compute node where instances are running, with only centralized SNAT
✓ Correct
-
D
Each instance performs its own routing using internal virtual routing software
Explanation
DVR distributes routing to compute nodes for improved scalability and performance; the network node handles only SNAT for external traffic, reducing a critical bottleneck.
Which service is responsible for managing and provisioning bare metal nodes in OpenStack?
-
A
Ironic
✓ Correct
-
B
Magnum
-
C
Glance
-
D
Senlin
Explanation
Ironic is the OpenStack service dedicated to provisioning and managing bare metal servers, providing PXE boot, hardware inventory, and lifecycle management.
When backing up OpenStack metadata, which database contains the most critical information that should be protected?
-
A
The Glance image cache database
-
B
The MariaDB/MySQL database used by Keystone, Nova, Neutron, and Cinder
✓ Correct
-
C
The Swift container metadata database
-
D
The Placement service SQLite database
Explanation
The central relational database stores all OpenStack service metadata including authentication, projects, instances, networks, and volumes; its loss would be catastrophic.
You are troubleshooting a port that appears to be down in Neutron. What is the first command to check the port status and details?
-
A
neutron port-show <port-id>
-
B
openstack port show <port-id>
✓ Correct
-
C
ovs-vsctl get Interface <port-id> status
-
D
ip link show <port-name>
Explanation
The openstack port show command (modern CLI) retrieves comprehensive port status and configuration details from Neutron, making it the first diagnostic step.
In OpenStack, what is the purpose of availability zones in Nova?
-
A
To enforce network isolation between different user projects
-
B
To define different SLA levels for instance availability guarantees
-
C
To separate different cloud providers within a single OpenStack deployment
-
D
To group compute nodes for redundancy and allow instance placement across failure domains
✓ Correct
Explanation
Availability zones group compute nodes (typically by physical location or failure domain), allowing users to distribute instances across zones to improve fault tolerance.
A user reports that they cannot create a snapshot of a running instance. What is the most likely cause?
-
A
The user lacks the member role in the project containing the instance
-
B
The volume_backend_name is not configured in the instance flavor
-
C
The instance has insufficient available disk space in its root volume
-
D
The instance is using a file-based image format that does not support live snapshots
✓ Correct
Explanation
Live snapshots of running instances may fail if the backing image uses formats that don't support consistent snapshots; cold snapshots after instance pause often work better.
When configuring OpenStack with Keystone using fernet tokens, what is a critical operational requirement?
-
A
Fernet keys must be manually rotated every 24 hours to maintain security
-
B
Fernet requires external PKI infrastructure and cannot be self-contained
-
C
Fernet keys must be identical on all Keystone nodes and rotated periodically using keystone-manage
✓ Correct
-
D
Fernet tokens require synchronous database replication for validity checking
Explanation
Fernet tokens require synchronized keys across all Keystone instances and periodic rotation; key distribution and management is critical for multi-node Keystone deployments.
You need to configure Neutron to support multiple external networks for different tenant projects. Which mechanism driver combination best supports this requirement?
-
A
ML2 with linuxbridge and VLAN segmentation only
-
B
ML2 with OVN and distributed gateway ports
-
C
monolithic plugin with single flat network provider
-
D
ML2 with Open vSwitch and multiple bridge mappings
✓ Correct
Explanation
ML2 driver with OVS supports multiple external networks through bridge mappings that connect different physical networks to different external network providers. This is the standard approach for multi-external-network setups.
An instance fails to launch with error 'No valid host was found.' You suspect Nova scheduler filter issues. Which file should you examine first?
-
A
/etc/nova/nova.conf scheduler section and enabled_filters parameter
✓ Correct
-
B
The Glance image properties for missing hw_architecture metadata tags
-
C
The hypervisor's libvirt.conf configuration for resource definitions
-
D
/var/log/nova/nova-conductor.log for placement service errors
Explanation
The scheduler filters in nova.conf determine which hosts are eligible for instance placement. The enabled_filters parameter controls which filters are active, making this the first place to verify scheduler configuration.
You are implementing role-based access control in Keystone. A user should be able to list instances across all projects but only modify instances in their own project. How should this be configured?
-
A
Create a separate Keystone domain for read-only access and assign the user to both domains
-
B
Grant the user 'reader' role on admin project and 'member' role on their own project
-
C
Create a custom policy in /etc/nova/policy.json that uses scope and project_id in the rule definitions
✓ Correct
-
D
Assign 'admin' role globally and configure Nova to filter results based on project membership
Explanation
Nova policy.json allows fine-grained control using scope-based policies that can grant read access across projects while restricting write operations to a user's own project. This is the proper way to implement scoped RBAC in OpenStack.
During a Cinder backup operation, the backup fails with 'Insufficient space in backup backend.' Which configuration parameter controls where backups are stored?
-
A
backup_share parameter in cinder.conf defines the NFS mount for backup storage
-
B
backup_volume_host is set in cinder.conf to point to a dedicated backup volume
-
C
backup_driver in cinder.conf specifies the backend, but the actual path is determined by the driver's mount point
✓ Correct
-
D
The backup_driver determines both the backend type and implicitly the storage location through driver-specific configuration
Explanation
The backup_driver parameter selects the backup backend driver (e.g., NFS, Ceph, Swift), but the actual storage path depends on how that specific driver is configured, typically through mount points or backend credentials.
Your Glance image service is experiencing slow uploads. You suspect the backend storage is the issue. Which storage backend would provide the fastest upload performance for large images?
-
A
Ceph RBD backend with slow network connectivity
-
B
Filesystem backend with local SSD storage
✓ Correct
-
C
Swift backend with multiple replica locations
-
D
HTTP backend pulling from remote web servers
Explanation
Filesystem backend with local SSD provides the lowest latency and highest throughput for image uploads, making it ideal for performance-critical scenarios. Remote and distributed backends introduce network latency.
You need to enable live migration for instances with attached Cinder volumes. Which configuration must be verified on the compute nodes?
-
A
The block_migration flag must be set to true and iSCSI initiator must be configured on all compute hosts
-
B
The cinder_api_insecure parameter must be set to true to allow volume attachment during migration
-
C
Shared storage between compute nodes is required; alternatively block_migration allows non-shared storage if enabled
✓ Correct
-
D
libvirt_live_migration_flag must include VIR_MIGRATE_PERSIST_DEST and compute nodes must have identical CPU models
Explanation
For live migration with Cinder volumes, you either need shared storage between compute nodes or must enable block_migration. Block migration allows copying instance storage during migration without requiring shared storage.
A tenant reports they cannot create security groups in a particular project. The project quota for security groups shows 10/10 used. What is the most likely cause?
-
A
The quota was intentionally set to zero by the administrator in quotas.conf
-
B
Security groups from deleted instances are not being automatically removed from quota counts
-
C
The security group driver is misconfigured and preventing quota updates
-
D
The default security group is consuming one of the quota limits for this project
✓ Correct
Explanation
Each project automatically gets a default security group created during project initialization, which counts against the security group quota. If the quota is 10 and 10 are used, the default group is likely occupying one slot.
You are configuring Heat to manage infrastructure as code. A Heat template fails to deploy because it references a resource that Heat cannot find in any catalog. Which file defines available Heat resource types?
-
A
The heat.conf parameter resource_plugins lists directories where custom resource plugins are loaded
-
B
Heat discovers resources dynamically from registered plugins; missing resources indicate the plugin package is not installed
✓ Correct
-
C
/usr/share/heat/heat-resource-registry.yaml defines standard and custom Heat resource mappings
-
D
The heat-api-cfn service automatically syncs available resources from AWS CloudFormation specifications
Explanation
Heat loads resource types from installed plugins. If a resource cannot be found, it indicates the required plugin package is missing. This is determined at runtime, not through static configuration files.
Your Ironic bare metal provisioning is failing with 'Failed to clean node.' Which Ironic conductor configuration is most likely the cause?
-
A
The cleaning_network_uuid parameter is not set or points to an invalid network that the node cannot reach
✓ Correct
-
B
The parallel_deploy_threads parameter is configured to a value higher than the number of available system threads
-
C
The image_cache_size is set too low to store the cleaning image needed for the operation
-
D
The enabled_hardware_types parameter does not include the correct hardware type for the node's IPMI interface
Explanation
Bare metal node cleaning requires a valid network where the node can boot and access cleaning tools. If cleaning_network_uuid is not configured or invalid, the cleaning operation will fail.
A Keystone token has expired and the user receives a 401 Unauthorized response. Which Keystone configuration parameter controls how long tokens remain valid before expiration?
-
A
token_expiration in keystone.conf sets the default validity period for all token types in seconds
✓ Correct
-
B
Each token type has its own expiration setting; Fernet uses fernet_token_expiry and UUID uses uuid_token_expiry in keystone.conf
-
C
token_cache_time controls both the token validity period and how long tokens are cached in memcached
-
D
The expiration time is determined by the token provider and varies: Fernet tokens use token_expiration, while UUID tokens use token_life_duration
Explanation
The token_expiration parameter in keystone.conf specifies the default validity duration for tokens in seconds, typically 3600 seconds (1 hour) by default. This applies across token types unless overridden.