Salt (software) Interview Questions & Answers

Salt (software) Interview Questions

Salt (software) is software written in Python. Salt was developed for collecting data with high speeds. It is highly extensible, and modular. There are many modules that complete the software; those are Execution modules, State modules, Grains, Renderer modules, Returners, Runners. All these modules are specific for actions. Salt makes use of a central repository to provide new servers so that any changes to happen to existing servers are made. Good number of positions is available for the candidates. Good knowledge on operating systems will boost your confidence. Follow our Wisdomjobs page for Salt (software) interview questions and answers page to get through your job interview successfully in first attempt. Interview questions are exclusively designed for job seekers to assist them in clearing interviews.

Salt (software) Interview Questions And Answers

Salt (software) Interview Questions
    1. Question 1. Is Salt Open-core?

      Answer :

      No. Salt is 100% committed to being open-source, including all of our APIs. It is developed under the Apache 2.0 license, allowing it to be used in both open and proprietary projects.

      To expand on this a little:

      There is much argument over the actual definition of "open core". From our standpoint, Salt is open source because

      1. It is a standalone product that anyone is free to use.
      2. It is developed in the open with contributions accepted from the community for the good of the project.
      3. There are no features of Salt itself that are restricted to separate proprietary products distributed by SaltStack, Inc.
      4. Because of our Apache 2.0 license, Salt can be used as the foundation for a project or even a proprietary tool.
      5. Our APIs are open and documented (any lack of documentation is an oversight as opposed to an intentional decision by SaltStack the company) and available for use by anyone.

      SaltStack the company does make proprietary products which use Salt and its libraries, like company is free to do, but we do so via the APIs, NOT by forking Salt and creating a different, closed-source version of it for paying customers.

    2. Question 2. I Think I Found A Bug! What Should I Do?

      Answer :

      The salt-users mailing list as well as the salt IRC channel can both be helpful resources to confirm if others are seeing the issue and to assist with immediate debugging.

      To report a bug to the Salt project, please follow the instructions in reporting a bug.

    3. Question 3. What Ports Should I Open On My Firewall?

      Answer :

      Minions need to be able to connect to the Master on TCP ports 4505 and 4506. Minions do not need any inbound ports open.

    4. Question 4. My Script Runs Every Time I Run A State.apply. Why?

      Answer :

      You are probably using rather than cmd.wait. A cmd.wait state will only run when there has been a change in a state that it is watching.

      A state will run the corresponding command every time (unless it is prevented from running by the unless or onlyif arguments).

    5. Question 5. How Does Salt Determine The Minion's Id?

      Answer :

      If the Minion id is not configured explicitly (using the id parameter), Salt will determine the id based on the hostname.

    6. Question 6. I'm Trying To Manage Packages/services But I Get An Error Saying That The State Is Not Available. Why?

      Answer :

      Salt detects the Minion's operating system and assigns the correct package or service management module based on what is detected. However, for certain custom spins and OS derivatives this detection fails. In cases like this, an issue should be opened on our tracker, with the following information:

      1. The output of the following command:
      2. salt <minion_id> grains.items | grep os
      3. The contents of /etc/lsb-release, if present on the Minion.

    7. Question 7. Why Aren't My Custom Modules/states/etc. Available On My Minions?

      Answer :

      Custom modules are synced to Minions when saltutil.sync_modules, or saltutil.sync_all is run. Custom modules are also synced by state.apply when run without any arguments.

      Similarly, custom states are synced to Minions when state.apply, saltutil.sync_states, or saltutil.sync_all is run.

      Custom states are also synced by state.apply when run without any arguments.

      Other custom types (renderers, outputters, etc.) have similar behavior, see the documentation for the saltutilmodule for more information.

      This reactor example can be used to automatically sync custom types when the minion connects to the master, to help with this chicken-and-egg issue.

    8. Question 8. Module X Isn't Available, Even Though The Shell Command It Uses Is Installed. Why?

      Answer :

      This is most likely a PATH issue. Did you custom-compile the software which the module requires? RHEL/CentOS/etc. in particular override the root user's path in /etc/init.d/functions, setting it to /sbin:/usr/sbin:/bin:/usr/bin, making software installed into /usr/local/bin unavailable to Salt when the Minion is started using the initscript. In version 2014.1.0, Salt will have a better solution for these sort of PATH-related issues, but recompiling the software to install it into a location within the PATH should resolve the issue in the meantime. Alternatively, you can create a symbolic link within the PATH using a file.symlink state.



          - target: /usr/local/bin/foo

    9. Question 9. Can I Run Different Versions Of Salt On My Master And Minion?

      Answer :

      This depends on the versions. In general, it is recommended that Master and Minion versions match.

      When upgrading Salt, the master(s) should always be upgraded first. Backwards compatibility for minions running newer versions of salt than their masters is not guaranteed.

      Whenever possible, backwards compatibility between new masters and old minions will be preserved. Generally, the only exception to this policy is in case of a security vulnerability.

      Recent examples of backwards compatibility breakage include the 0.17.1 release (where all backwards compatibility was broken due to a security fix), and the 2014.1.0 release (which retained compatibility between 2014.1.0 masters and 0.17 minions, but broke compatibility for 2014.1.0 minions and older masters).

    10. Question 10. Does Salt Support Backing Up Managed Files?

      Answer :

      Yes. Salt provides an easy to use addition to your file.managed states that allow you to back up files via backup_mode, backup_mode can be configured on a per state basis, or in the minion config (note that if set in the minion config this would simply be the default method to use, you still need to specify that the file should be backed up!).

    11. Question 11. Is It Possible To Deploy A File To A Specific Minion, Without Other Minions Having Access To It?

      Answer :

      The Salt fileserver does not yet support access control, but it is still possible to do this. As of Salt 2015.5.0, thefile_tree external pillar is available, and allows the contents of a file to be loaded as Pillar data. This external pillar is capable of assigning Pillar values both to individual minions, and to nodegroups. See the documentation for details on how to set this up.

      Once the external pillar has been set up, the data can be pushed to a minion via a file.managed state, using thecontents_pillar argument:



          - user: secret
          - group: secret
          - mode: 600
          - contents_pillar: secret_files:my_super_secret_file

      In this example, the source file would be located in a directory called secret_files underneath the file_tree path for the minion. The syntax for specifying the pillar variable is the same one used for pillar.get, with a colon representing a nested dictionary.

    12. Question 12. What Is The Best Way To Restart A Salt Minion Daemon Using Salt After Upgrade?

      Answer :

      Updating the salt-minion package requires a restart of the salt-minion service. But restarting the service while in the middle of a state run interrupts the process of the Minion running states and sending results back to the Master. A common way to workaround that is to schedule restarting of the Minion service using masterless mode after all other states have been applied. This allows the minion to keep Minion to Master connection alive for the Minion to report the final results to the Master, while the service is restarting in the background.

    13. Question 13. Upgrade Without Automatic Restart?

      Answer :

      Doing the Minion upgrade seems to be a simplest state in your SLS file at first. But the operating systems such as Debian GNU/Linux, Ubuntu and their derivatives start the service after the package installation by default. To prevent this, we need to create policy layer which will prevent the Minion service to restart right after the upgrade:

      {%- if grains['os_family'] == 'Debian' %}
      Disable starting services:
          - name: /usr/sbin/policy-rc.d
          - user: root
          - group: root
          - mode: 0755
          - contents:
            - '#!/bin/sh'
            - exit 101
          # do not touch if already exists
          - replace: False
          - prereq:
            - pkg: Upgrade Salt Minion
      {%- endif %}
      Upgrade Salt Minion:
          - name: salt-minion
          - version: 2016.11.3{% if grains['os_family'] == 'Debian' %}+ds-1{% endif %}
          - order: last
      Enable Salt Minion:
          - name: salt-minion
          - require:
            - pkg: Upgrade Salt Minion
      {%- if grains['os_family'] == 'Debian' %}
      Enable starting services:
          - name: /usr/sbin/policy-rc.d
          - onchanges:
            - pkg: Upgrade Salt Minion
      {%- endif %}

    14. Question 14. Restart Using States?

      Answer :

      Now we can apply the workaround to restart the Minion in reliable way. The following example works on both UNIX-like and Windows operating systems:

      Restart Salt Minion:
      {%- if grains['kernel'] == 'Windows' %}
          - name: 'C:saltsalt-call.bat --local service.restart salt-minion'
      {%- else %}
          - name: 'salt-call --local service.restart salt-minion'
      {%- endif %}
          - bg: True
          - onchanges:
            - pkg: Upgrade Salt Minion

      However, it requires more advanced tricks to upgrade from legacy version of Salt (before 2016.3.0), where executing commands in the background is not supported:

      Restart Salt Minion:
      {%- if grains['kernel'] == 'Windows' %}
          - name: 'start powershell "Restart-Service -Name salt-minion"'
      {%- else %}
          # fork and disown the process
          - name: |-
              exec 0>&- # close stdin
              exec 1>&- # close stdout
              exec 2>&- # close stderr
             nohup salt-call --local service.restart salt-minion &
      {%- endif %}

    15. Question 15. Restart Using Remote Executions?

      Answer :

      Restart the Minion from the command line:

      salt -G kernel:Windows cmd.run_bg 'C:saltsalt-call.bat --local service.restart salt-minion'

      salt -C 'not G@kernel:Windows' cmd.run_bg 'salt-call --local service.restart salt-minion'

    16. Question 16. Salting The Salt Master?

      Answer :

      In order to configure a master server via states, the Salt master can also be "salted" in order to enforce state on the Salt master as well as the Salt minions. Salting the Salt master requires a Salt minion to be installed on the same machine as the Salt master. Once the Salt minion is installed, the minion configuration file must be pointed to the local Salt master:


      Once the Salt master has been "salted" with a Salt minion, it can be targeted just like any other minion. If the minion on the salted master is running, the minion can be targeted via any usual salt command. Additionally, the salt-callcommand can execute operations to enforce state on the salted master without requiring the minion to be running.

    17. Question 17. Is Targeting Using Grain Data Secure?

      Answer :

      Because grains can be set by users that have access to the minion configuration files on the local system, grains are considered less secure than other identifiers in Salt. Use caution when targeting sensitive operations or setting pillar values based on grain data.

      When possible, you should target sensitive operations and data using the Minion ID. If the Minion ID of a system changes, the Salt Minion's public key must be re-accepted by an administrator on the Salt Master, making it less vulnerable to impersonation attacks.

    18. Question 18. Why Did The Value For A Grain Change On Its Own?

      Answer :

      This is usually the result of an upstream change in an OS distribution that replaces or removes something that Salt was using to detect the grain. Fortunately, when this occurs,

      you can use Salt to fix it with a command similar to the following:

      salt -G 'grain:ChangedValue' grains.setvals "{'grain': 'OldValue'}"

      (Replacing grain, ChangedValue, and OldValue with the grain and values that you want to change / set.)

      You should also file an issue describing the change so it can be fixed in Salt.

Popular Interview Questions

All Interview Questions

All Practice Tests

All rights reserved © 2020 Wisdom IT Services India Pvt. Ltd Protection Status

Software Development Lifecycle (SDLC) Tutorial