Implementing Role-Based Access Control with Google Kubernetes Engine Reviews

13167 reviews

Vasanth R. · Reviewed over 4 years ago

Aditya G. · Reviewed over 4 years ago

Bapu P. · Reviewed over 4 years ago

Bapu P. · Reviewed over 4 years ago

Phat L. · Reviewed over 4 years ago

Arjun P. · Reviewed over 4 years ago

Nazia B. · Reviewed over 4 years ago

Wilson F. · Reviewed over 4 years ago

Faced with issues during second task assessment

Artem P. · Reviewed over 4 years ago

Santiago A. · Reviewed over 4 years ago

LUCAS T. · Reviewed over 4 years ago

Jagadesh Kumar B. · Reviewed over 4 years ago

Abhijit B. · Reviewed over 4 years ago

Ashis Kumar P. · Reviewed over 4 years ago

Gokulan K. · Reviewed over 4 years ago

Dianna R. · Reviewed over 4 years ago

Trần Đ. · Reviewed over 4 years ago

The role and rolebinding do not work on user 2. I'm sure to have edited the provided file with the user2 email. The attempt of pod creation has this output: <user2>@cloudshell:~/ak8s/RBAC (<project_id>)$ kubectl create -f ./production-pod.yaml Error from server (Forbidden): error when creating "./production-pod.yaml": pods is forbidden: User "<user2_email>" cannot create resource "pods" in API group "" in the namespace "production": requires one of ["container.pods.create"] permission(s).

Riccardo C. · Reviewed over 4 years ago

Last verification step didn't work. The check functionality really needs to be improved. Here are my pods kubectl get pods --namespace production NAME READY STATUS RESTARTS AGE nginx 1/1 Running 0 10m production-pod 1/1 Running 0 80s

Tim W. · Reviewed over 4 years ago

Yosuke K. · Reviewed over 4 years ago

Srikanth V. · Reviewed over 4 years ago

Romualdo L. · Reviewed over 4 years ago

Eric F. · Reviewed over 4 years ago

great

Reinaldo F. · Reviewed over 4 years ago

done

Shailesh S. · Reviewed over 4 years ago

We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.