关于“Implementing Role-Based Access Control with Google Kubernetes Engine”的评价

13167 条评价

Vasanth R. · 已于 over 4 years前审核

Aditya G. · 已于 over 4 years前审核

Bapu P. · 已于 over 4 years前审核

Bapu P. · 已于 over 4 years前审核

Phat L. · 已于 over 4 years前审核

Arjun P. · 已于 over 4 years前审核

Nazia B. · 已于 over 4 years前审核

Wilson F. · 已于 over 4 years前审核

Faced with issues during second task assessment

Artem P. · 已于 over 4 years前审核

Santiago A. · 已于 over 4 years前审核

LUCAS T. · 已于 over 4 years前审核

Jagadesh Kumar B. · 已于 over 4 years前审核

Abhijit B. · 已于 over 4 years前审核

Ashis Kumar P. · 已于 over 4 years前审核

Gokulan K. · 已于 over 4 years前审核

Dianna R. · 已于 over 4 years前审核

Trần Đ. · 已于 over 4 years前审核

The role and rolebinding do not work on user 2. I'm sure to have edited the provided file with the user2 email. The attempt of pod creation has this output: <user2>@cloudshell:~/ak8s/RBAC (<project_id>)$ kubectl create -f ./production-pod.yaml Error from server (Forbidden): error when creating "./production-pod.yaml": pods is forbidden: User "<user2_email>" cannot create resource "pods" in API group "" in the namespace "production": requires one of ["container.pods.create"] permission(s).

Riccardo C. · 已于 over 4 years前审核

Last verification step didn't work. The check functionality really needs to be improved. Here are my pods kubectl get pods --namespace production NAME READY STATUS RESTARTS AGE nginx 1/1 Running 0 10m production-pod 1/1 Running 0 80s

Tim W. · 已于 over 4 years前审核

Yosuke K. · 已于 over 4 years前审核

Srikanth V. · 已于 over 4 years前审核

Romualdo L. · 已于 over 4 years前审核

Eric F. · 已于 over 4 years前审核

great

Reinaldo F. · 已于 over 4 years前审核

done

Shailesh S. · 已于 over 4 years前审核

我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。