关于“Implementing Role-Based Access Control with Google Kubernetes Engine”的评价
正在加载…
未找到任何结果。

在 Google Cloud 控制台中运用您的技能

关于“Implementing Role-Based Access Control with Google Kubernetes Engine”的评价

评论

Oleh C. · 评论almost 3 years之前

Giosuè R. · 评论almost 3 years之前

Rajashekar M. · 评论almost 3 years之前

It's fine

Ryan C. · 评论almost 3 years之前

Adam N. · 评论almost 3 years之前

Oren L. · 评论almost 3 years之前

Alex D. · 评论almost 3 years之前

Lotem D. · 评论almost 3 years之前

Itay I. · 评论almost 3 years之前

Eyal G. · 评论almost 3 years之前

Liron H. · 评论almost 3 years之前

Bar V. · 评论almost 3 years之前

Prasanna A. · 评论almost 3 years之前

Sreekanth K. · 评论almost 3 years之前

This will fail indicating that Username 2 does not have the correct permission to create Pods. Username 2 only has the viewer permissions it started the lab with at this point because you have not bound any other role to that account yet. Because K8S RBAC is distinct from GCP IAM, this isn't a full explanation. It would be nice to more thoroughly investigate the cluster role bindings to fully explain why USER_1 can deploy production pods but USER_2 cannot.

Justin P. · 评论almost 3 years之前

Vladyslav P. · 评论almost 3 years之前

David T. · 评论almost 3 years之前

Juliet O. · 评论almost 3 years之前

Nicolas M. · 评论almost 3 years之前

Jithin C. · 评论almost 3 years之前

Dmytro D. · 评论almost 3 years之前

Fernando C. · 评论almost 3 years之前

Moussa A. · 评论almost 3 years之前

Sergey M. · 评论almost 3 years之前

LOIC E. · 评论almost 3 years之前

我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。