关于“Implementing Role-Based Access Control with Google Kubernetes Engine”的评价
评论
Vasanth R. · 评论over 4 years之前
Aditya G. · 评论over 4 years之前
Bapu P. · 评论over 4 years之前
Bapu P. · 评论over 4 years之前
Phat L. · 评论over 4 years之前
Arjun P. · 评论over 4 years之前
Nazia B. · 评论over 4 years之前
Wilson F. · 评论over 4 years之前
Faced with issues during second task assessment
Artem P. · 评论over 4 years之前
Santiago A. · 评论over 4 years之前
LUCAS T. · 评论over 4 years之前
Jagadesh Kumar B. · 评论over 4 years之前
Abhijit B. · 评论over 4 years之前
Ashis Kumar P. · 评论over 4 years之前
Gokulan K. · 评论over 4 years之前
Dianna R. · 评论over 4 years之前
Trần Đ. · 评论over 4 years之前
The role and rolebinding do not work on user 2. I'm sure to have edited the provided file with the user2 email. The attempt of pod creation has this output: <user2>@cloudshell:~/ak8s/RBAC (<project_id>)$ kubectl create -f ./production-pod.yaml Error from server (Forbidden): error when creating "./production-pod.yaml": pods is forbidden: User "<user2_email>" cannot create resource "pods" in API group "" in the namespace "production": requires one of ["container.pods.create"] permission(s).
Riccardo C. · 评论over 4 years之前
Last verification step didn't work. The check functionality really needs to be improved. Here are my pods kubectl get pods --namespace production NAME READY STATUS RESTARTS AGE nginx 1/1 Running 0 10m production-pod 1/1 Running 0 80s
Tim W. · 评论over 4 years之前
Yosuke K. · 评论over 4 years之前
Srikanth V. · 评论over 4 years之前
Romualdo L. · 评论over 4 years之前
Eric F. · 评论over 4 years之前
great
Reinaldo F. · 评论over 4 years之前
done
Shailesh S. · 评论over 4 years之前
我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。