Kubernetes - RBAC and SecurityWhy does Kubernetes require separate RoleBindings and ClusterRoleBindings instead of using a single binding type for all scopes?ATo clearly separate namespace-scoped and cluster-scoped permissions for security and clarityBBecause ClusterRoleBindings are deprecated and replaced by RoleBindingsCTo allow RoleBindings to create users and ClusterRoleBindings to delete usersDBecause RoleBindings can only bind to ServiceAccountsCheck Answer
Step-by-Step SolutionSolution:Step 1: Understand RBAC designKubernetes separates RoleBindings and ClusterRoleBindings to distinguish between namespace-scoped and cluster-scoped permissions.Step 2: Security and clarity reasonsThis separation helps enforce security boundaries and makes permission management clearer.Final Answer:To clearly separate namespace-scoped and cluster-scoped permissions for security and clarity -> Option AQuick Check:Separate bindings = clear scope and security [OK]Quick Trick: RoleBindings = namespace scope; ClusterRoleBindings = cluster scope [OK]Common Mistakes:Thinking ClusterRoleBindings are deprecatedConfusing bindings with user managementAssuming RoleBindings only bind ServiceAccounts
Master "RBAC and Security" in Kubernetes9 interactive learning modes - each teaches the same concept differentlyLearnWhyDeepVisualTryChallengeProjectRecallTime
More Kubernetes Quizzes Helm Package Manager - Creating custom Helm charts - Quiz 13medium Helm Package Manager - Installing charts - Quiz 14medium Monitoring and Logging - Centralized logging (EFK stack) - Quiz 10hard Monitoring and Logging - Prometheus for metrics collection - Quiz 12easy Monitoring and Logging - Grafana for visualization - Quiz 14medium Operators and Custom Resources - OperatorHub for community operators - Quiz 6medium Production Best Practices - Pod Disruption Budgets - Quiz 10hard Service Mesh - Why service mesh matters - Quiz 14medium Service Mesh - Observability with service mesh - Quiz 1easy Troubleshooting - Node troubleshooting - Quiz 8hard