Bird
0
0

You created a RoleBinding but the user still cannot access pods. What is the most likely cause?

medium📝 Troubleshoot Q14 of 15
Kubernetes - RBAC and Security
You created a RoleBinding but the user still cannot access pods. What is the most likely cause?
AThe RoleBinding references a Role that does not exist
BThe user is not logged into the cluster
CThe RoleBinding is missing the apiVersion field
DThe RoleBinding uses ClusterRole instead of Role
Step-by-Step Solution
Solution:
  1. Step 1: Check RoleBinding references

    If the RoleBinding points to a Role that does not exist, permissions won't apply.
  2. Step 2: Verify Role existence

    Without the referenced Role, Kubernetes cannot grant permissions, causing access failure.
  3. Final Answer:

    The RoleBinding references a Role that does not exist -> Option A
  4. Quick Check:

    RoleBinding must reference an existing Role [OK]
Quick Trick: Always verify Role exists before binding [OK]
Common Mistakes:
  • Ignoring Role existence and blaming user login
  • Assuming missing apiVersion causes access denial
  • Confusing Role with ClusterRole in RoleBinding

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More Kubernetes Quizzes