Kubernetes - RBAC and SecurityA ClusterRoleBinding is created but users still lack permissions. What could be wrong?AThe ClusterRoleBinding is applied in the wrong namespaceBThe ClusterRoleBinding references a Role instead of a ClusterRoleCThe ClusterRoleBinding is missing the apiVersion fieldDThe ClusterRoleBinding's subject kind is incorrectly set to 'Group' instead of 'User'Check Answer
Step-by-Step SolutionSolution:Step 1: Understand ClusterRoleBinding requirementsClusterRoleBinding must reference a ClusterRole, not a Role, because Roles are namespace-scoped.Step 2: Check other optionsSubject kind 'Group' is valid; ClusterRoleBindings are cluster-scoped and do not use namespaces; missing apiVersion causes YAML errors.Final Answer:The ClusterRoleBinding references a Role instead of a ClusterRole -> Option BQuick Check:ClusterRoleBinding must reference ClusterRole [OK]Quick Trick: ClusterRoleBinding links only to ClusterRole, not Role [OK]Common Mistakes:Using Role instead of ClusterRoleApplying ClusterRoleBinding in namespaceConfusing subject kinds
Master "RBAC and Security" in Kubernetes9 interactive learning modes - each teaches the same concept differentlyLearnWhyDeepVisualTryChallengeProjectRecallTime
More Kubernetes Quizzes Helm Package Manager - Upgrading and rolling back releases - Quiz 1easy Monitoring and Logging - Grafana for visualization - Quiz 3easy Monitoring and Logging - Why cluster monitoring matters - Quiz 14medium Operators and Custom Resources - Database operators example - Quiz 15hard Operators and Custom Resources - Why operators extend Kubernetes - Quiz 11easy Service Mesh - Istio overview - Quiz 3easy Service Mesh - Mutual TLS for service communication - Quiz 13medium Service Mesh - Linkerd as lightweight alternative - Quiz 5medium Service Mesh - Mutual TLS for service communication - Quiz 4medium Troubleshooting - Why troubleshooting skills are critical - Quiz 13medium