menu

Using Role-based Access Control in Kubernetes Engine

Go to Lab

256 Reviews

Alla D. · Reviewed environ une heure ago

Mathias V. · Reviewed environ 2 heures ago

Jonas J. · Reviewed environ 2 heures ago

bhanuchandra S. · Reviewed environ 20 heures ago

Ibrahim A. · Reviewed environ 20 heures ago

Terraform scripts are already creating server & pods so when owner running commands to create server it will throw error saying it is already created.

Sunil B. · Reviewed environ 20 heures ago

SANGHYUN K. · Reviewed 1 jour ago

Adisak L. · Reviewed 2 jours ago

Mohsin R. · Reviewed 3 jours ago

This lab had some issues with completing. It looks like you have to change provider.tf and downgrade the version from 2.17.0 to 2.12.0 provider "google" { project = var.project zone = var.zone version = "~> 2.12.0" }

Ted G. · Reviewed 4 jours ago

Ted G. · Reviewed 7 jours ago

Branko J. · Reviewed 7 jours ago

Bruno C. · Reviewed 8 jours ago

Pedro L. · Reviewed 8 jours ago

João P. · Reviewed 8 jours ago

Ricardo N. · Reviewed 8 jours ago

Alexandre P. · Reviewed 8 jours ago

Richard S. · Reviewed 8 jours ago

Kartik A. · Reviewed 9 jours ago

Kartik A. · Reviewed 9 jours ago

No scoring eh? A bit opaque on the roles being created / applied - left to reader to investigate deeper, not likely in time allowed.

Billy G. · Reviewed 9 jours ago

Aaryan C. · Reviewed 10 jours ago

Kim N. · Reviewed 10 jours ago

The "make validate" step preempts later lab activities by running kubectl operations on the cluster, which means that later steps have the wrong information.

Henry B. · Reviewed 11 jours ago

The "make validate" step preempts later lab activities by running kubectl operations on the cluster, which means that later steps have the wrong information.

Henry B. · Reviewed 11 jours ago