You can switch the cluster/configuration context using the following command: [desk@cli] $kubectl config use-context prod-account
Context: A Role bound to a Pod's ServiceAccount grants overly permissive permissions. Complete the following tasks to reduce the set of permissions. Task: Given an existing Pod namedweb-podrunning in the namespacedatabase. 1. Edit the existing Role bound to the Pod's ServiceAccounttest-sato only allow performing get operations, only on resources of type Pods. 2. Create a new Role namedtest-role-2in the namespacedatabase, which only allows performingupdateoperations, only on resources of typestatuefulsets. 3. Create a new RoleBinding namedtest-role-2-bindbinding the newly created Role to the Pod's ServiceAccount. Note: Don't delete the existing RoleBinding.
Kimi
29 days agoMelda
10 days agoJusta
11 days agoEva
15 days agoNina
1 months agoSalome
9 days agoLeah
18 days agoWilda
30 days agoIra
1 months agoLeatha
2 months agoIra
2 months ago