k8s cli

————————————————————————————————————————————————–

Time check, if date is not available on the pod, using temporary pod:

kubectl run -it –rm –image=busybox –restart=Never debug-pod –namespace=”namespace” — date

————————————————————————————————————————————————–

!!! kube-rbac-proxy

Inspect RBAC Policies

The kube-rbac-proxy enforces RBAC policies defined in Kubernetes. To check if an RBAC policy is causing the issue, you should inspect the roles and role bindings associated with the service or pod that is interacting with kube-rbac-proxy.

List Roles:

kubectl get roles -n "namespace"
kubectl get clusterroles

Inpect Role Bindings:

kubectl get rolebindings -n "namespace"
kubectl get clusterrolebindings