k8s cli
————————————————————————————————————————————————–
Time check, if date is not available on the pod, using temporary pod:
kubectl run -it –rm –image=busybox –restart=Never debug-pod –namespace=”namespace” — date
————————————————————————————————————————————————–
!!! kube-rbac-proxy
Inspect RBAC Policies
The kube-rbac-proxy enforces RBAC policies defined in Kubernetes. To check if an RBAC policy is causing the issue, you should inspect the roles and role bindings associated with the service or pod that is interacting with kube-rbac-proxy.
List Roles:
kubectl get roles -n "namespace"
kubectl get clusterroles
Inpect Role Bindings:
kubectl get rolebindings -n "namespace"
kubectl get clusterrolebindings