This lab provides practice scenarios to help prepare you for the Certified Kubernetes Security Specialist (CKS) exam. You will be presented with tasks to complete, as well as server(s) and/or an existing Kubernetes cluster to complete them in. You will need to use your knowledge of Kubernetes to successfully complete the provided tasks, much like you would on the real CKS exam. Good luck!
Learning Objectives
Successfully complete this lab by achieving the following learning objectives:
- Fix a Pod’s Service Account That Has Too Many Permissions
- The
buffy
Pod in thesunnydale
namespace has abuffy-sa
ServiceAccount with permissions the Pod doesn’t need. Modify the attached Role so that it only has the ability tolist
pods
. - Then, create a new Role called
watch-services-secrets
that grants permission towatch
,services
, andsecrets
. - Bind the Role to the ServiceAccount with a RoleBinding called
buffy-sa-watch-rb
.
Note: You can find skeleton manifests for the new role and RoleBinding on the CLI server at:
/home/cloud_user/watch-services-secrets.yml
/home/cloud_user/buffy-sa-watch-rb.yml
- The
- Fix a Pod Configured to Use an Incorrect Service Account
A Pod in the cluster cannot be created properly because its ServiceAccount is misconfigured.
- The Pod is meant to live in the
bespin
namespace. Delete the existing ServiceAccount from this namespace. - Create a new ServiceAccount called
lando-sa
. - Configure the Pod to use the
lando-sa
ServiceAccount. - Create the Pod.
Note: You can find the Pod manifest at
/home/cloud_user/lando.yml
on the CLI server.- The Pod is meant to live in the