- Which authorization modules should not be used in a cluster?
- How can cluster administrators test permissions granted to a new user?
- Which authorization modes are recommended for production clusters?
- What is the difference between the
EventRateLimitand LimitRange admission controllers?
- Can you write a Rego policy to deny the creation of ingress with the