Accessing the Cluster as a User
In this lesson, we will impersonate John and try to get the access authenticated.
Authentication
Since John is not around, we’ll do some role-playing and impersonate him.
Configuring kubectl
John will first have to set the cluster using the address and the certificate authority we sent him.
We created a new cluster called jdoe.
Please note that the command we executed created just another config entry ...
Access this course and 1600+ top-rated courses and projects.