The cluster was on fire. Not with CPU overload, but with mismanaged identities. Roles leaking across namespaces. Orphaned accounts prowling like ghosts. And you knew it — because K9s showed you everything in sharp, merciless detail.
Identity management in Kubernetes isn’t a nice-to-have. It’s a survival skill. The moment RBAC gets sloppy, the whole system is one bad binding away from a mess. K9s can do more than browse pods. It can be your real-time map of who has access to what — and how close you are to giving the wrong service account the keys to the kingdom.
Start basic: List ServiceAccounts, Roles, RoleBindings. Scan for cross-namespace privileges. Use K9s’ filtering to zero in on suspicious patterns. That Role intended for a single team? Check if it’s bound to every account in the cluster. That admin-level ClusterRole? Trace its bindings until you’re sure you’re not handing admin to a CI job with no token expiry.
Good identity management in Kubernetes starts before there’s a problem. That means treating K9s as more than a dashboard. Keep it running while you make changes. Watch permission shifts happen live. Pair that with a policy engine so you can see violations before they hit production. Run it in staging with the same RBAC config you ship to prod and look for drift.