Pods are moving, logs stream fast, and now you can control who gets to see and touch this cluster.
K9S user management is more than adding names to a list. It is the guardrail between order and chaos in Kubernetes operations. With the right configuration, you decide which users can view resources, execute commands, or modify workloads—without breaking the cluster’s integrity.
At the core, K9S reads your kubeconfig to determine access. Each entry in kubeconfig maps to a Kubernetes context. Contexts define which cluster to use and which credentials to apply. By managing kubeconfig files and RBAC rules together, you control K9S permissions at scale.
RBAC (Role-Based Access Control) assigns roles and role bindings to users, groups, or service accounts. Create roles with kubectl defining allowed verbs and resources—like get, watch, list for pods, or update for deployments. Bind those roles to exact users from your kubeconfig. Once set, K9S enforces these permissions automatically.
For multi-team environments, separate contexts for each team. Store these in secure locations and distribute them only to authorized users. This way, K9S becomes a filtered lens over Kubernetes: one context shows production read-only access; another allows staging write access.