You can use Kubernetes namespaces to limit users from accessing resources in a Container Service for Kubernetes (ACK) cluster. Users that are granted Role-Based Access Control (RBAC) permissions only on one namespace cannot access resources in other namespaces. Queries the RBAC permissions that are granted to the current Resource Access Management (RAM) user or RAM role on an ACK cluster.
Debugging
Authorization information
There is currently no authorization information disclosed in the API.
Request syntax
GET /api/v2/k8s/{ClusterId}/namespaces HTTP/1.1
Request parameters
Parameter | Type | Required | Description | Example |
---|---|---|---|---|
ClusterId | string | Yes | The ID of the cluster. | c5b5e80b0b64a4bf6939d2d8fbbc5**** |
Response parameters
Examples
Sample success responses
JSON
format
[
"[ \"default\", \"kube-node-lease\", \"kube-public\", \"kube-system\" ]"
]
Error codes
For a list of error codes, visit the Service error codes.
Change history
Change time | Summary of changes | Operation |
---|
No change history