All Products
Search
Document Center

Container Service for Kubernetes:DescribeUserClusterNamespaces

Last Updated:Mar 26, 2025

You can use Kubernetes namespaces to limit users from accessing resources in a Container Service for Kubernetes (ACK) cluster. Users that are granted Role-Based Access Control (RBAC) permissions only on one namespace cannot access resources in other namespaces. Queries the RBAC permissions that are granted to the current Resource Access Management (RAM) user or RAM role on an ACK cluster.

Debugging

You can run this interface directly in OpenAPI Explorer, saving you the trouble of calculating signatures. After running successfully, OpenAPI Explorer can automatically generate SDK code samples.

Authorization information

There is currently no authorization information disclosed in the API.

Request syntax

GET /api/v2/k8s/{ClusterId}/namespaces HTTP/1.1

Request parameters

ParameterTypeRequiredDescriptionExample
ClusterIdstringYes

The ID of the cluster.

c5b5e80b0b64a4bf6939d2d8fbbc5****

Response parameters

ParameterTypeDescriptionExample
array

The list of namespaces that the current RAM user is authorized to access.

namespacestring

The list of namespaces that are visible to the RAM user.

[ "default", "kube-node-lease", "kube-public", "kube-system" ]

Examples

Sample success responses

JSONformat

[
  "[   \"default\",   \"kube-node-lease\",   \"kube-public\",   \"kube-system\" ]"
]

Error codes

For a list of error codes, visit the Service error codes.

Change history

Change timeSummary of changesOperation
No change history