Queries the Role-Based Access Control (RBAC) permissions that are granted to the current Resource Access Management (RAM) user or RAM role on a Container Service for Kubernetes (ACK) cluster. You can use Kubernetes namespaces to limit users from accessing resources in an ACK cluster. Users that are granted RBAC permissions only on one namespace cannot access resources in other namespaces.
Debugging
Authorization information
There is currently no authorization information disclosed in the API.
Request syntax
GET /api/v2/k8s/{ClusterId}/namespaces
Request parameters
Parameter | Type | Required | Description | Example |
---|---|---|---|---|
ClusterId | string | Yes | The ID of the cluster. | c5b5e80b0b64a4bf6939d2d8fbbc5**** |
Response parameters
Examples
Sample success responses
JSON
format
[
"[ \"default\", \"kube-node-lease\", \"kube-public\", \"kube-system\" ]"
]
Error codes
For a list of error codes, visit the Service error codes.