All Products
Search
Document Center

Container Service for Kubernetes:DescribeUserClusterNamespaces

Last Updated:Apr 22, 2024

Queries the Role-Based Access Control (RBAC) permissions that are granted to the current Resource Access Management (RAM) user or RAM role on a Container Service for Kubernetes (ACK) cluster. You can use Kubernetes namespaces to limit users from accessing resources in an ACK cluster. Users that are granted RBAC permissions only on one namespace cannot access resources in other namespaces.

Debugging

OpenAPI Explorer automatically calculates the signature value. For your convenience, we recommend that you call this operation in OpenAPI Explorer.

Authorization information

There is currently no authorization information disclosed in the API.

Request syntax

GET /api/v2/k8s/{ClusterId}/namespaces

Request parameters

ParameterTypeRequiredDescriptionExample
ClusterIdstringYes

The ID of the cluster.

c5b5e80b0b64a4bf6939d2d8fbbc5****

Response parameters

ParameterTypeDescriptionExample
array

The list of namespaces that the current RAM user is authorized to access.

string

The list of namespaces that are visible to the RAM user.

[ "default", "kube-node-lease", "kube-public", "kube-system" ]

Examples

Sample success responses

JSONformat

[
  "[   \"default\",   \"kube-node-lease\",   \"kube-public\",   \"kube-system\" ]"
]

Error codes

For a list of error codes, visit the Service error codes.