v1beta1.ClusterRoleBinding

    You are viewing documentation for a release that is no longer supported. The latest supported version of version 3 is [3.11]. For the most recent version 4, see

    ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.

    Expand or mouse-over a field for more information about it.

    Create a ClusterRoleBinding

    HTTP request

    1. Authorization: Bearer $TOKEN
    2. Accept: application/json
    3. Connection: close
    4. Content-Type: application/json'
    5. {
    6. "kind": "ClusterRoleBinding",
    7. "apiVersion": "rbac.authorization.k8s.io/v1beta1",
    8. ...
    9. }

    Curl request

    1. $ curl -k \
    2. -X POST \
    3. -d @- \
    4. -H "Authorization: Bearer $TOKEN" \
    5. -H 'Accept: application/json' \
    6. -H 'Content-Type: application/json' \
    7. https://$ENDPOINT/apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings <<'EOF'
    8. {
    9. "kind": "ClusterRoleBinding",
    10. "apiVersion": "rbac.authorization.k8s.io/v1beta1",
    11. ...
    12. }
    13. EOF

    HTTP body

    Query parameters

    ParameterDescription

    pretty

    If ‘true’, then the output is pretty printed.

    Responses

    HTTP CodeSchema

    200 OK

    v1beta1.ClusterRoleBinding

    401 Unauthorized

    Consumes

    • */*

    Produces

    • application/json

    • application/yaml

    • application/vnd.kubernetes.protobuf

    Get a ClusterRoleBinding

    Read the specified ClusterRoleBinding

    HTTP request

    1. GET /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/$NAME HTTP/1.1
    2. Authorization: Bearer $TOKEN
    3. Accept: application/json
    4. Connection: close

    Curl request

    1. $ curl -k \
    2. -H "Authorization: Bearer $TOKEN" \
    3. -H 'Accept: application/json' \
    4. https://$ENDPOINT/apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/$NAME

    Path parameters

    ParameterDescription

    name

    name of the ClusterRoleBinding

    Query parameters

    ParameterDescription

    pretty

    If ‘true’, then the output is pretty printed.

    Responses

    HTTP CodeSchema

    200 OK

    v1beta1.ClusterRoleBinding

    401 Unauthorized

    Consumes

    • */*

    Produces

    • application/json

    • application/yaml

    • application/vnd.kubernetes.protobuf

    Get all ClusterRoleBindings

    List or watch objects of kind ClusterRoleBinding

    HTTP request

    1. GET /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings HTTP/1.1
    2. Authorization: Bearer $TOKEN
    3. Accept: application/json

    Curl request

    Query parameters

    ParameterDescription

    pretty

    If ‘true’, then the output is pretty printed.

    fieldSelector

    A selector to restrict the list of returned objects by their fields. Defaults to everything.

    includeUninitialized

    If true, partially initialized resources are included in the response.

    labelSelector

    A selector to restrict the list of returned objects by their labels. Defaults to everything.

    resourceVersion

    When specified with a watch call, shows changes that occur after that particular version of a resource. Defaults to changes from the beginning of history. When specified for list: - if unset, then the result is returned from remote storage based on quorum-read flag; - if it’s 0, then we simply return what we currently have in cache, no guarantee; - if set to non zero, then the result is at least as fresh as given rv.

    timeoutSeconds

    Timeout for the list/watch call.

    watch

    Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.

    Responses

    HTTP CodeSchema

    200 OK

    v1beta1.ClusterRoleBindingList

    401 Unauthorized

    Consumes

    • */*

    Produces

    • application/json

    • application/yaml

    • application/vnd.kubernetes.protobuf

    • application/json;stream=watch

    • application/vnd.kubernetes.protobuf;stream=watch

    Watch changes to an object of kind ClusterRoleBinding

    HTTP request

    1. GET /apis/rbac.authorization.k8s.io/v1beta1/watch/clusterrolebindings/$NAME HTTP/1.1
    2. Authorization: Bearer $TOKEN
    3. Accept: application/json
    4. Connection: close

    Curl request

    1. $ curl -k \
    2. -H "Authorization: Bearer $TOKEN" \
    3. -H 'Accept: application/json' \
    4. https://$ENDPOINT/apis/rbac.authorization.k8s.io/v1beta1/watch/clusterrolebindings/$NAME

    Path parameters

    ParameterDescription

    name

    name of the ClusterRoleBinding

    Query parameters

    Responses

    HTTP CodeSchema

    200 OK

    v1.WatchEvent

    401 Unauthorized

    Consumes

    • */*

    Produces

    • application/json

    • application/yaml

    • application/vnd.kubernetes.protobuf

    • application/json;stream=watch

    • application/vnd.kubernetes.protobuf;stream=watch

    Watch all ClusterRoleBindings

    Watch individual changes to a list of ClusterRoleBinding

    HTTP request

    1. GET /apis/rbac.authorization.k8s.io/v1beta1/watch/clusterrolebindings HTTP/1.1
    2. Authorization: Bearer $TOKEN
    3. Accept: application/json
    4. Connection: close

    Curl request

    1. $ curl -k \
    2. -H "Authorization: Bearer $TOKEN" \
    3. -H 'Accept: application/json' \
    4. https://$ENDPOINT/apis/rbac.authorization.k8s.io/v1beta1/watch/clusterrolebindings

    Query parameters

    ParameterDescription

    fieldSelector

    A selector to restrict the list of returned objects by their fields. Defaults to everything.

    includeUninitialized

    If true, partially initialized resources are included in the response.

    labelSelector

    A selector to restrict the list of returned objects by their labels. Defaults to everything.

    pretty

    If ‘true’, then the output is pretty printed.

    resourceVersion

    When specified with a watch call, shows changes that occur after that particular version of a resource. Defaults to changes from the beginning of history. When specified for list: - if unset, then the result is returned from remote storage based on quorum-read flag; - if it’s 0, then we simply return what we currently have in cache, no guarantee; - if set to non zero, then the result is at least as fresh as given rv.

    timeoutSeconds

    Timeout for the list/watch call.

    watch

    Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.

    Responses

    HTTP CodeSchema

    200 OK

    v1.WatchEvent

    401 Unauthorized

    Consumes

    • */*

    Produces

    • application/json

    • application/vnd.kubernetes.protobuf

    • application/json;stream=watch

    • application/vnd.kubernetes.protobuf;stream=watch

    Update a ClusterRoleBinding

    Replace the specified ClusterRoleBinding

    HTTP request

    1. PUT /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/$NAME HTTP/1.1
    2. Authorization: Bearer $TOKEN
    3. Accept: application/json
    4. Connection: close
    5. Content-Type: application/json'
    6. {
    7. "kind": "ClusterRoleBinding",
    8. "apiVersion": "rbac.authorization.k8s.io/v1beta1",
    9. ...
    10. }

    Curl request

    HTTP body

    ParameterSchema

    body

    v1beta1.ClusterRoleBinding

    Path parameters

    ParameterDescription

    name

    name of the ClusterRoleBinding

    Query parameters

    ParameterDescription

    pretty

    If ‘true’, then the output is pretty printed.

    Responses

    HTTP CodeSchema

    200 OK

    v1beta1.ClusterRoleBinding

    401 Unauthorized

    Consumes

    • */*

    Produces

    • application/json

    • application/yaml

    • application/vnd.kubernetes.protobuf

    HTTP request

    1. PATCH /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/$NAME HTTP/1.1
    2. Authorization: Bearer $TOKEN
    3. Accept: application/json
    4. Connection: close
    5. Content-Type: application/json-patch+json'
    6. {
    7. }

    Curl request

    1. $ curl -k \
    2. -X PATCH \
    3. -d @- \
    4. -H "Authorization: Bearer $TOKEN" \
    5. -H 'Accept: application/json' \
    6. -H 'Content-Type: application/json-patch+json' \
    7. https://$ENDPOINT/apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/$NAME <<'EOF'
    8. {
    9. ...
    10. }
    11. EOF

    HTTP body

    ParameterSchema

    body

    v1.Patch

    Path parameters

    Query parameters

    ParameterDescription

    pretty

    If ‘true’, then the output is pretty printed.

    Responses

    HTTP CodeSchema

    200 OK

    v1beta1.ClusterRoleBinding

    401 Unauthorized

    Consumes

    • application/json-patch+json

    • application/merge-patch+json

    • application/strategic-merge-patch+json

    Produces

    • application/json

    • application/yaml

    • application/vnd.kubernetes.protobuf

    Delete a ClusterRoleBinding

    Delete a ClusterRoleBinding

    HTTP request

    1. DELETE /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/$NAME HTTP/1.1
    2. Authorization: Bearer $TOKEN
    3. Accept: application/json
    4. Connection: close
    5. Content-Type: application/json'
    6. {
    7. ...
    8. }

    Curl request

    1. $ curl -k \
    2. -X DELETE \
    3. -d @- \
    4. -H "Authorization: Bearer $TOKEN" \
    5. -H 'Accept: application/json' \
    6. -H 'Content-Type: application/json' \
    7. https://$ENDPOINT/apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/$NAME <<'EOF'
    8. {
    9. ...
    10. }
    11. EOF

    HTTP body

    ParameterSchema

    body

    v1.DeleteOptions

    Path parameters

    ParameterDescription

    name

    name of the ClusterRoleBinding

    Query parameters

    ParameterDescription

    pretty

    If ‘true’, then the output is pretty printed.

    gracePeriodSeconds

    The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately.

    orphanDependents

    Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the “orphan” finalizer will be added to/removed from the object’s finalizers list. Either this field or PropagationPolicy may be set, but not both.

    propagationPolicy

    Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy.

    Responses

    HTTP CodeSchema

    200 OK

    v1.Status

    401 Unauthorized

    Consumes

    • */*

    Produces

    • application/json

    • application/yaml

    • application/vnd.kubernetes.protobuf

    Delete all ClusterRoleBindings

    Delete collection of ClusterRoleBinding

    HTTP request

    1. DELETE /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings HTTP/1.1
    2. Authorization: Bearer $TOKEN
    3. Connection: close

    Curl request

    Query parameters

    ParameterDescription

    pretty

    If ‘true’, then the output is pretty printed.

    fieldSelector

    A selector to restrict the list of returned objects by their fields. Defaults to everything.

    includeUninitialized

    If true, partially initialized resources are included in the response.

    labelSelector

    A selector to restrict the list of returned objects by their labels. Defaults to everything.

    resourceVersion

    When specified with a watch call, shows changes that occur after that particular version of a resource. Defaults to changes from the beginning of history. When specified for list: - if unset, then the result is returned from remote storage based on quorum-read flag; - if it’s 0, then we simply return what we currently have in cache, no guarantee; - if set to non zero, then the result is at least as fresh as given rv.

    timeoutSeconds

    Timeout for the list/watch call.

    watch

    Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.

    Responses

    HTTP CodeSchema

    200 OK

    v1.Status

    401 Unauthorized

    Consumes

    • */*

    Produces

    • application/json