You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using kubectl resource-capacity in an environment with namespace-scoped permissions, the command attempts to list nodes by calling the Kubernetes API (v1 list nodes). This causes issues for users who do not have permissions to access node resources, resulting in errors or incomplete outputs.
In environments without node access, the command fails or cannot display the node-related information.
Feature Request:
Add an option to exclude node information from the output.
Prevent the command from making API calls to list nodes when this option is enabled.
This would allow users with namespace-scoped permissions to use kubectl resource-capacity without encountering permission errors.
Proposed Solution:
Introduce a flag (e.g., --exclude-nodes or --namespace-scope) that:
Omits node information from the output.
Skips any API calls that attempt to list or describe nodes.
Focuses solely on the resources within the specified namespace(s).
Benefits:
Enhances usability for users with limited permissions.
Aligns with Kubernetes' RBAC practices by respecting the user's scope.
Increases the tool's flexibility in various operational environments.
Additional Context:
Users operating in restricted environments (e.g., developers in a multi-tenant cluster) often have permissions only within certain namespaces. By avoiding unnecessary API calls that require cluster-wide permissions, the tool becomes more accessible and useful to a broader audience.
The text was updated successfully, but these errors were encountered:
Problem Statement:
When using
kubectl resource-capacity
in an environment with namespace-scoped permissions, the command attempts to list nodes by calling the Kubernetes API (v1
list nodes). This causes issues for users who do not have permissions to access node resources, resulting in errors or incomplete outputs.Example command:
In environments without node access, the command fails or cannot display the node-related information.
Feature Request:
This would allow users with namespace-scoped permissions to use
kubectl resource-capacity
without encountering permission errors.Proposed Solution:
Introduce a flag (e.g.,
--exclude-nodes
or--namespace-scope
) that:Benefits:
Additional Context:
Users operating in restricted environments (e.g., developers in a multi-tenant cluster) often have permissions only within certain namespaces. By avoiding unnecessary API calls that require cluster-wide permissions, the tool becomes more accessible and useful to a broader audience.
The text was updated successfully, but these errors were encountered: