From 3216dfdc00e39bfd4cc791cc6fcaecf6f97e4cf2 Mon Sep 17 00:00:00 2001 From: Jesus Angulo Date: Sun, 30 Jun 2019 21:06:02 -0500 Subject: [PATCH] Fix incorrect command rendered (#949) When you read docs the command about enabling RBAC permissions for Kubernetes integration are badly rendered. --- docs/features/kubernetes.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/features/kubernetes.rst b/docs/features/kubernetes.rst index be23845b..75568ec4 100644 --- a/docs/features/kubernetes.rst +++ b/docs/features/kubernetes.rst @@ -25,7 +25,7 @@ If you have services deployed in kubernetes you will normally use the naming ser You can replicate a Permissive. Using RBAC role bindings. `Permissive RBAC Permissions `_, k8s api server and token will read from pod . -.. code-block::json +.. code-block::bash kubectl create clusterrolebinding permissive-binding --clusterrole=cluster-admin --user=admin --user=kubelet --group=system:serviceaccounts The following example shows how to set up a ReRoute that will work in kubernetes. The most important thing is the ServiceName which is made up of the