diff --git a/README.md b/README.md index 8f08a15..663b0de 100644 --- a/README.md +++ b/README.md @@ -9,7 +9,7 @@ kube-advisor is a Go application that searches your cluster for Deployments, Sta Just run the pod by itself: ``` -$ kubectl run --rm -i -t kube-resource-checker --image=seanknox/kube-advisor:latest --restart=Never +$ kubectl run --rm -i -t kube-advisor --image=seanknox/kube-advisor:latest --restart=Never ``` ## Running in a Kubernetes cluster with RBAC enabled @@ -22,7 +22,7 @@ $ kubectl apply -f https://raw.githubusercontent.com/Azure/kube-advisor/master/s 2. Run the pod: ``` -$ kubectl run --rm -i -t kube-resource-checker --image=seanknox/kube-advisor:latest --restart=Never --overrides="{ \"apiVersion\": \"v1\", \"spec\": { \"serviceAccountName\": \"kube-resource-checker\" } }" +$ kubectl run --rm -i -t kube-advisor --image=seanknox/kube-advisor:latest --restart=Never --overrides="{ \"apiVersion\": \"v1\", \"spec\": { \"serviceAccountName\": \"kube-advisor\" } }" ``` 3. If desired, delete the service account and cluster role binding: diff --git a/sa.yaml b/sa.yaml index a1131b5..6be8288 100644 --- a/sa.yaml +++ b/sa.yaml @@ -1,19 +1,19 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: kube-resource-checker + name: kube-advisor namespace: default --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: - name: kube-resource-checker + name: kube-advisor roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - kind: ServiceAccount - name: kube-resource-checker + name: kube-advisor namespace: default