diff --git a/integrations/kubernetes-response-engine/deployment/cncf/Makefile b/integrations/kubernetes-response-engine/deployment/cncf/Makefile index 33d9e8b6..87c7a3e0 100644 --- a/integrations/kubernetes-response-engine/deployment/cncf/Makefile +++ b/integrations/kubernetes-response-engine/deployment/cncf/Makefile @@ -1,10 +1,11 @@ deploy: kubectl apply -f nats/ kubectl apply -f kubeless/ - kubectl apply -f network-policy.yaml + kubectl apply -f ../cluster-role.yaml kubectl apply -f . clean: kubectl delete -f kubeless/ kubectl delete -f nats/ kubectl delete -f . + kubectl delete -f ../cluster-role.yaml diff --git a/integrations/kubernetes-response-engine/deployment/cncf/rbac.yaml b/integrations/kubernetes-response-engine/deployment/cncf/cluster-role-binding.yaml similarity index 60% rename from integrations/kubernetes-response-engine/deployment/cncf/rbac.yaml rename to integrations/kubernetes-response-engine/deployment/cncf/cluster-role-binding.yaml index a97702c7..fd5df52a 100644 --- a/integrations/kubernetes-response-engine/deployment/cncf/rbac.yaml +++ b/integrations/kubernetes-response-engine/deployment/cncf/cluster-role-binding.yaml @@ -1,12 +1,13 @@ apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: sysdig-kubeless + name: kubernetes-response-engine-cluster-role-binding roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: cluster-admin + name: kubernetes-response-engine-cluster-role subjects: - kind: ServiceAccount name: default namespace: default + apiGroup: rbac.authorization.k8s.io