From 4e01d81db2c969f1ba5767679fcd86f155094a56 Mon Sep 17 00:00:00 2001 From: Sean Suchter Date: Tue, 20 Mar 2018 14:29:12 -0700 Subject: [PATCH] Spurious change 2 --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 97cb8ab..7b67d00 100644 --- a/README.md +++ b/README.md @@ -2,6 +2,7 @@ layout: global title: Spark on Kubernetes Integration Tests --- +Spurious change 2 # Running the Kubernetes Integration Tests @@ -79,4 +80,4 @@ Reuse this tarball to save a significant amount of time if you are iterating on * `--service-account ` - set `` to the name of the Kubernetes service account to use in the namespace specified by the `--namespace`. The service account is expected to have permissions to get, list, watch, and create pods. For clusters with RBAC turned on, it's important that the right permissions are granted to the service account -in the namespace through an appropriate role and role binding. A reference RBAC configuration is provided in `dev/spark-rbac.yaml`. \ No newline at end of file +in the namespace through an appropriate role and role binding. A reference RBAC configuration is provided in `dev/spark-rbac.yaml`.