From 069f95148f8e73e4489a2996c1e4a76f8d091be5 Mon Sep 17 00:00:00 2001
From: ArthurSens <arthursens2005@gmail.com>
Date: Tue, 30 Mar 2021 19:00:12 +0000
Subject: [PATCH] Psp should be deployed at the same namespace as
 kube-prometheus stack

Signed-off-by: ArthurSens <arthursens2005@gmail.com>
---
 jsonnet/kube-prometheus/addons/podsecuritypolicies.libsonnet | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/jsonnet/kube-prometheus/addons/podsecuritypolicies.libsonnet b/jsonnet/kube-prometheus/addons/podsecuritypolicies.libsonnet
index 62825d7e..b072b9fb 100644
--- a/jsonnet/kube-prometheus/addons/podsecuritypolicies.libsonnet
+++ b/jsonnet/kube-prometheus/addons/podsecuritypolicies.libsonnet
@@ -59,6 +59,7 @@ local restrictedPodSecurityPolicy = {
       kind: 'Role',
       metadata: {
         name: 'alertmanager-' + $.values.alertmanager.name,
+        namespace: $.values.common.namespace,
       },
       rules: [{
         apiGroups: ['policy'],
@@ -73,6 +74,7 @@ local restrictedPodSecurityPolicy = {
       kind: 'RoleBinding',
       metadata: {
         name: 'alertmanager-' + $.values.alertmanager.name,
+        namespace: $.values.common.namespace,
       },
       roleRef: {
         apiGroup: 'rbac.authorization.k8s.io',
@@ -126,6 +128,7 @@ local restrictedPodSecurityPolicy = {
       kind: 'Role',
       metadata: {
         name: 'grafana',
+        namespace: $.values.common.namespace,
       },
       rules: [{
         apiGroups: ['policy'],
@@ -140,6 +143,7 @@ local restrictedPodSecurityPolicy = {
       kind: 'RoleBinding',
       metadata: {
         name: 'grafana',
+        namespace: $.values.common.namespace,
       },
       roleRef: {
         apiGroup: 'rbac.authorization.k8s.io',
-- 
GitLab