From 069f95148f8e73e4489a2996c1e4a76f8d091be5 Mon Sep 17 00:00:00 2001 From: ArthurSens <arthursens2005@gmail.com> Date: Tue, 30 Mar 2021 19:00:12 +0000 Subject: [PATCH] Psp should be deployed at the same namespace as kube-prometheus stack Signed-off-by: ArthurSens <arthursens2005@gmail.com> --- jsonnet/kube-prometheus/addons/podsecuritypolicies.libsonnet | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/jsonnet/kube-prometheus/addons/podsecuritypolicies.libsonnet b/jsonnet/kube-prometheus/addons/podsecuritypolicies.libsonnet index 62825d7e..b072b9fb 100644 --- a/jsonnet/kube-prometheus/addons/podsecuritypolicies.libsonnet +++ b/jsonnet/kube-prometheus/addons/podsecuritypolicies.libsonnet @@ -59,6 +59,7 @@ local restrictedPodSecurityPolicy = { kind: 'Role', metadata: { name: 'alertmanager-' + $.values.alertmanager.name, + namespace: $.values.common.namespace, }, rules: [{ apiGroups: ['policy'], @@ -73,6 +74,7 @@ local restrictedPodSecurityPolicy = { kind: 'RoleBinding', metadata: { name: 'alertmanager-' + $.values.alertmanager.name, + namespace: $.values.common.namespace, }, roleRef: { apiGroup: 'rbac.authorization.k8s.io', @@ -126,6 +128,7 @@ local restrictedPodSecurityPolicy = { kind: 'Role', metadata: { name: 'grafana', + namespace: $.values.common.namespace, }, rules: [{ apiGroups: ['policy'], @@ -140,6 +143,7 @@ local restrictedPodSecurityPolicy = { kind: 'RoleBinding', metadata: { name: 'grafana', + namespace: $.values.common.namespace, }, roleRef: { apiGroup: 'rbac.authorization.k8s.io', -- GitLab