diff --git a/manifests/monitoring-civo/promtail.yaml b/manifests/monitoring-civo/promtail.yaml index b076d0a..d52e147 100644 --- a/manifests/monitoring-civo/promtail.yaml +++ b/manifests/monitoring-civo/promtail.yaml @@ -6,38 +6,6 @@ metadata: labels: app.kubernetes.io/name: promtail --- -apiVersion: policy/v1beta1 -kind: PodSecurityPolicy -metadata: - name: promtail - namespace: monitoring - labels: - app.kubernetes.io/name: promtail -spec: - allowPrivilegeEscalation: false - fsGroup: - rule: RunAsAny - hostIPC: false - hostNetwork: false - hostPID: false - privileged: false - readOnlyRootFilesystem: true - requiredDropCapabilities: - - ALL - runAsUser: - rule: RunAsAny - seLinux: - rule: RunAsAny - supplementalGroups: - rule: RunAsAny - volumes: - - secret - - configMap - - hostPath - - projected - - downwardAPI - - emptyDir ---- apiVersion: v1 kind: ConfigMap metadata: @@ -244,35 +212,6 @@ roleRef: name: promtail-clusterrole apiGroup: rbac.authorization.k8s.io --- -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: promtail - namespace: monitoring - labels: - app.kubernetes.io/name: promtail -rules: -- apiGroups: ['extensions'] - resources: ['podsecuritypolicies'] - verbs: ['use'] - resourceNames: [promtail] ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: promtail - namespace: monitoring - labels: - app.kubernetes.io/name: promtail -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: promtail -subjects: -- kind: ServiceAccount - name: promtail ---- - apiVersion: apps/v1 kind: DaemonSet metadata: diff --git a/manifests/monitoring/promtail.yaml b/manifests/monitoring/promtail.yaml index 3485b38..c74a40c 100644 --- a/manifests/monitoring/promtail.yaml +++ b/manifests/monitoring/promtail.yaml @@ -6,38 +6,6 @@ metadata: labels: app.kubernetes.io/name: promtail --- -apiVersion: policy/v1beta1 -kind: PodSecurityPolicy -metadata: - name: promtail - namespace: monitoring - labels: - app.kubernetes.io/name: promtail -spec: - allowPrivilegeEscalation: false - fsGroup: - rule: RunAsAny - hostIPC: false - hostNetwork: false - hostPID: false - privileged: false - readOnlyRootFilesystem: true - requiredDropCapabilities: - - ALL - runAsUser: - rule: RunAsAny - seLinux: - rule: RunAsAny - supplementalGroups: - rule: RunAsAny - volumes: - - secret - - configMap - - hostPath - - projected - - downwardAPI - - emptyDir ---- apiVersion: v1 kind: ConfigMap metadata: @@ -222,34 +190,6 @@ roleRef: name: promtail-clusterrole apiGroup: rbac.authorization.k8s.io --- -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: promtail - namespace: monitoring - labels: - app.kubernetes.io/name: promtail -rules: -- apiGroups: ['extensions'] - resources: ['podsecuritypolicies'] - verbs: ['use'] - resourceNames: [promtail] ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: promtail - namespace: monitoring - labels: - app.kubernetes.io/name: promtail -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: promtail -subjects: -- kind: ServiceAccount - name: promtail ---- apiVersion: apps/v1 kind: DaemonSet