Skip to content
GitLab
Explore
Projects
Groups
Topics
Snippets
Projects
Groups
Topics
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Register
Sign in
Toggle navigation
Menu
UPSMF
uphrh-sb-devops
Commits
347f7f6d
Commit
347f7f6d
authored
1 year ago
by
Nikhil Varma
Browse files
Options
Download
Patches
Plain Diff
psp deleted
parent
663dc84c
release-5.1.0-upsmf-prod
release-5.1.0
No related merge requests found
Changes
6
Hide whitespace changes
Inline
Side-by-side
Showing
6 changed files
kubernetes/helm_charts/monitoring/prometheus-operator/charts/grafana/templates/podsecuritypolicy.yaml
+0
-52
...-operator/charts/grafana/templates/podsecuritypolicy.yaml
kubernetes/helm_charts/monitoring/prometheus-operator/charts/kube-state-metrics/templates/podsecuritypolicy.yaml
+0
-39
...harts/kube-state-metrics/templates/podsecuritypolicy.yaml
kubernetes/helm_charts/monitoring/prometheus-operator/charts/prometheus-node-exporter/templates/psp.yaml
+0
-52
...erator/charts/prometheus-node-exporter/templates/psp.yaml
kubernetes/helm_charts/monitoring/prometheus-operator/templates/alertmanager/psp.yaml
+0
-53
...oring/prometheus-operator/templates/alertmanager/psp.yaml
kubernetes/helm_charts/monitoring/prometheus-operator/templates/prometheus-operator/psp.yaml
+0
-51
...rometheus-operator/templates/prometheus-operator/psp.yaml
kubernetes/helm_charts/monitoring/prometheus-operator/templates/prometheus/psp.yaml
+0
-56
...itoring/prometheus-operator/templates/prometheus/psp.yaml
with
0 additions
and
303 deletions
+0
-303
kubernetes/helm_charts/monitoring/prometheus-operator/charts/grafana/templates/podsecuritypolicy.yaml
deleted
100755 → 0
+
0
−
52
View file @
663dc84c
{{
- if .Values.rbac.pspEnabled
}}
apiVersion
:
policy/v1beta1
kind
:
PodSecurityPolicy
metadata
:
name
:
{{
template "grafana.fullname" .
}}
namespace
:
{{
template "grafana.namespace" .
}}
labels
:
{{
- include "grafana.labels" . | nindent 4
}}
annotations
:
seccomp.security.alpha.kubernetes.io/allowedProfileNames
:
'
docker/default'
seccomp.security.alpha.kubernetes.io/defaultProfileName
:
'
docker/default'
{{
- if .Values.rbac.pspUseAppArmor
}}
apparmor.security.beta.kubernetes.io/allowedProfileNames
:
'
runtime/default'
apparmor.security.beta.kubernetes.io/defaultProfileName
:
'
runtime/default'
{{
- end
}}
spec
:
privileged
:
false
allowPrivilegeEscalation
:
false
requiredDropCapabilities
:
# Default set from Docker, without DAC_OVERRIDE or CHOWN
-
FOWNER
-
FSETID
-
KILL
-
SETGID
-
SETUID
-
SETPCAP
-
NET_BIND_SERVICE
-
NET_RAW
-
SYS_CHROOT
-
MKNOD
-
AUDIT_WRITE
-
SETFCAP
volumes
:
-
'
configMap'
-
'
emptyDir'
-
'
projected'
-
'
secret'
-
'
downwardAPI'
-
'
persistentVolumeClaim'
hostNetwork
:
false
hostIPC
:
false
hostPID
:
false
runAsUser
:
rule
:
'
RunAsAny'
seLinux
:
rule
:
'
RunAsAny'
supplementalGroups
:
rule
:
'
RunAsAny'
fsGroup
:
rule
:
'
RunAsAny'
readOnlyRootFilesystem
:
false
{{
- end
}}
This diff is collapsed.
Click to expand it.
kubernetes/helm_charts/monitoring/prometheus-operator/charts/kube-state-metrics/templates/podsecuritypolicy.yaml
deleted
100755 → 0
+
0
−
39
View file @
663dc84c
{{
- if .Values.podSecurityPolicy.enabled
}}
apiVersion
:
policy/v1beta1
kind
:
PodSecurityPolicy
metadata
:
name
:
{{
template "kube-state-metrics.fullname" .
}}
labels
:
app.kubernetes.io/name
:
{{
template "kube-state-metrics.name" .
}}
helm.sh/chart
:
{{
.Chart.Name
}}
-{{ .Chart.Version }}
app.kubernetes.io/managed-by
:
{{
.Release.Service
}}
app.kubernetes.io/instance
:
{{
.Release.Name
}}
{{
- if .Values.podSecurityPolicy.annotations
}}
annotations
:
{{
toYaml .Values.podSecurityPolicy.annotations | indent 4
}}
{{
- end
}}
spec
:
privileged
:
false
volumes
:
-
'
secret'
hostNetwork
:
false
hostIPC
:
false
hostPID
:
false
runAsUser
:
rule
:
'
MustRunAsNonRoot'
seLinux
:
rule
:
'
RunAsAny'
supplementalGroups
:
rule
:
'
MustRunAs'
ranges
:
# Forbid adding the root group.
-
min
:
1
max
:
65535
fsGroup
:
rule
:
'
MustRunAs'
ranges
:
# Forbid adding the root group.
-
min
:
1
max
:
65535
readOnlyRootFilesystem
:
false
{{
- end
}}
This diff is collapsed.
Click to expand it.
kubernetes/helm_charts/monitoring/prometheus-operator/charts/prometheus-node-exporter/templates/psp.yaml
deleted
100755 → 0
+
0
−
52
View file @
663dc84c
{{
- if .Values.rbac.create
}}
{{
- if .Values.rbac.pspEnabled
}}
apiVersion
:
policy/v1beta1
kind
:
PodSecurityPolicy
metadata
:
name
:
{{
template "prometheus-node-exporter.fullname" .
}}
namespace
:
{{
template "prometheus-node-exporter.namespace" .
}}
labels
:
{{
include "prometheus-node-exporter.labels" . | indent 4
}}
spec
:
privileged
:
false
# Required to prevent escalations to root.
# allowPrivilegeEscalation: false
# This is redundant with non-root + disallow privilege escalation,
# but we can provide it for defense in depth.
#requiredDropCapabilities:
# - ALL
# Allow core volume types.
volumes
:
-
'
configMap'
-
'
emptyDir'
-
'
projected'
-
'
secret'
-
'
downwardAPI'
-
'
persistentVolumeClaim'
-
'
hostPath'
hostNetwork
:
true
hostIPC
:
false
hostPID
:
true
hostPorts
:
-
min
:
0
max
:
65535
runAsUser
:
# Permits the container to run with root privileges as well.
rule
:
'
RunAsAny'
seLinux
:
# This policy assumes the nodes are using AppArmor rather than SELinux.
rule
:
'
RunAsAny'
supplementalGroups
:
rule
:
'
MustRunAs'
ranges
:
# Forbid adding the root group.
-
min
:
0
max
:
65535
fsGroup
:
rule
:
'
MustRunAs'
ranges
:
# Forbid adding the root group.
-
min
:
0
max
:
65535
readOnlyRootFilesystem
:
false
{{
- end
}}
{{
- end
}}
This diff is collapsed.
Click to expand it.
kubernetes/helm_charts/monitoring/prometheus-operator/templates/alertmanager/psp.yaml
deleted
100755 → 0
+
0
−
53
View file @
663dc84c
{{
- if and .Values.global.rbac.create .Values.global.rbac.pspEnabled
}}
apiVersion
:
policy/v1beta1
kind
:
PodSecurityPolicy
metadata
:
name
:
{{
template "prometheus-operator.fullname" .
}}
-alertmanager
namespace
:
{{
$.Release.Namespace
}}
labels
:
app
:
{{
template "prometheus-operator.name" .
}}
-alertmanager
{{
- if .Values.global.rbac.pspAnnotations
}}
annotations
:
{{
toYaml .Values.global.rbac.pspAnnotations | indent 4
}}
{{
- end
}}
{{
include "prometheus-operator.labels" . | indent 4
}}
spec
:
privileged
:
false
# Required to prevent escalations to root.
# allowPrivilegeEscalation: false
# This is redundant with non-root + disallow privilege escalation,
# but we can provide it for defense in depth.
#requiredDropCapabilities:
# - ALL
# Allow core volume types.
volumes
:
-
'
configMap'
-
'
emptyDir'
-
'
projected'
-
'
secret'
-
'
downwardAPI'
-
'
persistentVolumeClaim'
hostNetwork
:
false
hostIPC
:
false
hostPID
:
false
runAsUser
:
# Permits the container to run with root privileges as well.
rule
:
'
RunAsAny'
seLinux
:
# This policy assumes the nodes are using AppArmor rather than SELinux.
rule
:
'
RunAsAny'
supplementalGroups
:
rule
:
'
MustRunAs'
ranges
:
# Forbid adding the root group.
-
min
:
0
max
:
65535
fsGroup
:
rule
:
'
MustRunAs'
ranges
:
# Forbid adding the root group.
-
min
:
0
max
:
65535
readOnlyRootFilesystem
:
false
{{
- end
}}
This diff is collapsed.
Click to expand it.
kubernetes/helm_charts/monitoring/prometheus-operator/templates/prometheus-operator/psp.yaml
deleted
100755 → 0
+
0
−
51
View file @
663dc84c
{{
- if and .Values.global.rbac.create .Values.global.rbac.pspEnabled
}}
apiVersion
:
policy/v1beta1
kind
:
PodSecurityPolicy
metadata
:
name
:
{{
template "prometheus-operator.fullname" .
}}
-operator
namespace
:
{{
$.Release.Namespace
}}
labels
:
app
:
{{
template "prometheus-operator.name" .
}}
-operator
{{
- if .Values.global.rbac.pspAnnotations
}}
annotations
:
{{
toYaml .Values.global.rbac.pspAnnotations | indent 4
}}
{{
- end
}}
{{
include "prometheus-operator.labels" . | indent 4
}}
spec
:
privileged
:
false
# Required to prevent escalations to root.
# allowPrivilegeEscalation: false
# This is redundant with non-root + disallow privilege escalation,
# but we can provide it for defense in depth.
#requiredDropCapabilities:
# - ALL
# Allow core volume types.
volumes
:
-
'
configMap'
-
'
emptyDir'
-
'
projected'
-
'
secret'
-
'
downwardAPI'
-
'
persistentVolumeClaim'
hostNetwork
:
false
hostIPC
:
false
hostPID
:
false
runAsUser
:
# Permits the container to run with root privileges as well.
rule
:
'
RunAsAny'
seLinux
:
# This policy assumes the nodes are using AppArmor rather than SELinux.
rule
:
'
RunAsAny'
supplementalGroups
:
rule
:
'
MustRunAs'
ranges
:
# Forbid adding the root group.
-
min
:
0
max
:
65535
fsGroup
:
rule
:
'
MustRunAs'
ranges
:
# Forbid adding the root group.
-
min
:
0
max
:
65535
readOnlyRootFilesystem
:
false
{{
- end
}}
This diff is collapsed.
Click to expand it.
kubernetes/helm_charts/monitoring/prometheus-operator/templates/prometheus/psp.yaml
deleted
100755 → 0
+
0
−
56
View file @
663dc84c
{{
- if and .Values.global.rbac.create .Values.global.rbac.pspEnabled
}}
apiVersion
:
policy/v1beta1
kind
:
PodSecurityPolicy
metadata
:
name
:
{{
template "prometheus-operator.fullname" .
}}
-prometheus
namespace
:
{{
$.Release.Namespace
}}
labels
:
app
:
{{
template "prometheus-operator.name" .
}}
-prometheus
{{
- if .Values.global.rbac.pspAnnotations
}}
annotations
:
{{
toYaml .Values.global.rbac.pspAnnotations | indent 4
}}
{{
- end
}}
{{
include "prometheus-operator.labels" . | indent 4
}}
spec
:
privileged
:
false
# Required to prevent escalations to root.
# allowPrivilegeEscalation: false
# This is redundant with non-root + disallow privilege escalation,
# but we can provide it for defense in depth.
#requiredDropCapabilities:
# - ALL
# Allow core volume types.
volumes
:
-
'
configMap'
-
'
emptyDir'
-
'
projected'
-
'
secret'
-
'
downwardAPI'
-
'
persistentVolumeClaim'
hostNetwork
:
false
hostIPC
:
false
hostPID
:
false
runAsUser
:
# Permits the container to run with root privileges as well.
rule
:
'
RunAsAny'
seLinux
:
# This policy assumes the nodes are using AppArmor rather than SELinux.
rule
:
'
RunAsAny'
supplementalGroups
:
rule
:
'
MustRunAs'
ranges
:
# Forbid adding the root group.
-
min
:
0
max
:
65535
fsGroup
:
rule
:
'
MustRunAs'
ranges
:
# Forbid adding the root group.
-
min
:
0
max
:
65535
readOnlyRootFilesystem
:
false
{{
- if .Values.prometheus.podSecurityPolicy.allowedCapabilities
}}
allowedCapabilities
:
{{
toYaml .Values.prometheus.podSecurityPolicy.allowedCapabilities | indent 4
}}
{{
- end
}}
{{
- end
}}
This diff is collapsed.
Click to expand it.
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment
Menu
Explore
Projects
Groups
Topics
Snippets