chore: mirror k8s-monitoring-2.0.12
upstream_repo:
This commit is contained in:
		@@ -0,0 +1,84 @@
 | 
			
		||||
{{- if and (index .Values "alloy-logs").enabled (eq .Values.global.platform "openshift") }}
 | 
			
		||||
{{- $usesHostPathVolumes := (index .Values "alloy-logs").alloy.mounts.varlog }}
 | 
			
		||||
---
 | 
			
		||||
apiVersion: security.openshift.io/v1
 | 
			
		||||
kind: SecurityContextConstraints
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-logs") }}
 | 
			
		||||
allowHostDirVolumePlugin: {{ $usesHostPathVolumes }}
 | 
			
		||||
allowHostIPC: false
 | 
			
		||||
allowHostNetwork: false
 | 
			
		||||
allowHostPID: false
 | 
			
		||||
allowHostPorts: false
 | 
			
		||||
allowPrivilegeEscalation: false
 | 
			
		||||
allowPrivilegedContainer: false
 | 
			
		||||
allowedCapabilities:
 | 
			
		||||
- CHOWN
 | 
			
		||||
- DAC_OVERRIDE
 | 
			
		||||
- FOWNER
 | 
			
		||||
- FSETID
 | 
			
		||||
- KILL
 | 
			
		||||
- SETGID
 | 
			
		||||
- SETUID
 | 
			
		||||
- SETPCAP
 | 
			
		||||
- NET_BIND_SERVICE
 | 
			
		||||
- NET_RAW
 | 
			
		||||
- SYS_CHROOT
 | 
			
		||||
- MKNOD
 | 
			
		||||
- AUDIT_WRITE
 | 
			
		||||
- SETFCAP
 | 
			
		||||
defaultAddCapabilities: null
 | 
			
		||||
defaultAllowPrivilegeEscalation: false
 | 
			
		||||
forbiddenSysctls:
 | 
			
		||||
- '*'
 | 
			
		||||
fsGroup:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
groups: []
 | 
			
		||||
priority: null
 | 
			
		||||
readOnlyRootFilesystem: false  # Set because Grafana Alloy needs to write to /tmp/alloy
 | 
			
		||||
requiredDropCapabilities: null
 | 
			
		||||
runAsUser:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
seLinuxContext:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
seccompProfiles:
 | 
			
		||||
  - runtime/default
 | 
			
		||||
supplementalGroups:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
users: []
 | 
			
		||||
volumes:
 | 
			
		||||
{{- if $usesHostPathVolumes }}
 | 
			
		||||
- hostPath
 | 
			
		||||
{{- end }}
 | 
			
		||||
- configMap
 | 
			
		||||
- emptyDir
 | 
			
		||||
- projected
 | 
			
		||||
- secret
 | 
			
		||||
---
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
kind: ClusterRole
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-logs") }}-scc
 | 
			
		||||
rules:
 | 
			
		||||
- verbs:
 | 
			
		||||
    - use
 | 
			
		||||
  apiGroups:
 | 
			
		||||
    - security.openshift.io
 | 
			
		||||
  resources:
 | 
			
		||||
    - securitycontextconstraints
 | 
			
		||||
  resourceNames:
 | 
			
		||||
    - {{ include "alloy.fullname" (index .Subcharts "alloy-logs") }}
 | 
			
		||||
---
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
kind: ClusterRoleBinding
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-logs") }}-scc
 | 
			
		||||
roleRef:
 | 
			
		||||
  apiGroup: rbac.authorization.k8s.io
 | 
			
		||||
  kind: ClusterRole
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-logs") }}-scc
 | 
			
		||||
subjects:
 | 
			
		||||
- kind: ServiceAccount
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-logs") }}
 | 
			
		||||
  namespace: {{ .Release.Namespace }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
@@ -0,0 +1,80 @@
 | 
			
		||||
{{- if and (index .Values "alloy-metrics").enabled (eq .Values.global.platform "openshift") }}
 | 
			
		||||
---
 | 
			
		||||
apiVersion: security.openshift.io/v1
 | 
			
		||||
kind: SecurityContextConstraints
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-metrics") }}
 | 
			
		||||
allowHostDirVolumePlugin: false
 | 
			
		||||
allowHostIPC: false
 | 
			
		||||
allowHostNetwork: false
 | 
			
		||||
allowHostPID: false
 | 
			
		||||
allowHostPorts: false
 | 
			
		||||
allowPrivilegeEscalation: false
 | 
			
		||||
allowPrivilegedContainer: false
 | 
			
		||||
allowedCapabilities:
 | 
			
		||||
- CHOWN
 | 
			
		||||
- DAC_OVERRIDE
 | 
			
		||||
- FOWNER
 | 
			
		||||
- FSETID
 | 
			
		||||
- KILL
 | 
			
		||||
- SETGID
 | 
			
		||||
- SETUID
 | 
			
		||||
- SETPCAP
 | 
			
		||||
- NET_BIND_SERVICE
 | 
			
		||||
- NET_RAW
 | 
			
		||||
- SYS_CHROOT
 | 
			
		||||
- MKNOD
 | 
			
		||||
- AUDIT_WRITE
 | 
			
		||||
- SETFCAP
 | 
			
		||||
defaultAddCapabilities: null
 | 
			
		||||
defaultAllowPrivilegeEscalation: false
 | 
			
		||||
forbiddenSysctls:
 | 
			
		||||
- '*'
 | 
			
		||||
fsGroup:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
groups: []
 | 
			
		||||
priority: null
 | 
			
		||||
readOnlyRootFilesystem: false  # Set because Grafana Alloy needs to write to /tmp/alloy
 | 
			
		||||
requiredDropCapabilities: null
 | 
			
		||||
runAsUser:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
seLinuxContext:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
seccompProfiles:
 | 
			
		||||
  - runtime/default
 | 
			
		||||
supplementalGroups:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
users: []
 | 
			
		||||
volumes:
 | 
			
		||||
- configMap
 | 
			
		||||
- emptyDir
 | 
			
		||||
- projected
 | 
			
		||||
- secret
 | 
			
		||||
---
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
kind: ClusterRole
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-metrics") }}-scc
 | 
			
		||||
rules:
 | 
			
		||||
- verbs:
 | 
			
		||||
    - use
 | 
			
		||||
  apiGroups:
 | 
			
		||||
    - security.openshift.io
 | 
			
		||||
  resources:
 | 
			
		||||
    - securitycontextconstraints
 | 
			
		||||
  resourceNames:
 | 
			
		||||
    - {{ include "alloy.fullname" (index .Subcharts "alloy-metrics") }}
 | 
			
		||||
---
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
kind: ClusterRoleBinding
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-metrics") }}-scc
 | 
			
		||||
roleRef:
 | 
			
		||||
  apiGroup: rbac.authorization.k8s.io
 | 
			
		||||
  kind: ClusterRole
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-metrics") }}-scc
 | 
			
		||||
subjects:
 | 
			
		||||
- kind: ServiceAccount
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-metrics") }}
 | 
			
		||||
  namespace: {{ .Release.Namespace }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
@@ -0,0 +1,80 @@
 | 
			
		||||
{{- if and (index .Values "alloy-profiles").enabled (eq .Values.global.platform "openshift") }}
 | 
			
		||||
---
 | 
			
		||||
apiVersion: security.openshift.io/v1
 | 
			
		||||
kind: SecurityContextConstraints
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-profiles") }}
 | 
			
		||||
allowHostDirVolumePlugin: false
 | 
			
		||||
allowHostIPC: false
 | 
			
		||||
allowHostNetwork: false
 | 
			
		||||
allowHostPID: false
 | 
			
		||||
allowHostPorts: false
 | 
			
		||||
allowPrivilegeEscalation: false
 | 
			
		||||
allowPrivilegedContainer: true
 | 
			
		||||
allowedCapabilities:
 | 
			
		||||
- CHOWN
 | 
			
		||||
- DAC_OVERRIDE
 | 
			
		||||
- FOWNER
 | 
			
		||||
- FSETID
 | 
			
		||||
- KILL
 | 
			
		||||
- SETGID
 | 
			
		||||
- SETUID
 | 
			
		||||
- SETPCAP
 | 
			
		||||
- NET_BIND_SERVICE
 | 
			
		||||
- NET_RAW
 | 
			
		||||
- SYS_CHROOT
 | 
			
		||||
- MKNOD
 | 
			
		||||
- AUDIT_WRITE
 | 
			
		||||
- SETFCAP
 | 
			
		||||
defaultAddCapabilities: null
 | 
			
		||||
defaultAllowPrivilegeEscalation: false
 | 
			
		||||
forbiddenSysctls:
 | 
			
		||||
- '*'
 | 
			
		||||
fsGroup:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
groups: []
 | 
			
		||||
priority: null
 | 
			
		||||
readOnlyRootFilesystem: false  # Set because Grafana Alloy needs to write to /tmp/alloy
 | 
			
		||||
requiredDropCapabilities: null
 | 
			
		||||
runAsUser:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
seLinuxContext:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
seccompProfiles:
 | 
			
		||||
  - runtime/default
 | 
			
		||||
supplementalGroups:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
users: []
 | 
			
		||||
volumes:
 | 
			
		||||
- configMap
 | 
			
		||||
- emptyDir
 | 
			
		||||
- projected
 | 
			
		||||
- secret
 | 
			
		||||
---
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
kind: ClusterRole
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-profiles") }}-scc
 | 
			
		||||
rules:
 | 
			
		||||
- verbs:
 | 
			
		||||
    - use
 | 
			
		||||
  apiGroups:
 | 
			
		||||
    - security.openshift.io
 | 
			
		||||
  resources:
 | 
			
		||||
    - securitycontextconstraints
 | 
			
		||||
  resourceNames:
 | 
			
		||||
    - {{ include "alloy.fullname" (index .Subcharts "alloy-profiles") }}
 | 
			
		||||
---
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
kind: ClusterRoleBinding
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-profiles") }}-scc
 | 
			
		||||
roleRef:
 | 
			
		||||
  apiGroup: rbac.authorization.k8s.io
 | 
			
		||||
  kind: ClusterRole
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-profiles") }}-scc
 | 
			
		||||
subjects:
 | 
			
		||||
- kind: ServiceAccount
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-profiles") }}
 | 
			
		||||
  namespace: {{ .Release.Namespace }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
@@ -0,0 +1,80 @@
 | 
			
		||||
{{- if and (index .Values "alloy-receiver").enabled (eq .Values.global.platform "openshift") }}
 | 
			
		||||
---
 | 
			
		||||
apiVersion: security.openshift.io/v1
 | 
			
		||||
kind: SecurityContextConstraints
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-receiver") }}
 | 
			
		||||
allowHostDirVolumePlugin: false
 | 
			
		||||
allowHostIPC: false
 | 
			
		||||
allowHostNetwork: false
 | 
			
		||||
allowHostPID: false
 | 
			
		||||
allowHostPorts: false
 | 
			
		||||
allowPrivilegeEscalation: false
 | 
			
		||||
allowPrivilegedContainer: false
 | 
			
		||||
allowedCapabilities:
 | 
			
		||||
- CHOWN
 | 
			
		||||
- DAC_OVERRIDE
 | 
			
		||||
- FOWNER
 | 
			
		||||
- FSETID
 | 
			
		||||
- KILL
 | 
			
		||||
- SETGID
 | 
			
		||||
- SETUID
 | 
			
		||||
- SETPCAP
 | 
			
		||||
- NET_BIND_SERVICE
 | 
			
		||||
- NET_RAW
 | 
			
		||||
- SYS_CHROOT
 | 
			
		||||
- MKNOD
 | 
			
		||||
- AUDIT_WRITE
 | 
			
		||||
- SETFCAP
 | 
			
		||||
defaultAddCapabilities: null
 | 
			
		||||
defaultAllowPrivilegeEscalation: false
 | 
			
		||||
forbiddenSysctls:
 | 
			
		||||
- '*'
 | 
			
		||||
fsGroup:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
groups: []
 | 
			
		||||
priority: null
 | 
			
		||||
readOnlyRootFilesystem: false  # Set because Grafana Alloy needs to write to /tmp/alloy
 | 
			
		||||
requiredDropCapabilities: null
 | 
			
		||||
runAsUser:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
seLinuxContext:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
seccompProfiles:
 | 
			
		||||
  - runtime/default
 | 
			
		||||
supplementalGroups:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
users: []
 | 
			
		||||
volumes:
 | 
			
		||||
- configMap
 | 
			
		||||
- emptyDir
 | 
			
		||||
- projected
 | 
			
		||||
- secret
 | 
			
		||||
---
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
kind: ClusterRole
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-receiver") }}-scc
 | 
			
		||||
rules:
 | 
			
		||||
- verbs:
 | 
			
		||||
    - use
 | 
			
		||||
  apiGroups:
 | 
			
		||||
    - security.openshift.io
 | 
			
		||||
  resources:
 | 
			
		||||
    - securitycontextconstraints
 | 
			
		||||
  resourceNames:
 | 
			
		||||
    - {{ include "alloy.fullname" (index .Subcharts "alloy-receiver") }}
 | 
			
		||||
---
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
kind: ClusterRoleBinding
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-receiver") }}-scc
 | 
			
		||||
roleRef:
 | 
			
		||||
  apiGroup: rbac.authorization.k8s.io
 | 
			
		||||
  kind: ClusterRole
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-receiver") }}-scc
 | 
			
		||||
subjects:
 | 
			
		||||
- kind: ServiceAccount
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-receiver") }}
 | 
			
		||||
  namespace: {{ .Release.Namespace }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
@@ -0,0 +1,80 @@
 | 
			
		||||
{{- if and (index .Values "alloy-singleton").enabled (eq .Values.global.platform "openshift") }}
 | 
			
		||||
---
 | 
			
		||||
apiVersion: security.openshift.io/v1
 | 
			
		||||
kind: SecurityContextConstraints
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-singleton") }}
 | 
			
		||||
allowHostDirVolumePlugin: false
 | 
			
		||||
allowHostIPC: false
 | 
			
		||||
allowHostNetwork: false
 | 
			
		||||
allowHostPID: false
 | 
			
		||||
allowHostPorts: false
 | 
			
		||||
allowPrivilegeEscalation: false
 | 
			
		||||
allowPrivilegedContainer: false
 | 
			
		||||
allowedCapabilities:
 | 
			
		||||
- CHOWN
 | 
			
		||||
- DAC_OVERRIDE
 | 
			
		||||
- FOWNER
 | 
			
		||||
- FSETID
 | 
			
		||||
- KILL
 | 
			
		||||
- SETGID
 | 
			
		||||
- SETUID
 | 
			
		||||
- SETPCAP
 | 
			
		||||
- NET_BIND_SERVICE
 | 
			
		||||
- NET_RAW
 | 
			
		||||
- SYS_CHROOT
 | 
			
		||||
- MKNOD
 | 
			
		||||
- AUDIT_WRITE
 | 
			
		||||
- SETFCAP
 | 
			
		||||
defaultAddCapabilities: null
 | 
			
		||||
defaultAllowPrivilegeEscalation: false
 | 
			
		||||
forbiddenSysctls:
 | 
			
		||||
- '*'
 | 
			
		||||
fsGroup:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
groups: []
 | 
			
		||||
priority: null
 | 
			
		||||
readOnlyRootFilesystem: false  # Set because Grafana Alloy needs to write to /tmp/alloy
 | 
			
		||||
requiredDropCapabilities: null
 | 
			
		||||
runAsUser:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
seLinuxContext:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
seccompProfiles:
 | 
			
		||||
  - runtime/default
 | 
			
		||||
supplementalGroups:
 | 
			
		||||
  type: RunAsAny
 | 
			
		||||
users: []
 | 
			
		||||
volumes:
 | 
			
		||||
- configMap
 | 
			
		||||
- emptyDir
 | 
			
		||||
- projected
 | 
			
		||||
- secret
 | 
			
		||||
---
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
kind: ClusterRole
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-singleton") }}-scc
 | 
			
		||||
rules:
 | 
			
		||||
- verbs:
 | 
			
		||||
    - use
 | 
			
		||||
  apiGroups:
 | 
			
		||||
    - security.openshift.io
 | 
			
		||||
  resources:
 | 
			
		||||
    - securitycontextconstraints
 | 
			
		||||
  resourceNames:
 | 
			
		||||
    - {{ include "alloy.fullname" (index .Subcharts "alloy-singleton") }}
 | 
			
		||||
---
 | 
			
		||||
apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
kind: ClusterRoleBinding
 | 
			
		||||
metadata:
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-singleton") }}-scc
 | 
			
		||||
roleRef:
 | 
			
		||||
  apiGroup: rbac.authorization.k8s.io
 | 
			
		||||
  kind: ClusterRole
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-singleton") }}-scc
 | 
			
		||||
subjects:
 | 
			
		||||
- kind: ServiceAccount
 | 
			
		||||
  name: {{ include "alloy.fullname" (index .Subcharts "alloy-singleton") }}
 | 
			
		||||
  namespace: {{ .Release.Namespace }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
		Reference in New Issue
	
	Block a user