Added seed code for caas-security.
[ta/caas-security.git] / rbac_manifests / prometheus-rbac.yaml
1 ---
2 # Copyright 2019 Nokia
3 #
4 # Licensed under the Apache License, Version 2.0 (the "License");
5 # you may not use this file except in compliance with the License.
6 # You may obtain a copy of the License at
7 #
8 #     http://www.apache.org/licenses/LICENSE-2.0
9 #
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 # See the License for the specific language governing permissions and
14 # limitations under the License.
15
16 apiVersion: v1
17 kind: ServiceAccount
18 metadata:
19   name: prometheus
20   namespace: kube-system
21 ---
22 apiVersion: rbac.authorization.k8s.io/v1beta1
23 kind: ClusterRole
24 metadata:
25   name: caas:prometheus
26 rules:
27 - apiGroups: [""]
28   resources:
29   - nodes
30   - nodes/proxy
31   - services
32   - endpoints
33   - pods
34   verbs: ["get", "list", "watch"]
35 - apiGroups:
36   - extensions
37   resources:
38   - ingresses
39   verbs: ["get", "list", "watch"]
40 - nonResourceURLs: ["/metrics"]
41   verbs: ["get"]
42 ---
43 apiVersion: rbac.authorization.k8s.io/v1beta1
44 kind: ClusterRoleBinding
45 metadata:
46   name: caas:prometheus
47 roleRef:
48   apiGroup: rbac.authorization.k8s.io
49   kind: ClusterRole
50   name: caas:prometheus
51 subjects:
52 - kind: ServiceAccount
53   name: prometheus
54   namespace: kube-system
55 ---
56 apiVersion: rbac.authorization.k8s.io/v1
57 kind: ClusterRoleBinding
58 metadata:
59   name: caas:prometheus-psp
60 subjects:
61 - kind: ServiceAccount
62   name: prometheus
63   namespace: kube-system
64 roleRef:
65   kind: ClusterRole
66   name: caas:infra-psp
67   apiGroup: rbac.authorization.k8s.io