diff --git a/sealed-secrets/controller.yaml b/sealed-secrets/controller.yaml index 734aa3a..7c4c516 100644 --- a/sealed-secrets/controller.yaml +++ b/sealed-secrets/controller.yaml @@ -6,7 +6,7 @@ metadata: labels: name: sealed-secrets-service-proxier name: sealed-secrets-service-proxier - namespace: kube-system + namespace: sealed-secrets rules: - apiGroups: - "" @@ -26,7 +26,7 @@ metadata: labels: name: sealed-secrets-key-admin name: sealed-secrets-key-admin - namespace: kube-system + namespace: sealed-secrets rules: - apiGroups: - "" @@ -43,7 +43,7 @@ metadata: labels: name: sealed-secrets-controller name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets spec: ports: - port: 8080 @@ -59,7 +59,7 @@ metadata: labels: name: sealed-secrets-service-proxier name: sealed-secrets-service-proxier - namespace: kube-system + namespace: sealed-secrets roleRef: apiGroup: rbac.authorization.k8s.io kind: Role @@ -104,7 +104,7 @@ metadata: labels: name: sealed-secrets-controller name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets roleRef: apiGroup: rbac.authorization.k8s.io kind: Role @@ -112,7 +112,7 @@ roleRef: subjects: - kind: ServiceAccount name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding @@ -128,7 +128,7 @@ roleRef: subjects: - kind: ServiceAccount name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole @@ -176,7 +176,7 @@ metadata: labels: name: sealed-secrets-controller name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets --- apiVersion: apps/v1 kind: Deployment @@ -185,7 +185,7 @@ metadata: labels: name: sealed-secrets-controller name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets spec: minReadySeconds: 30 replicas: 1