diff --git a/sealed-secrets/controller.yaml b/sealed-secrets/controller.yaml index 32a0ab1..d1aeb67 100644 --- a/sealed-secrets/controller.yaml +++ b/sealed-secrets/controller.yaml @@ -6,7 +6,7 @@ metadata: labels: name: sealed-secrets-controller name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets roleRef: apiGroup: rbac.authorization.k8s.io kind: Role @@ -14,7 +14,7 @@ roleRef: subjects: - kind: ServiceAccount name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role @@ -23,7 +23,7 @@ metadata: labels: name: sealed-secrets-key-admin name: sealed-secrets-key-admin - namespace: kube-system + namespace: sealed-secrets rules: - apiGroups: - "" @@ -47,7 +47,7 @@ roleRef: subjects: - kind: ServiceAccount name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole @@ -103,7 +103,7 @@ metadata: labels: name: sealed-secrets-controller name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets --- apiVersion: v1 kind: Service @@ -112,7 +112,7 @@ metadata: labels: name: sealed-secrets-controller name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets spec: ports: - port: 8080 @@ -128,7 +128,7 @@ metadata: labels: name: sealed-secrets-service-proxier name: sealed-secrets-service-proxier - namespace: kube-system + namespace: sealed-secrets roleRef: apiGroup: rbac.authorization.k8s.io kind: Role @@ -145,7 +145,7 @@ metadata: labels: name: sealed-secrets-service-proxier name: sealed-secrets-service-proxier - namespace: kube-system + namespace: sealed-secrets rules: - apiGroups: - "" @@ -174,7 +174,7 @@ metadata: labels: name: sealed-secrets-controller name: sealed-secrets-controller - namespace: kube-system + namespace: sealed-secrets spec: minReadySeconds: 30 replicas: 1