diff --git a/cluster/addons/metadata-agent/stackdriver/podsecuritypolicies/metadata-agent-rbac.yaml b/cluster/addons/metadata-agent/stackdriver/podsecuritypolicies/metadata-agent-rbac.yaml index 1631c0d57e3..102b80771ff 100644 --- a/cluster/addons/metadata-agent/stackdriver/podsecuritypolicies/metadata-agent-rbac.yaml +++ b/cluster/addons/metadata-agent/stackdriver/podsecuritypolicies/metadata-agent-rbac.yaml @@ -1,39 +1,4 @@ apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: stackdriver:metadata-agent - labels: - kubernetes.io/cluster-service: "true" - addonmanager.kubernetes.io/mode: Reconcile -rules: -- apiGroups: - - "" - - "apps" - - "extensions" - resources: - - "*" - verbs: - - watch - - get - - list ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: stackdriver:metadata-agent - labels: - kubernetes.io/cluster-service: "true" - addonmanager.kubernetes.io/mode: Reconcile -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: stackdriver:metadata-agent -subjects: -- kind: ServiceAccount - name: metadata-agent - namespace: kube-system ---- -apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: gce:podsecuritypolicy:metadata-agent