--- # Source: loki-stack/charts/grafana/templates/podsecuritypolicy.yaml apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: loki-grafana namespace: loki labels: app: grafana chart: grafana-3.8.19 heritage: Tiller release: loki annotations: seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default' seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default' apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default' apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default' spec: privileged: false allowPrivilegeEscalation: false requiredDropCapabilities: # Default set from Docker, without DAC_OVERRIDE or CHOWN - FOWNER - FSETID - KILL - SETGID - SETUID - SETPCAP - NET_BIND_SERVICE - NET_RAW - SYS_CHROOT - MKNOD - AUDIT_WRITE - SETFCAP volumes: - 'configMap' - 'emptyDir' - 'projected' - 'secret' - 'downwardAPI' - 'persistentVolumeClaim' hostNetwork: false hostIPC: false hostPID: false runAsUser: rule: 'RunAsAny' seLinux: rule: 'RunAsAny' supplementalGroups: rule: 'RunAsAny' fsGroup: rule: 'RunAsAny' readOnlyRootFilesystem: false