Kyverno is a policy engine designed specifically for Kubernetes. Kyverno allows platform teams to manage environment specific configurations independently of workload configurations and enforce configuration best practices for their clusters. Kyverno can be used to scan existing workloads for best practices, or can be used to enforce best practices by blocking or mutating API requests.
Kyverno runs as a dynamic admission controller in a Kubernetes cluster. Kyverno receives validating and mutating admission webhook HTTP callbacks from the kube-apiserver and applies matching policies to return results that enforce admission policies or reject requests. Kyverno policies can match resources using the resource kind, name, and label selectors.
You will create a cluster blueprint with a "kyverno" add-on
You will then apply this cluster blueprint to a managed cluster
Important
This tutorial describes the steps to create and use a Kyverno based blueprint using the Web Console. The entire workflow can also be fully automated and embedded into an automation pipeline
Now, we are ready to apply this blueprint to a cluster.
Click on Options for the target Cluster in the Web Console
Select "Update Blueprint" and select the blueprint and the version from the dropdown
Click on "Save and Publish".
This will start the deployment of the add-on configured in the blueprint to the targeted cluster. The blueprint sync process can take a few minutes. Once complete, the cluster will display the current cluster blueprint details and whether the sync was successful or not.