Kyverno is a policy engine for Kubernetes that enables you to define and enforce policies for your cluster resources. It provides a flexible and scalable solution for managing your cluster configuration, allowing you to enforce best practices, prevent misconfigurations, and enforce compliance requirements.
The kyverno/policies offer all kinds of security and best practice policies that you could use.
Install with:
helm repo add kyverno oci://ghcr.io/kyverno/charts/
helm install kyverno kyverno/kyverno -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
kyverno | xunholy/k8s-gitops | 544 | 3.3.7 | 2 days ago |
kyverno | ishioni/homelab-ops | 127 | 3.3.7 | 8 days ago |
kyverno | axeII/home-ops | 44 | 3.3.7 | 11 days ago |
kyverno | haraldkoch/kochhaus-home | 136 | 3.3.7 | 17 days ago |
kyverno | mchestr/home-cluster | 98 | 3.3.7 | 23 days ago |
See the most popular values for this chart:
Key | Types |
---|---|
boolean, string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
number | |
string | |
string | |
string | |
string | |
number | |
string | |
string | |
boolean, string | |
string | |
string | |
string | |
string | |
reportsController.clusterRole.extraResources[].verbs[] (6) - get | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
number | |
string | |
string | |
string | |
string | |
string | |
number | |
string | |
string | |
boolean, string | |
string | |
string | |
string | |
string | |
number | |
string | |
string | |
admissionController.rbac.clusterRole.extraResources[].verbs[] (18) - create | string |
string | |
string | |
number | |
admissionController.topologySpreadConstraints[].topologyKey (18) kubernetes.io/hostname | string |
string | |
string | |
string | |
admissionController.clusterRole.extraResources[].verbs[] (6) - get | string |
string | |
string | |
string | |
number | |
number | |
admissionController.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[].matchExpressions[].key (3) node-role.kubernetes.io/control-plane | string |
string | |
admissionController.tolerations[].key (3) node-role.kubernetes.io/control-plane | string |
string | |
number | |
string | |
boolean | |
string | |
boolean, string | |
string | |
string | |
string | |
string | |
backgroundController.rbac.clusterRole.extraResources[].verbs[] (19) - create | string |
string | |
string | |
string | |
string | |
string | |
backgroundController.clusterRole.extraResources[].verbs[] (6) - get | string |
boolean | |
string | |
string | |
number | |
string | |
string | |
string | |
string | |
number | |
string | |
string | |
boolean, string | |
string | |
string | |
string | |
string | |
string | |
boolean | |
boolean | |
string | |
installCRDs (4) true | boolean |
number | |
string | |
number | |
topologySpreadConstraints[].topologyKey (3) kubernetes.io/hostname | string |
topologySpreadConstraints[].whenUnsatisfiable (3) DoNotSchedule | string |
string | |
string | |
string | |
number | |
updateStrategy.type (3) RollingUpdate | string |
string | |
boolean | |
boolean | |
string | |
string | |
string | |
boolean | |
number | |
boolean | |
number | |
string | |
string | |
string | |
string | |
boolean | |
string |