Skip to content

Commit 53ef8a0

Browse files
authored
add docs for kyverno (#1892)
1 parent 780993e commit 53ef8a0

18 files changed

+128
-0
lines changed
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
+++
2+
title = "Kyverno Policies (Beta)"
3+
date = 2025-06-11T12:00:00+02:00
4+
weight = 16
5+
enterprise = true
6+
+++
7+
8+
KKP 2.28 introduces a new feature to integrate Kyverno. Kyverno is a cloud-native policy engine originally built for Kubernetes.
9+
10+
## Overview
11+
12+
The Kyverno Policies feature enables enforcement of custom policies on user clusters. Both admins and project owners can create reusable policy templates to define security, compliance, and configuration rules.
13+
14+
Once templates are created, they can be applied to user clusters by creating policy bindings. These bindings link the templates to user clusters and ensure that the defined policies are enforced.
15+
16+
This feature provides a flexible and scalable way to manage cluster-level security and governance using Kyverno.
17+
18+
## Enabling Kyverno
19+
20+
You need to enable **Kyverno Policy Management** when creating the cluster. You can do this in the cluster creation step, under the **Specification** section.
21+
22+
![enable kyverno](images/enable-kyverno-cluster-creating.png?classes=shadow,border "Enable Kyverno")
23+
24+
You can also enable or disable it after creation from the **Edit Cluster** dialog.
25+
26+
![edit cluster](images/enable-kyverno-edit-cluster.png?classes=shadow,border "Edit Cluster")
27+
28+
29+
## Policy Templates Admin View
30+
31+
Admins can manage global policy templates directly from the **Kyverno Policies** page in the **Admin Panel.**
32+
33+
![kyverno policies admin panel](images/kyverno-policies-admin-panel.png?classes=shadow,border "Kyverno Policies Admin Panel")
34+
35+
From this page, Admins can create new policy templates.
36+
37+
![create policy](images/creat-policy-template-admin-panel.png?classes=shadow,border "Create Policy")
38+
39+
From the same dialog, you can select specific clusters or projects using label selectors.
40+
41+
![labe selector](images/label-selector-policy-spec.png?classes=shadow,border "Label Selector")
42+
43+
Inside the `PolicySpec` is the policy specification of the Kyverno policy we want to apply to the cluster. The structure of this spec should follow the rules defined in the Kyverno [Writing Policies Docs](https://release-1-13-0.kyverno.io/docs/writing-policies/).
44+
45+
## Policy Templates Project View
46+
47+
Project owners can also manage policies in their own projects from the **Kyverno Policies** page within their project.
48+
49+
![kyverno policies project page](images/kyverno-policies-project-page.png?classes=shadow,border "Kyverno Policies Project Page")
50+
51+
From this page, project owners can manage policy templates within their scope the same way admins do, but limited to their own project. They can also view any available global scope templates and make copies of them.
52+
53+
## Policy Binding
54+
55+
Admins and project owners can add and delete policies on user clusters from the user cluster detail page.
56+
57+
![policy binding list](images/policy-binding-list.png?classes=shadow,border "Policy Binding List")
58+
59+
This page displays a list of all applied policies. You can also create a policy binding from a template.
60+
61+
![add policy binding](images/add-policy-binding.png?classes=shadow,border "Add Policy Binding")
62+
63+
You can choose a template from the list of all available templates. Note that templates already applied will not be available.
64+
17.7 KB
Loading
48.3 KB
Loading
19.1 KB
Loading
42.8 KB
Loading
144 KB
Loading
95 KB
Loading
56 KB
Loading
91.3 KB
Loading
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
+++
2+
title = "Kyverno Policies (Beta)"
3+
date = 2025-06-11T12:00:00+02:00
4+
weight = 16
5+
enterprise = true
6+
+++
7+
8+
KKP 2.28 introduces a new feature to integrate Kyverno. Kyverno is a cloud-native policy engine originally built for Kubernetes.
9+
10+
## Overview
11+
12+
The Kyverno Policies feature enables enforcement of custom policies on user clusters. Both admins and project owners can create reusable policy templates to define security, compliance, and configuration rules.
13+
14+
Once templates are created, they can be applied to user clusters by creating policy bindings. These bindings link the templates to user clusters and ensure that the defined policies are enforced.
15+
16+
This feature provides a flexible and scalable way to manage cluster-level security and governance using Kyverno.
17+
18+
## Enabling Kyverno
19+
20+
You need to enable **Kyverno Policy Management** when creating the cluster. You can do this in the cluster creation step, under the **Specification** section.
21+
22+
![enable kyverno](images/enable-kyverno-cluster-creating.png?classes=shadow,border "Enable Kyverno")
23+
24+
You can also enable or disable it after creation from the **Edit Cluster** dialog.
25+
26+
![edit cluster](images/enable-kyverno-edit-cluster.png?classes=shadow,border "Edit Cluster")
27+
28+
29+
## Policy Templates Admin View
30+
31+
Admins can manage global policy templates directly from the **Kyverno Policies** page in the **Admin Panel.**
32+
33+
![kyverno policies admin panel](images/kyverno-policies-admin-panel.png?classes=shadow,border "Kyverno Policies Admin Panel")
34+
35+
From this page, Admins can create new policy templates.
36+
37+
![create policy](images/creat-policy-template-admin-panel.png?classes=shadow,border "Create Policy")
38+
39+
From the same dialog, you can select specific clusters or projects using label selectors.
40+
41+
![labe selector](images/label-selector-policy-spec.png?classes=shadow,border "Label Selector")
42+
43+
Inside the `PolicySpec` is the policy specification of the Kyverno policy we want to apply to the cluster. The structure of this spec should follow the rules defined in the Kyverno [Writing Policies Docs](https://release-1-13-0.kyverno.io/docs/writing-policies/).
44+
45+
## Policy Templates Project View
46+
47+
Project owners can also manage policies in their own projects from the **Kyverno Policies** page within their project.
48+
49+
![kyverno policies project page](images/kyverno-policies-project-page.png?classes=shadow,border "Kyverno Policies Project Page")
50+
51+
From this page, project owners can manage policy templates within their scope the same way admins do, but limited to their own project. They can also view any available global scope templates and make copies of them.
52+
53+
## Policy Binding
54+
55+
Admins and project owners can add and delete policies on user clusters from the user cluster detail page.
56+
57+
![policy binding list](images/policy-binding-list.png?classes=shadow,border "Policy Binding List")
58+
59+
This page displays a list of all applied policies. You can also create a policy binding from a template.
60+
61+
![add policy binding](images/add-policy-binding.png?classes=shadow,border "Add Policy Binding")
62+
63+
You can choose a template from the list of all available templates. Note that templates already applied will not be available.
64+

0 commit comments

Comments
 (0)