Parameters
The parent key for all of the following parameters is kyverno.
clusterpolicies
| type |
dictionary |
||
| default |
|
||
| example |
|
Dictionary containing ClusterPolicy.kyverno.io/v1 objects to be managed.
Previously defined policies can be removed by setting policy-name: null in the dictionary.
monitoring.enabled
| type |
boolean |
| default |
|
Controls if ServiceMonitor and PrometheusRule objects are created.
resourceFilters
| type |
array |
The admission webhook checks if a policy is applicable on all admission requests.
The Kubernetes kinds that shouldn’t be processed.
resourceFilters must be a sequence of one or more [<Kind>,<Namespace>,<Name>]` entries with as a wildcard. Thus, an item [Node,,*] means that admissions of kind Node in any namespace and with any name will be ignored. Wildcards are also supported in each of these sequences.
For example, the sequence [Pod,foo-system,redis*] filters out kind Pod in namespace foo-system having names beginning with redis.
generateSuccessEvents
| type |
string |
| default |
|
Specifies whether (true/false) to generate success events.
extraArgs
| type |
array |
| default |
|
| example |
|
Allows passing extra arguments to Kyverno.
containerSecurityContext
| type |
dict |
| default |
|
This parameter allows customizing the container security context for the Kyverno deployment’s containers (both init containers, and regular containers). By default, the security contexts present in the upstream Kustomization are used.
On OpenShift 4.10 or older, where the upstream security context isn’t compatible with the restricted SCC, you can provide containerSecurityContext: null to completely drop the upstream container security context.
If a dict is provided, it’s merged with the upstream security context using a standard Kustomize strategic merge patch.
additionalClusterRoles
| type |
object |
||
| default |
|
||
| example |
|
Generates additional ClusterRole.
This is useful if you want to deploy Kyverno policies that generate resources, but the Kyverno ServiceAccount might have insufficient RBAC permissions to do so.
See also additionalRoleBindings to bind the Kyverno ServiceAccount to the new roles.
The metadata.name is prefixed with kyverno:user: to avoid name clashes with existing resources.
|
additionalRoleBindings
| type |
object |
||||
| default |
|
||||
| example |
|
Generates additional ClusterRoleBinding s in the Kyverno namespace for the Kyverno SystemAccount.
This is useful if you want to deploy Kyverno policies that generate resources in other namespaces, but the Kyverno ServiceAccount might have insufficient RBAC permissions to do so.
See also additionalClusterRoles if the necessary ClusterRole doesn’t exist.
The metadata.name is prefixed with kyverno:user: to avoid name clashes with existing resources.
|
If you need to reference a ClusterRole defined in additionalClusterRoles, you need to prefix the role name with kyverno:user: as shown in the example.
|
replicas
| type |
int |
| default |
|
The number of Kyverno replicas. Three or more replicas are recommended for high availability.
podDisruptionBudget
| type |
dict |
| default |
|
Limit the number of concurrent disruptions.
Set {minAvailable: 0} to disable.
See kubernetes.io/docs/reference/generated/kubernetes-api/v1.21/#poddisruptionbudget-v1-policy.
.spec.selector is injected from the deployment.
nodeSelectorRole
| type |
enum |
| values |
|
| default |
|
The node role to run Kyverno pods on.
null equals no selector.
affinity
| type |
string |
Affinity configuration for the Kyverno pods. See kubernetes.io/docs/reference/generated/kubernetes-api/v1.21/#affinity-v1-core
secrets
| type |
dict |
| default |
|
| example |
|
This parameter allows users to deploy arbitrary secrets. Each entry is transformed into a Secret resource. The key is used as the name of the resulting resource. The provided value is merged with an empty Secret resource. The component doesn’t validate the provided secret configurations.
Users can remove secrets configured higher-up in the hierarchy by setting the corresponding value to null.
Always use stringData when using Vault references in secret configurations.
|