2019-05-21 22:56:01 +00:00
< small > *[documentation](/README.md#documentation) / [Writing Policies ](/documentation/writing-policies.md ) / Generate*</ small >
2019-05-21 22:50:36 +00:00
2019-05-21 22:56:01 +00:00
# Generate Configurations
2019-05-21 22:50:36 +00:00
2020-01-07 23:13:57 +00:00
```generate``` is used to create additional resources when a resource is created. This is useful to create supporting resources, such as role bindings for a new namespace.
2019-05-21 22:50:36 +00:00
2019-06-03 23:02:34 +00:00
## Example 1
2020-01-07 23:13:57 +00:00
- rule
Creates a ConfigMap with name `default-config` for all
2019-05-22 15:14:10 +00:00
````yaml
2019-11-13 21:55:27 +00:00
apiVersion: kyverno.io/v1
2019-09-03 21:51:51 +00:00
kind: ClusterPolicy
2019-06-03 23:02:34 +00:00
metadata:
name: basic-policy
spec:
2019-05-22 15:14:10 +00:00
rules:
2020-01-07 23:13:57 +00:00
- name: "Generate ConfigMap"
2019-08-21 22:49:34 +00:00
match:
resources:
kinds:
- Namespace
selector:
matchLabels:
LabelForSelector : "namespace2"
2019-05-22 15:14:10 +00:00
generate:
2020-01-07 23:13:57 +00:00
kind: ConfigMap # Kind of resource
name: default-config # Name of the new Resource
namespace: "{{request.object.metadata.name}}" # Create in the namespace that triggers this rule
2019-06-03 23:02:34 +00:00
clone:
2019-05-22 15:14:10 +00:00
namespace: default
name: config-template
2020-01-07 23:13:57 +00:00
- name: "Generate Secret"
2019-08-21 22:49:34 +00:00
match:
resources:
kinds:
- Namespace
selector:
matchLabels:
LabelForSelector : "namespace2"
2019-06-03 23:02:34 +00:00
generate:
kind: Secret
2019-05-22 15:14:10 +00:00
name: mongo-creds
2020-01-07 23:13:57 +00:00
namespace: "{{request.object.metadata.name}}" # Create in the namespace that triggers this rule
2019-05-22 15:14:10 +00:00
data:
2019-06-03 23:02:34 +00:00
data:
DB_USER: YWJyYWthZGFicmE=
DB_PASSWORD: YXBwc3dvcmQ=
metadata:
labels:
purpose: mongo
2019-05-22 15:14:10 +00:00
````
2019-06-03 23:02:34 +00:00
In this example, when this policy is applied, any new namespace that satisfies the label selector will receive 2 new resources after its creation:
2019-06-12 23:47:22 +00:00
* ConfigMap copied from default/config-template.
* Secret with values DB_USER and DB_PASSWORD, and label ```purpose: mongo```.
2019-06-03 23:02:34 +00:00
2019-05-22 15:15:35 +00:00
2019-06-03 23:02:34 +00:00
## Example 2
````yaml
2019-11-13 21:55:27 +00:00
apiVersion: kyverno.io/v1
2019-09-03 21:51:51 +00:00
kind: ClusterPolicy
2019-06-03 23:02:34 +00:00
metadata:
name: "default"
spec:
rules:
- name: "deny-all-traffic"
2019-08-21 22:49:34 +00:00
match:
resources:
kinds:
- Namespace
name: "*"
2019-06-03 23:02:34 +00:00
generate:
kind: NetworkPolicy
name: deny-all-traffic
2020-01-07 23:13:57 +00:00
namespace: "{{request.object.metadata.name}}" # Create in the namespace that triggers this rule
2019-06-03 23:02:34 +00:00
data:
spec:
podSelector:
matchLabels: {}
matchExpressions: []
policyTypes: []
metadata:
labels:
policyname: "default"
````
2019-06-12 23:47:22 +00:00
2019-06-21 14:53:33 +00:00
In this example, when the policy is applied, any new namespace will receive a NetworkPolicy based on the specified template that by default denies all inbound and outbound traffic.
2019-05-21 22:50:36 +00:00
2019-05-22 07:09:45 +00:00
---
2019-05-21 22:56:01 +00:00
< small > *Read Next >> [Testing Policies ](/documentation/testing-policies.md )*</ small >
2019-05-21 22:50:36 +00:00