2022-02-25 16:22:00 +00:00
|
|
|
# -- Pod Security Standard profile (`baseline`, `restricted`, `privileged`, `custom`).
|
|
|
|
# For more info https://kyverno.io/policies/pod-security.
|
2021-09-22 20:56:10 +00:00
|
|
|
podSecurityStandard: baseline
|
2022-02-25 16:22:00 +00:00
|
|
|
|
|
|
|
# -- Pod Security Standard (`low`, `medium`, `high`).
|
2021-09-22 20:56:10 +00:00
|
|
|
podSecuritySeverity: medium
|
2022-02-25 16:22:00 +00:00
|
|
|
|
|
|
|
# -- Policies to include when `podSecurityStandard` is `custom`.
|
2021-09-22 20:56:10 +00:00
|
|
|
podSecurityPolicies: []
|
2022-02-25 16:22:00 +00:00
|
|
|
|
|
|
|
# -- Additional policies to include from `other`.
|
2022-02-04 06:47:36 +00:00
|
|
|
includeOtherPolicies: []
|
2022-02-25 16:22:00 +00:00
|
|
|
# - require-non-root-groups
|
|
|
|
|
2022-08-29 17:45:29 +00:00
|
|
|
# -- Additional policies to include from `restricted`.
|
|
|
|
includeRestrictedPolicies: []
|
|
|
|
# - require-run-as-non-root-user
|
|
|
|
|
2022-08-25 15:29:20 +00:00
|
|
|
# -- API server behavior if the webhook fails to respond ('Ignore', 'Fail')
|
|
|
|
# For more info: https://kyverno.io/docs/writing-policies/policy-settings/
|
|
|
|
failurePolicy: Fail
|
|
|
|
|
2022-02-25 16:22:00 +00:00
|
|
|
# -- Validation failure action (`audit`, `enforce`).
|
|
|
|
# For more info https://kyverno.io/docs/writing-policies/validate.
|
2021-09-22 20:56:10 +00:00
|
|
|
validationFailureAction: audit
|
2022-02-25 16:22:00 +00:00
|
|
|
|
2022-08-25 15:29:20 +00:00
|
|
|
# -- Define validationFailureActionByPolicy for specific policies.
|
|
|
|
# Override the defined `validationFailureAction` with a individual validationFailureAction for individual Policies.
|
|
|
|
validationFailureActionByPolicy: {}
|
|
|
|
# disallow-capabilities-strict: enforce
|
|
|
|
# disallow-host-path: enforce
|
|
|
|
# disallow-host-ports: enforce
|
2022-08-09 21:12:27 +00:00
|
|
|
|
2022-02-25 16:22:00 +00:00
|
|
|
# -- Define validationFailureActionOverrides for specific policies.
|
|
|
|
# The overrides for `all` will apply to all policies.
|
2022-02-09 08:24:35 +00:00
|
|
|
validationFailureActionOverrides:
|
|
|
|
all: []
|
2022-02-25 16:22:00 +00:00
|
|
|
# all:
|
|
|
|
# - action: audit
|
|
|
|
# namespaces:
|
|
|
|
# - ingress-nginx
|
|
|
|
# disallow-host-path:
|
|
|
|
# - action: audit
|
|
|
|
# namespaces:
|
|
|
|
# - fluent
|
|
|
|
|
|
|
|
# -- Exclude resources from individual policies.
|
|
|
|
# Policies with multiple rules can have individual rules excluded by using the name of the rule as the key in the `policyExclude` map.
|
2022-02-04 06:47:36 +00:00
|
|
|
policyExclude: {}
|
2022-02-25 16:22:00 +00:00
|
|
|
# # Exclude resources from individual policies
|
|
|
|
# disallow-host-path:
|
|
|
|
# any:
|
|
|
|
# - resources:
|
|
|
|
# kinds:
|
|
|
|
# - Pod
|
|
|
|
# namespaces:
|
|
|
|
# - fluent
|
|
|
|
# # Policies with multiple rules can have individual rules excluded
|
|
|
|
# adding-capabilities-strict:
|
|
|
|
# any:
|
|
|
|
# - resources:
|
|
|
|
# kinds:
|
|
|
|
# - Pod
|
|
|
|
# namespaces:
|
|
|
|
# - kube-system
|
2022-04-18 17:59:47 +00:00
|
|
|
# -- Add preconditions to individual policies.
|
|
|
|
# Policies with multiple rules can have individual rules excluded by using the name of the rule as the key in the `policyPreconditions` map.
|
|
|
|
policyPreconditions: {}
|
|
|
|
# # Exclude resources from individual policies
|
|
|
|
# require-run-as-non-root-user:
|
2022-04-27 03:52:45 +00:00
|
|
|
# all:
|
2022-04-18 17:59:47 +00:00
|
|
|
# - key: "{{ request.object.metadata.name }}"
|
|
|
|
# operator: NotEquals
|
|
|
|
# value: "dcgm-exporter*"
|
|
|
|
# # Policies with multiple rules can have individual rules excluded
|
2022-04-27 03:52:45 +00:00
|
|
|
# require-drop-all:
|
|
|
|
# any:
|
|
|
|
# - key: "{{ request.object.metadata.name }}"
|
|
|
|
# operator: NotEquals
|
|
|
|
# value: "dcgm-exporter*"
|
2022-04-18 17:59:47 +00:00
|
|
|
# adding-capabilities-strict:
|
2022-04-27 03:52:45 +00:00
|
|
|
# all:
|
|
|
|
# - key: "{{ request.object.metadata.name }}"
|
|
|
|
# operator: NotEquals
|
|
|
|
# value: "dcgm-exporter*"
|
2021-09-22 20:56:10 +00:00
|
|
|
|
2022-12-01 10:05:56 +00:00
|
|
|
# -- Customize the target Pod controllers for the auto-generated rules. (Eg. `none`, `Deployment`, `DaemonSet,Deployment,StatefulSet`)
|
|
|
|
# For more info https://kyverno.io/docs/writing-policies/autogen/.
|
|
|
|
autogenControllers: ""
|
|
|
|
|
2022-02-25 16:22:00 +00:00
|
|
|
# -- Name override.
|
2021-09-22 20:56:10 +00:00
|
|
|
nameOverride:
|
2022-02-25 16:22:00 +00:00
|
|
|
|
|
|
|
# -- Additional labels.
|
2021-09-22 20:56:10 +00:00
|
|
|
customLabels: {}
|
2022-02-25 16:22:00 +00:00
|
|
|
|
|
|
|
# -- Policies background mode
|
2022-02-24 16:31:51 +00:00
|
|
|
background: true
|
2022-09-02 15:41:02 +00:00
|
|
|
|
|
|
|
# -- Kyverno version
|
|
|
|
# The default of "autodetect" will try to determine the currently installed version from the deployment
|
|
|
|
kyvernoVersion: autodetect
|