Replacing PSPs?
Keep Bad Pods out of your
cluster using Kyverno!
1
Shuting Zhao
2
3
Pod Security
Pod Security Standards
4
Manage Pod Security
5
Pod Security Admission Considerations
6
Recommendations
7
Why Kyverno
8
Kyverno Project Goals
9
By being Kubernetes Native simplifies K8s policy management!
A Kyverno Policy
10
Kyverno Pod Security Standard Policies
11
Kyverno Pod Security Standard Policies
12
Demo
Kyverno PSS policies installation
13
Demo 1 - Kyverno PSS Policies Install
$ kustomize build https://github.com/kyverno/policies/pod-security | kubectl apply -f -
14
Managing Pod Security
with Kyverno
15
Policy Mode
16
Auto-generating Pod Controller Policies
17
none | Disable auto-generation |
all | Enable auto-generation for Deployments, StatefulSets, Jobs, CronJobs |
<name>,<name> | Enable auto-generation for each named controller |
Demo 2 - Policy Mode
18
Policy Reports
Kyverno uses the Policy WG PolicyReport CRD
from Kyverno CLI
19
Policy Reports
Kyverno uses the Policy WG PolicyReport CRD
from Kyverno CLI
20
Demo 3 - Reports
21
Policy Reporter
22
Grafana Dashboard
23
Remedy Policy Violations
In Kyverno, you can remedy policy violations:
selection
24
Demo 4 - Remedy Violations
Mutate securityContext.privileged to false
25
Beyond Pod Security
26
Summary
27
Takeaways
28
Learn More!
29
30
https://kyverno.io/
Twitter: @shutingzhao2
LinkedIn: @Shuting Zhao
Email: shuting@nirmata.com
Thank-You!