<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Introduction on Kyverno</title><link>https://release-1-16-0--kyverno.netlify.app/docs/introduction/</link><description>Recent content in Introduction on Kyverno</description><generator>Hugo</generator><language>en</language><atom:link href="https://release-1-16-0--kyverno.netlify.app/docs/introduction/index.xml" rel="self" type="application/rss+xml"/><item><title>How Kyverno Works</title><link>https://release-1-16-0--kyverno.netlify.app/docs/introduction/how-kyverno-works/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://release-1-16-0--kyverno.netlify.app/docs/introduction/how-kyverno-works/</guid><description>&lt;h2 id="kubernetes-admission-controls">
 Kubernetes Admission Controls
 &lt;a href="#kubernetes-admission-controls">
 &lt;svg xmlns="http://www.w3.org/2000/svg" fill="currentColor" width="24" height="24" viewBox="0 0 24 24">&lt;path d="M0 0h24v24H0z" fill="none">&lt;/path>&lt;path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z">&lt;/path>&lt;/svg>
 &lt;/a>
&lt;/h2>
&lt;p>Kyverno runs as a &lt;a href="https://release-1-16-0--kyverno.netlify.app/docs/introduction/admission-controllers/">dynamic admission controller&lt;/a> in a Kubernetes cluster. Kyverno receives validating and mutating admission webhook HTTP callbacks from the Kubernetes API server and applies matching policies to return results that enforce admission policies or reject requests.&lt;/p>
&lt;p>Kyverno policies can match resources using the resource kind, name, label selectors, and much more.&lt;/p></description></item><item><title>Quick Start Guides</title><link>https://release-1-16-0--kyverno.netlify.app/docs/introduction/quick-start/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://release-1-16-0--kyverno.netlify.app/docs/introduction/quick-start/</guid><description>&lt;p>This section is intended to provide you with some quick guides on how to get Kyverno up and running and demonstrate a few of Kyverno&amp;rsquo;s seminal features. There are quick start guides which focus on validation, mutation, as well as generation allowing you to select the one (or all) which is most relevant to your use case.&lt;/p>
&lt;p>These guides are intended for proof-of-concept or lab demonstrations only and not recommended as a guide for production. Please see the &lt;a href="https://release-1-16-0--kyverno.netlify.app/docs/installation/">installation page&lt;/a> for more complete information on how to install Kyverno in production.&lt;/p></description></item><item><title>Admission Controllers 101</title><link>https://release-1-16-0--kyverno.netlify.app/docs/introduction/admission-controllers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://release-1-16-0--kyverno.netlify.app/docs/introduction/admission-controllers/</guid><description>&lt;p>This page contains an optional overview of admission controllers in Kubernetes and is recommended for new users of Kubernetes in general or those who would like to better understand how admission controllers work. It is not intended to be an exhaustive reference document on the subject. As such, many advanced details and fine points have been omitted to favor readability.&lt;/p>
&lt;h2 id="about-admission-controllers">
 About Admission Controllers
 &lt;a href="#about-admission-controllers">
 &lt;svg xmlns="http://www.w3.org/2000/svg" fill="currentColor" width="24" height="24" viewBox="0 0 24 24">&lt;path d="M0 0h24v24H0z" fill="none">&lt;/path>&lt;path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z">&lt;/path>&lt;/svg>
 &lt;/a>
&lt;/h2>
&lt;p>In Kubernetes, admission controllers are components responsible for either validating or modifying requests as part of the admissions process. These components can be thought of as &amp;ldquo;extensibility&amp;rdquo; points for Kubernetes, often used to control the outcome when new resources are being created hence the term. These admission controllers can be both built-in to the Kubernetes API server directly (also referred to as &amp;ldquo;in-line&amp;rdquo;, &amp;ldquo;in-process&amp;rdquo;, or &amp;ldquo;compiled-in&amp;rdquo; admission controllers) or external. For example, a built-in admission controller called &lt;a href="https://kubernetes.io/docs/concepts/policy/resource-quotas/">ResourceQuota&lt;/a> will examine any new Deployments to ensure that the resources being requested do not exceed a threshold established for its destined Namespace. If this threshold&amp;ndash;to be defined by a user with appropriate permissions&amp;ndash;is exceeded, the request to create the Deployment will be blocked.&lt;/p></description></item></channel></rss>