<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reporting on Kyverno</title><link>https://release-1-16-0--kyverno.netlify.app/docs/policy-reports/</link><description>Recent content in Reporting on Kyverno</description><generator>Hugo</generator><language>en</language><atom:link href="https://release-1-16-0--kyverno.netlify.app/docs/policy-reports/index.xml" rel="self" type="application/rss+xml"/><item><title>Background Scans</title><link>https://release-1-16-0--kyverno.netlify.app/docs/policy-reports/background/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://release-1-16-0--kyverno.netlify.app/docs/policy-reports/background/</guid><description>&lt;p>Kyverno can validate existing resources in the cluster that may have been created before a policy was created. This can be useful when evaluating the potential effects some new policies will have on a cluster prior to changing them to &lt;code>Enforce&lt;/code> mode. The application of policies to existing resources is referred to as &lt;strong>background scanning&lt;/strong> and is enabled by default unless &lt;code>spec.background&lt;/code> is set to &lt;code>false&lt;/code> in a policy like shown below in the snippet.&lt;/p></description></item><item><title>OpenReports Integration</title><link>https://release-1-16-0--kyverno.netlify.app/docs/policy-reports/openreports/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://release-1-16-0--kyverno.netlify.app/docs/policy-reports/openreports/</guid><description>&lt;blockquote>
&lt;p>&lt;strong>Note:&lt;/strong> OpenReports integration is available as of Kyverno 1.15. The feature is in ALPHA status&lt;/p>&lt;/blockquote>
&lt;p>Kyverno supports reporting policy results using the &lt;code>openreports.io/v1alpha1&lt;/code> API as an alternative to the default wgpolicyk8s reporting. This can be enabled using the &lt;code>--openreportsEnabled&lt;/code> flag in the Kyverno controller.&lt;/p>
&lt;p>This is an initial step to eventually deprecate &lt;code>wgpolicyk8s&lt;/code> and fully depend on &lt;code>openreports.io&lt;/code> as the API group for permanent reports&lt;/p>
&lt;h3 id="enabling-openreports">
 Enabling OpenReports
 &lt;a href="#enabling-openreports">
 &lt;svg xmlns="http://www.w3.org/2000/svg" fill="currentColor" width="24" height="24" viewBox="0 0 24 24">&lt;path d="M0 0h24v24H0z" fill="none">&lt;/path>&lt;path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z">&lt;/path>&lt;/svg>
 &lt;/a>
&lt;/h3>
&lt;p>To enable OpenReports integration, add the &lt;code>--openreportsEnabled&lt;/code> flag to the Kyverno reports controller.&lt;/p></description></item><item><title>ValidatingAdmissionPolicy Reports</title><link>https://release-1-16-0--kyverno.netlify.app/docs/policy-reports/validatingadmissionpolicy-reports/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://release-1-16-0--kyverno.netlify.app/docs/policy-reports/validatingadmissionpolicy-reports/</guid><description>&lt;p>Kyverno can generate reports for ValidatingAdmissionPolicies and their bindings. These reports provide information about the resources that are validated by the policies and the results of the validation. They can be used to monitor the health of the cluster and to ensure that the policies are being enforced as expected.&lt;/p>
&lt;p>To configure Kyverno to generate reports for ValidatingAdmissionPolicies, set the &lt;code>--validatingAdmissionPolicyReports&lt;/code> flag to &lt;code>true&lt;/code> in the reports controller. This flag is set to &lt;code>false&lt;/code> by default.&lt;/p></description></item><item><title>Example Scenarios</title><link>https://release-1-16-0--kyverno.netlify.app/docs/policy-reports/examples/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://release-1-16-0--kyverno.netlify.app/docs/policy-reports/examples/</guid><description>&lt;h2 id="example-trigger-a-policyreport">
 Example: Trigger a PolicyReport
 &lt;a href="#example-trigger-a-policyreport">
 &lt;svg xmlns="http://www.w3.org/2000/svg" fill="currentColor" width="24" height="24" viewBox="0 0 24 24">&lt;path d="M0 0h24v24H0z" fill="none">&lt;/path>&lt;path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z">&lt;/path>&lt;/svg>
 &lt;/a>
&lt;/h2>
&lt;p>A &lt;code>PolicyReport&lt;/code> object (Namespaced) is created in the same Namespace where resources apply to one or more Kyverno policies. Cluster wide resources will generate &lt;code>ClusterPolicyReport&lt;/code> resources at the cluster level.&lt;/p>
&lt;p>A single Kyverno ClusterPolicy exists with a single rule which ensures Pods cannot mount Secrets as environment variables.&lt;/p></description></item></channel></rss>