Abstract
- Kyverno Kyverno is a policy engine designed for Kubernetes, Kyverno policies can validate, mutate, and generate Kubernetes resources plus ensure OCI image supply chain security.
- In this blog, it provides the way to create Kyverno policy as code using CDK8S typescript.
- With importing Kyverno CRDs and using CDK8S you can create Kyverno policy manifest using your familiar programming languages such as typescript as scale.
Table Of Contents
Open Table Of Contents
π Pre-requisite
- Install typescript, node, and cdk8s as well as projen (optional) which is a tool of managing project configuration as code.
- Getting started with cdk8s
- EKS/kubernetes cluster to test
π Overview of Kyverno
-
The features are
- Policies as Kubernetes resources in YAML
- Validate, mutate, or generate any resource using Kustomize overlays
- Match resources using label selectors and wildcards
- Block non-conformant resources using admission controls, or report policy violations
- Test policies and validate resources using the Kyverno CLI, in your CI/CD pipeline, before applying them to your cluster
-
How does it work?
π Import Kyverno CRDs
- Import kyverno CRDs as cdk8s lib
β‘ $ cdk8s import https://raw.githubusercontent.com/kyverno/kyverno/main/config/crds/kyverno.io_clusterpolicies.yaml --output src/imports/
Importing resources, this may take a few moments...
kyverno.io
kyverno.io/clusterpolicy
- Output of importing
β‘ $ tree src/imports/ src/imports/ βββ kyverno.io.ts 0 directories, 1 file
π Write code
-
Itβs much more convinient to use visual code writing Kyverno policies in typescript language. We can read the document and find all references of construct, objects and properties of Kyverno policies through code descriptions.
-
On top of all polices, thereβs simple construct (feel free to implement more the construct) so that each policy just need to input
name
,pattern
, etc.- Interface of kyverno properties
export interface KyvernoProps { name: string; message: string; namespace?: string; action?: ClusterPolicySpecValidationFailureAction; kinds?: Array<string>; resources?: {}; exclude?: ClusterPolicySpecRulesExclude; deny?: ClusterPolicySpecRulesValidateDeny; pattern?: {}; anyPatterns?: {}; };
- The construct class
export class KyvernoClusterPolicy extends Chart { constructor(scope: Construct, name: string, kyvernoProps: KyvernoProps) { super(scope, name); new ClusterPolicy(this, `${kyvernoProps.name}`, { metadata: { name: kyvernoProps.name, namespace: kyvernoProps.namespace || undefined, annotations: { 'policies.kyverno.io/category': 'Pod Security Standards', }, }, spec: { validationFailureAction: kyvernoProps.action || ClusterPolicySpecValidationFailureAction.ENFORCE, rules: [{ name: kyvernoProps.name, match: { any: [{ resources: kyvernoProps.resources || { kinds: ['Pod'] }, }], }, validate: { deny: kyvernoProps.deny || undefined, message: kyvernoProps.message, pattern: kyvernoProps.pattern || undefined, anyPattern: kyvernoProps.anyPatterns || undefined, }, exclude: kyvernoProps.exclude || undefined, }], }, }); } }
- Interface of kyverno properties
-
This blog provides example of 5 usecases
- Deny delete objects which have label
protected: 'true'
- require-app-label
- require-request-limit
- Require run-as-non-root
- [Restart Deployment On Configmap Change]
- Deny delete objects which have label
π Build Kyverno policy from code
-
Source code:
β‘ $ tree src/ src/ βββ imports β βββ kyverno.io.ts βββ kyverno-policies β βββ deny-delete-resources.ts β βββ kverno-list.ts β βββ kyvernoProps.ts β βββ require-app-labels.ts β βββ require-requests-limits.ts β βββ require-runasnonroot.ts βββ main.ts βββ test-yaml βββ inflate-negative-test-deployment.yaml βββ inflate-positive-test-deployment.yaml 3 directories, 10 files
-
Build
β‘ $ npx projen build πΎ build Β» default | ts-node --project tsconfig.dev.json .projenrc.ts πΎ build Β» compile | tsc --build πΎ build Β» post-compile Β» synth | cdk8s synth No manifests synthesized πΎ build Β» test | jest --passWithNoTests --all --updateSnapshot No tests found, exiting with code 0 ----------|---------|----------|---------|---------|------------------- File | % Stmts | % Branch | % Funcs | % Lines | Uncovered Line #s ----------|---------|----------|---------|---------|------------------- All files | 0 | 0 | 0 | 0 | ----------|---------|----------|---------|---------|------------------- πΎ build Β» test Β» eslint | eslint --ext .ts,.tsx --fix --no-error-on-unmatched-pattern src test build-tools projenrc .projenrc.ts
-
Output yaml files
β‘ $ tree dist/ dist/ βββ kyverno βββ require-app-label-kyverno-policy.yaml βββ require-request-limit-kyverno-policy.yaml βββ run-as-non-root-kyverno-policy.yaml 1 directory, 3 files
π Apply and test
-
Apply policies and check result
β‘ $ kubectl apply -f dist/kyverno/ clusterpolicy.kyverno.io/require-app-label configured clusterpolicy.kyverno.io/require-request-limit configured clusterpolicy.kyverno.io/run-as-non-root configured
-
Test negative, the deployment
inflate-negative-test-deployment.yaml
does not have resource limit and request and enablerunAsNonRoot
β‘ $ kubectl apply -f src/test-yaml/inflate-negative-test-deployment.yaml Error from server: error when creating "src/test-yaml/inflate-negative-test-deployment.yaml": admission webhook "validate.kyverno.svc-fail" denied the request: policy Deployment/default/inflate-negative-test for resource violations: require-app-label: {} require-request-limit: autogen-require-request-limit: 'validation error: All containers must have CPU and memory resource requests and limits defined. rule autogen-require-request-limit failed at path /spec/template/spec/containers/0/resources/limits/'
-
Test positive
kubectl apply -f src/test-yaml/inflate-positive-test-deployment.yaml deployment.apps/inflate-positive-test created
-
Test without non-root user enabled, because the validation failure action is
AUDIT
so the deployment is applied successfullyβ‘ $ kubectl apply -f src/test-yaml/inflate-without-nonroot-test-deployment.yaml deployment.apps/inflate-without-nonroot-test created
-
But letβs view the policy violations
β‘ $ kubectl describe polr polr-ns-default | grep inflate -A15 -B10| grep "Result: \+fail" -B10 Seconds: 1661326749 Category: Pod Security Standards Message: validation error: Containers must be required to run as non-root users. This policy ensures runAsNonRoot is set to true. rule autogen-run-as-non-root[0] failed at path /spec/template/spec/securityContext/runAsNonRoot/ rule autogen-run-as-non-root[1] failed at path /spec/template/spec/containers/0/securityContext/ Policy: run-as-non-root Resources: API Version: apps/v1 Kind: Deployment Name: inflate-without-nonroot-test Namespace: default UID: b05068c1-425c-41f4-ae0f-c913100a1c9c Result: fail
π Test Restart Deployment On Configmap Change
-
Changing configmap require rollout restart of deployments which reference to that configmap. We can use kyverno to automate this for us.
-
Create kyverno policy to watch a
Configmap
and if it changes will write an annotation to one or more target Deployments thus triggering a new rollout and thereby refreshing the referredConfigmap
-
First we need to grant additional privileges to the Kyverno ServiceAccount for updating
apps.deployments
resources throughAggregated ClusterRoles
-
Kyverno has clusterrole with
aggregationRule
which will combine all clusterrole with labelapp: kyverno
into one in aggregationaggregationRule: clusterRoleSelectors: - matchLabels: app: kyverno
-
Create new kyverno clusterrole to inject to the main one kyverno-clusterrole.ts.
-
-
Kyverno policy to Restart Deployment On Configmap Change: restart-on-configmap-changes.ts
-
Rebuild project to generate manifest yaml files.
npx projen build
β‘ $ tree dist/ dist/ βββ kyverno β βββ require-app-label-kyverno-policy.yaml β βββ require-request-limit-kyverno-policy.yaml β βββ restart-on-configmap-change-policy.yaml β βββ run-as-non-root-kyverno-policy.yaml βββ role βββ kyverno-create-deployments-clusterrole.yaml 2 directories, 5 files
-
Apply clusterrole and policy then test using
inflate-positive-test-deployment.yaml
andinflate-test-configmap.yaml
β‘ $ kv7 get cpol restart-on-configmap-change NAME BACKGROUND ACTION READY restart-on-configmap-change true audit true β‘ $ kv7 get deploy -l app=inflate-positive-test NAME READY UP-TO-DATE AVAILABLE AGE inflate-positive-test 1/1 1 1 62m β‘ $ kv7 get cm -l app=inflate-test-configmap NAME DATA AGE inflate-test-configmap 2 64m
-
We now update the configmap to see kyverno rollout restart the deployment
β‘ $ kv7 apply -f inflate-test-configmap.yaml configmap/inflate-test-configmap configured ~ $ kv7 get pod -l app=inflate-positive-test --watch NAME READY STATUS RESTARTS AGE inflate-positive-test-668477b686-cdggl 1/1 Running 0 3m3s inflate-positive-test-59bb77549c-lxcjx 0/1 Pending 0 0s inflate-positive-test-668477b686-cdggl 1/1 Terminating 0 3m9s inflate-positive-test-59bb77549c-lxcjx 0/1 Pending 0 0s inflate-positive-test-59bb77549c-lxcjx 0/1 ContainerCreating 0 0s inflate-positive-test-59bb77549c-lxcjx 1/1 Running 0 1s inflate-positive-test-668477b686-cdggl 1/1 Terminating 0 3m11s inflate-positive-test-668477b686-cdggl 1/1 Terminating 0 3m11s
π Conclusion
- Someone said
Kyverno policy as code
but the code in yaml language, itβs not actual programming language. - Using CDK8S to generate Kyverno policy help to leverage the strong programming skill of developer and structure project more efficiently.