Agent Skills: Runtime Deployment: Admission Control with Kyverno

>-

UncategorizedID: adaptive-enforcement-lab/claude-skills/runtime-deployment-admission-control-with-kyverno

Install this agent skill to your local

pnpm dlx add-skill https://github.com/adaptive-enforcement-lab/claude-skills/tree/HEAD/plugins/enforce/skills/runtime-deployment-admission-control-with-kyverno

Skill Files

Browse the full folder contents for runtime-deployment-admission-control-with-kyverno.

Download Skill

Loading file tree…

plugins/enforce/skills/runtime-deployment-admission-control-with-kyverno/SKILL.md

Skill Metadata

Name
runtime-deployment-admission-control-with-kyverno
Description
>-

Runtime Deployment: Admission Control with Kyverno

When to Use This Skill

Runtime admission control enforces policies at the cluster level using Kyverno admission webhooks:

graph TD
    K[kubectl apply] --> API[Kubernetes API Server]
    API --> ADM[Admission Controller]
    ADM --> KYV[Kyverno Webhook]
    KYV --> POL{Policy Check}
    POL -->|Pass| ETCD[(etcd)]
    POL -->|Fail| REJECT[Reject Request]

    %% Ghostty Hardcore Theme
    style ETCD fill:#a7e22e,color:#1b1d1e
    style REJECT fill:#f92572,color:#1b1d1e

Runtime is the Final Safety Net

Local dev and CI checks can be bypassed. Runtime admission control is the last line of defense. If it fails, non-compliant resources never reach production.


Implementation

Kyverno Deployment

Deploy Kyverno using Helm:

helm repo add kyverno https://kyverno.github.io/kyverno/
helm repo update

helm install kyverno kyverno/kyverno \
  --namespace kyverno \
  --create-namespace \
  --values kyverno-values.yaml

kyverno-values.yaml:

See examples.md for detailed code examples.

Background Scan Interval

Set backgroundScanInterval to 6h for most clusters. Reduce to 1h for high-compliance environments. Increase to 12h for large clusters (1000+ nodes).

Policy Reporter Deployment

helm repo add policy-reporter https://kyverno.github.io/policy-reporter
helm repo update

helm install policy-reporter policy-reporter/policy-reporter \
  --namespace policy-reporter \
  --create-namespace \
  --values policy-reporter-values.yaml

policy-reporter-values.yaml:

See examples.md for detailed code examples.

Policy Reporter UI

Access the dashboard with kubectl port-forward -n policy-reporter svc/policy-reporter-ui 8080:8080. Navigate to http://localhost:8080.


Examples

See examples.md for code examples.

Full Reference

See reference.md for complete documentation.

References