Cloud Native Policy Management 🎉
Kyverno is a policy engine designed for Kubernetes platform engineering teams. It enables security, automation, compliance, and governance using policy-as-code. Kyverno can validate, mutate, generate, and cleanup configurations using Kubernetes admission controls, background scans, and source code respository scans. Kyverno policies can be managed as Kubernetes resources and do not require learning a new language. Kyverno is designed to work nicely with tools you already use like kubectl, kustomize, and Git.
Kyverno installation and reference documents are available at [kyverno.io] (https://kyverno.io).
We are here to help!
👉 For feature requests and bugs, file an issue.
👉 For discussions or questions, join the Kyverno Slack channel.
👉 For community meeting access, join the mailing list.
👉 To get updates ⭐️ star this repository.
Thanks for your interest in contributing to Kyverno! Here are some steps to help get you started:
✔ Read and agree to the Contribution Guidelines.
✔ Browse through the GitHub discussions.
✔ Read Kyverno design and development details on the GitHub Wiki.
✔ Check out the good first issues list. Add a comment with /assign
to request assignment of the issue.
✔ Check out the Kyverno Community page for other ways to get involved.
All Kyverno images include a Software Bill of Materials (SBOM) in CycloneDX JSON format. SBOMs for Kyverno images are stored in a separate repository at ghcr.io/kyverno/sbom
. More information on this is available at Fetching the SBOM for Kyverno.
Kyverno is built and maintained by our growing community of contributors!
Made with contributors-img.
Copyright 2024, the Kyverno project. All rights reserved. Kyverno is licensed under the Apache License 2.0.
Kyverno is a Cloud Native Computing Foundation (CNCF) Incubating project and was contributed by Nirmata.