How admission controllers enforce cluster policies: OPA/Gatekeeper, Kyverno, and Pod Security Standards.
How admission controllers enforce cluster policies: OPA/Gatekeeper, Kyverno, and Pod Security Standards.
Mutating admission controllers modify incoming requests (e.g. inject sidecar, add default resource limits). Validating admission controllers accept/reject requests based on policy. OPA/Gatekeeper and Kyverno implement both. Pod Security Standards (Baseline, Restricted) are built-in validating policies.
Key takeaways
Related concepts
Explore topics that connect to this one.
Ready to see how this works in the cloud?
Switch to Career Paths for structured paths (e.g. Developer, DevOps) and provider-specific lessons.
View role-based pathsSign in to track your progress and mark lessons complete.
Questions? Discuss in the community or start a thread below.
Join DiscordSign in to start or join a thread.