Skip to content

Commit 825b162

Browse files
authored
Update policy-for-kubernetes.md
1 parent 88c3b49 commit 825b162

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed

articles/governance/policy/concepts/policy-for-kubernetes.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -606,6 +606,24 @@ Finally, to identify the AKS cluster version that you're using, follow the linke
606606

607607
### Add-on versions available per each AKS cluster version
608608

609+
#### 1.7.0
610+
Introducing expansion, a shift left feature that will let you know up front whether your workload resources (Deployments, ReplicaSets, Jobs, etc) will produce admissible pods. Expansion should not change the behavior of your policies; rather, it will just shift Gatekeeper's evaluation of pod-scoped policies to occur at workload admission time rather than pod admission time. However, to perform this evaluation it must generate and evaluate a what-if pod based on the pod spec defined in the workload, which may have incomplete metadata (for instance, it will be missing the proper owner references). Because of this small risk of policy behavior changing, we are introducing expansion as disabled by default. To enable expansion for a given policy definition, set `.policyRule.then.details.source` to `All`. Built-ins will be updated soon to enable parameterization of this field. If you test your policy definition and find that the what-if pod being generated for evaluation purposes is incomplete, you can also use a mutation with source `Generated` to mutate the what-if pods. For more information on this option, view the [Gatekeeper documentation](https://open-policy-agent.github.io/gatekeeper/website/docs/expansion#mutating-example).
611+
Update the addon to use MSAL by default, with a fallback to ADAL (full ADAL removal will occur next release).
612+
- Released July 2024
613+
- Kubernetes 1.27+
614+
- Gatekeeper 3.16.3
615+
616+
#### 1.6.1
617+
Security improvements.
618+
- Released May 2024
619+
- Gatekeeper 3.14.2
620+
621+
#### 1.5.0
622+
Security improvements.
623+
- Released May 2024
624+
- Kubernetes 1.27+
625+
- Gatekeeper 3.16.3
626+
609627
#### 1.4.0
610628

611629
Enables mutation and external data by default. The additional mutating webhook and increased validating webhook timeout cap might add latency to calls in the worst case. Also introduces support for viewing policy definition and set definition version in compliance results.

0 commit comments

Comments
 (0)