Skip to content

Commit c0ff4d8

Browse files
Merge pull request #288089 from anlandu/patch-5
Update policy-for-kubernetes.md
2 parents 2cad073 + 863b869 commit c0ff4d8

File tree

1 file changed

+11
-1
lines changed

1 file changed

+11
-1
lines changed

articles/governance/policy/concepts/policy-for-kubernetes.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -606,18 +606,28 @@ Finally, to identify the AKS cluster version that you're using, follow the linke
606606

607607
### Add-on versions available per each AKS cluster version
608608

609+
#### 1.8.0
610+
Policy can now be used to evaluate CONNECT operations, for instance, to deny `exec`s. Note that there is no brownfield compliance available for noncompliant CONNECT operations, so a policy with Audit effect that targets CONNECTs is a no op.
611+
612+
Security improvements.
613+
- Released November 2024
614+
- Kubernetes 1.27+
615+
- Gatekeeper 3.17.1
616+
609617
#### 1.7.1
610618
Introducing CEL and VAP. Common Expression Language (CEL) is a Kubernetes-native expression language that can be used to declare validation rules of a policy. Validating Admission Policy (VAP) feature provides in-tree policy evaluation, reduces admission request latency, and improves reliability and availability. The supported validation actions include Deny, Warn, and Audit. Custom policy authoring for CEL/VAP is allowed, and existing users won't need to convert their Rego to CEL as they will both be supported and be used to enforce policies. To use CEL and VAP, users need to enroll in the feature flag `AKS-AzurePolicyK8sNativeValidation` in the `Microsoft.ContainerService` namespace. For more information, view the [Gatekeeper Documentation](https://open-policy-agent.github.io/gatekeeper/website/docs/validating-admission-policy/).
611619

612620
Security improvements.
613-
- Released Sep 2024
621+
- Released September 2024
614622
- Kubernetes 1.27+ (VAP generation is only supported on 1.30+)
615623
- Gatekeeper 3.17.1
616624

617625
#### 1.7.0
618626

619627
Introducing expansion, a shift left feature that lets you know up front whether your workload resources (Deployments, ReplicaSets, Jobs, etc.) will produce admissible pods. Expansion shouldn't change the behavior of your policies; rather, it just shifts Gatekeeper's evaluation of pod-scoped policies to occur at workload admission time rather than pod admission time. However, to perform this evaluation it must generate and evaluate a what-if pod that is based on the pod spec defined in the workload, which might have incomplete metadata. For instance, the what-if pod won't contain the proper owner references. Because of this small risk of policy behavior changing, we're introducing expansion as disabled by default. To enable expansion for a given policy definition, set `.policyRule.then.details.source` to `All`. Built-ins will be updated soon to enable parameterization of this field. If you test your policy definition and find that the what-if pod being generated for evaluation purposes is incomplete, you can also use a mutation with source `Generated` to mutate the what-if pods. For more information on this option, view the [Gatekeeper documentation](https://open-policy-agent.github.io/gatekeeper/website/docs/expansion#mutating-example).
620628

629+
Expansion is currently only available on AKS clusters, not Arc clusters.
630+
621631
Security improvements.
622632
- Released July 2024
623633
- Kubernetes 1.27+

0 commit comments

Comments
 (0)