website-and-documentation/content/en/docs/solution/tools/kyverno integration/_index.md
Stephan Lo f797af114b test: configure comprehensive markdown linting with Docsy best practices
Configure markdownlint with rules aligned to technical documentation
standards and Docsy theme conventions.

Design Decisions:
- Enable core quality rules (heading hierarchy, consistent list styles)
- Allow inline HTML for Docsy shortcodes and components
- Permit bare URLs (common in technical documentation)
- Make code block language hints optional (pragmatic for existing content)
- Set maximum 2 consecutive blank lines (balanced readability)
- Enforce single trailing newline (POSIX standard)
- Use asterisk for unordered lists (consistency)
- Allow 2-space list indentation (Markdown standard)

Auto-fixed Issues:
- Converted dash lists to asterisk lists (568 fixes)
- Removed trailing spaces (211 fixes)
- Added missing trailing newlines (74 fixes)
- Added blank lines around lists and headings (100+ fixes)

Remaining Style Warnings (intentionally accepted):
- MD029: List numbering variations in meeting notes (75 instances)
- MD036: Bold text for section headers in ADRs (13 instances)
- MD025: Multiple H1 in notes/brainstorming docs (10 instances)
- MD032/MD022: Minor spacing variations (15 instances)

Test Results:
 Hugo build: 227 pages generated successfully
 HTML validation: No errors
 Link checking: All links valid (except dev-only livereload)
 Markdown linting: Only non-critical style warnings remain

The configuration balances strict quality checks with pragmatic
flexibility for diverse content types (documentation, ADRs, meeting
notes, tutorials).
2025-10-23 14:25:46 +02:00

1.8 KiB

title description
Kyverno Kyverno is a policy engine for Kubernetes designed to enforce, validate, and mutate configurations of Kubernetes resources

Kyverno Overview

Kyverno is a policy engine for Kubernetes designed to enforce, validate, and mutate configurations of Kubernetes resources. It allows administrators to define policies as Kubernetes custom resources (CRDs) without requiring users to learn a new language or system.

Key Uses

  1. Policy Enforcement: Kyverno ensures resources comply with security, operational, or organizational policies, such as requiring specific labels, annotations, or resource limits.
  2. Validation: It checks resources against predefined rules, ensuring configurations are correct before they are applied to the cluster.
  3. Mutation: Kyverno can automatically modify resources on-the-fly, adding missing fields or values to Kubernetes objects.
  4. Generation: It can generate resources like ConfigMaps or Secrets automatically when needed, helping to maintain consistency.

Kyverno simplifies governance and compliance in Kubernetes environments by automating policy management and ensuring best practices are followed.

Prerequisites

Same as for idpbuilder installation

  • Docker Engine
  • Go
  • kubectl
  • kind

Installation

Build process

For building idpbuilder the source code needs to be downloaded and compiled:

git clone https://github.com/cnoe-io/idpbuilder.git
cd idpbuilder
go build

Start idpbuilder

To start the idpbuilder with kyverno integration execute the following command:

idpbuilder create --use-path-routing -p https://github.com/cnoe-io/stacks//ref-implementation -p https://github.com/cnoe-io/stacks//kyverno-integration

After this step, you can see in ArgoCD that kyverno was installed