-
Feature
-
Resolution: Unresolved
-
Major
-
None
-
None
-
Product / Portfolio Work
-
False
-
-
False
-
Not Selected
Feature Overview
This feature integrates the display of Kyverno's native PolicyException resources into the Red Hat Advanced Cluster Management (RHACM) Governance user experience. The goal is to provide visibility into which resources have been deliberately exempted from Kyverno policies, leveraging Search data to ensure accurate violation reporting and filling a critical gap in operational transparency.
https://release-1-11-0.kyverno.io/docs/writing-policies/exceptions/
Goals
This Section: Provide high-level goal statement, providing user context
and expected user outcome(s) for this feature
- Integrate and display the status of active Kyverno PolicyException resources within the RHACM Governance console.
- Ensure that status reflects the existence of an exemption (i.e., display that a resource is exempted if a matching PolicyException exists).
- Provide a more accurate and transparent view of the true compliance posture of managed clusters when Kyverno is used.
Requirements
This Section: A list of specific needs or objectives that a Feature must
deliver to satisfy the Feature.. Some requirements will be flagged as MVP.
If an MVP gets shifted, the feature shifts. If a non MVP requirement slips,
it does not shift the feature.
Requirement | Notes | isMvp? |
---|---|---|
Data Collection Enhancement: The Search collector MUST be enhanced to discover and index Kyverno PolicyException Custom Resources (CRs) from managed clusters. | YES | |
Policy Report Integration: ** The Governance UI MUST be updated to accurately reflect when a resource is exempted, based on Kyverno PolicyReport data or the presence of a matching PolicyException indexed by Search. ** | YES | |
Policy Details View: The Policy Details page for Kyverno policies MUST be updated to display a list or indicator of active PolicyExceptions associated with that policy. | YES | |
Violation Details View: When viewing a policy violation for a resource that has an active PolicyException, the UI MUST clearly indicate that the resource is exempted. | YES | |
CI - MUST be running successfully with test automation | This is a requirement for ALL features. |
YES |
Release Technical Enablement | Provide necessary release enablement details and documents. |
YES |
(Optional) Use Cases
This Section:
- Main success scenarios - high-level user stories:
- As an ACM administrator, I want to view a Kyverno policy and immediately see that three namespaces are currently exempted from its enforcement.
- As an operator, when viewing a non-compliant resource, I want to see a clear flag indicating, "This resource is intentionally exempted by PolicyException exception-name."
- As an auditor, I want the policy violation dashboard to accurately reflect the true, permitted state of my resources by factoring in active PolicyExceptions.
- Alternate flow/scenarios - high-level user stories:
- If a PolicyException is removed from a managed cluster, the RHACM Governance UI should reflect the removal and update the resource's compliance status accordingly.
Questions to answer
- ...
Out of Scope
- Exception Workflow: This feature will NOT implement any mechanism for requesting, approving, or managing the lifecycle of PolicyExceptions (e.g., no request forms, no approval workflows).
- Historical Logging: This feature will NOT implement historical logging, auditing, or tracking of PolicyException changes over time.
- CRUD Operations: Users will NOT be able to create, edit, or delete PolicyExceptions from within the RHACM console.
- Custom Exception CRD: This feature will NOT implement a custom RHACM exception CRD; it strictly uses the native Kyverno PolicyException resource.
Background, and strategic fit
Customers use Kyverno's PolicyException feature to manage necessary, temporary deviations from their enforcement policies. Without visibility into these active exemptions, RHACM's Governance compliance dashboards present an inaccurate and overly strict view of non-compliance, leading to potential "false positive" alerts for policy teams. By integrating the display of these native Kyverno resources, we bridge the gap between policy definition and operational reality. This change is crucial for customers using Kyverno and elevates RHACM's value as a comprehensive and trusted source for multi-cluster compliance reporting.
Assumptions
- The Kyverno PolicyException CRD is deployed and in use on relevant managed clusters.
- The Search Collector can be successfully modified to parse and index the data contained within the PolicyException CR, including its targeted policy and resource scope.
- The Kyverno PolicyReports either contain explicit data about the exemption or can be correlated with the indexed PolicyException data to derive the correct exempted status.
Customer Considerations
- Customers will gain operational clarity and confidence in the accuracy of the RHACM violation reporting.
- The primary benefit is improved auditability and reduced noise from known, permissible violations.
Documentation Considerations
Questions to be addressed:
- What educational or reference material (docs) is required to support this
product feature? For users/admins? Other functions (security officers, etc)? - Does this feature have a doc impact?
- New Content, Updates to existing content, Release Note, or No Doc Impact
- If unsure and no Technical Writer is available, please contact Content
Strategy. - What concepts do customers need to understand to be successful in
[action]?- How RHACM now interprets and displays Kyverno's PolicyException.
- That all exception creation and approval still occurs within Kyverno's native tools.
- How do we expect customers will use the feature? For what purpose(s)?
- To quickly verify if a reported non-compliance is covered by an existing, active exemption.
- What reference material might a customer want/need to complete [action]?
- A UI guide pointing out the new exemption indicators.
- Links to the official Kyverno PolicyException documentation.
- Is there source material that can be used as reference for the Technical
Writer in writing the content? If yes, please link if available. - What is the doc impact (New Content, Updates to existing content, or
Release Note)?- A release note announcing the improved visibility for Kyverno PolicyExceptions.
- clones
-
RFE-7866 Integrate Kyverno's PolicyException into RHACM Policy Management
-
- Refinement
-