UNCLASSIFIED - NO CUI

Update default Kyverno policy settings to remove most audit policies

During beta testing, audit policies have shown a significant impact on clusters with large numbers of pods. CPU/memory spikes on the Kyverno pod and API requests significantly increase, which can cause denial-of-service for admission into the K8S cluster if hammered hard enough. Until we have a suitable workaround for this, the recommendation is to minimize the number of Kyverno policies in audit mode.

For this issue ...

  • Leave the policies set to enforce alone
  • Disable all policies in audit mode except
    • require-non-root-user
    • require-non-root-group

The guidance going forward will be to audit policies that we are actively working on moving to enforce mode.