KubeDojo

Admission Controllers: Validating and Mutating

AK
by Alexis Kinsella··16 min read
Admission Controllers: Validating and Mutating

Authentication passes. Authorization passes. The Pod still gets rejected. Something between the API server's authorization layer and etcd said no. That something is admission control.

Admission controllers are the final enforcement point in the Kubernetes request lifecycle. Every create, update, or delete passes through them after authentication and authorization, but before the object is persisted to etcd. Built-in controllers enforce Kubernetes invariants: defaulting service accounts, enforcing quotas, applying Pod Security Standards. Policy engines like OPA Gatekeeper and Kyverno extend that gate with organization-specific security rules. And since Kubernetes v1.30, ValidatingAdmissionPolicy lets you write CEL-based validation rules directly in the API, with no webhook server to operate.

Sign in to access this lesson

Create a free account or sign in to enroll in the KCSA — Kubernetes and Cloud Native Security Associate course and access all 39 lessons.

KCSA — Kubernetes and Cloud Native Security Associate

39 lessons

Browse the full course curriculum →