gatekeeper
polaris
Our great sponsors
gatekeeper | polaris | |
---|---|---|
22 | 11 | |
3,465 | 3,085 | |
2.0% | 0.9% | |
9.3 | 7.2 | |
4 days ago | 8 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
gatekeeper
- Shrink to Secure: Kubernetes and Secure Compact Containers
-
Long, detailed post mortem on a reddit failed k8s upgrade
When the Gatekeeper validatingwebhook came up, I was really worried that'd be the issue! Regardless I'd recommend anyone who cares about their cluster not collapsing to change the gatekeeper webhook to only intercept resources you care about: https://github.com/open-policy-agent/gatekeeper/pull/1806
- Is OPA Gatekeeper the best solution for writing policies for k8s clusters?
-
Implement DevSecOps to Secure your CI/CD pipeline
Kyverno adds an extra layer of security where only the allowed type of manifest is deployed onto kubernetes, otherwise, it will reject or we can set validationFailureAction to audit which only logs the policy violation message for reporting. Kubewarden and Gatekeeper are alternative tools available to enforce policies on Kubernetes CRD.
-
Gatekeeper with Istio
Now, we have the hardest part resolved and let's turn our attention to the OPA Gatekeeper. Gatekeeper uses the OPA Constraint Framework to describe and enforce policy. Right now there are mainly 3 parts we should pay attention:
-
10 Essentials For Kubernetes Multi-Tenancy
They enable you to establish the policies and regulations that govern cluster deployments and applications. Using predefined policies, policy engines can dynamically modify or create configurations. Policy engines such as Gatekeeper and Kyverno can be leveraged to meet legal and compliance requirements while maintaining operational flexibility and development speed.
- Gatekeeper - Policy Controller for Kubernetes
-
Kubernetes for Startups: Practical Considerations for Your App
Setup policy around what resource requirements can be requested by an app per environment. OPA and gatekeeper or kyverno can help. Setup access control for who can create or modify apps.
-
Kubernetes policy management: I - Introduction
OPA Gatekeeper is an open source, general purpose policy engine. OPA decouples policy decisions from other responsibilities of an application, like those commonly referred to as business logic. OPA works equally well making decisions for Kubernetes, Microservices, functional application authorization and more, thanks to its single unified policy language.
- Gatekeeper
polaris
- Is OPA Gatekeeper the best solution for writing policies for k8s clusters?
-
Securing Kubernetes clusters using OSS tools
I'll also plug Polaris as a way to monitor and enforce best practices for Deployments, StatefulSets, and other developer-controlled resources.
-
All about Komodor :- A Kubernetes Troubleshooting Platform and more
It's open source repository is https://github.com/FairwindsOps/polaris
-
Monthly: Who is hiring?
Come help us build great open source and commercial software for Kubernetes! You may know us from projects like Polaris and Goldilocks. We're building an inclusive, learning-driven, remote-first culture and are looking to grow our team.
-
Top 6 Kubernetes Security Tools
Here's a link to Polaris on Github
-
NSA Kubernetes Hardening Guidance [pdf]
so... a lot of this can be done with Fairwind's OSS tool Polaris... https://github.com/FairwindsOps/polaris
feels good that we've been addressing this for a bit already tbh.
- Show HN: Polaris 4.0 – Policy for Kubernetes Resources
-
Looking for k8s security tools that run outside of the cluster
Polaris has various tools that run inside and outside your cluster: https://github.com/FairwindsOps/polaris
-
An automatic diagnostic tool for Kubernetes cluster
KubeEye is an open-source diagnostic tool for identifying various Kubernetes cluster issues automatically, such as misconfigurations, unhealthy components and node failures. It empowers cluster operators to manage and troubleshoot clusters in a timely and graceful manner. Developed in Go on the basis of Polaris and Node Problem Detector, KubeEye is equipped with a series of built-in rules for exception detection. Besides pre-defined rules, KubeEye also supports customized rules.
-
Top 20 useful k8s tools
Link : https://github.com/FairwindsOps/polaris
What are some alternatives?
Kyverno - Kubernetes Native Policy Management
kube-score - Kubernetes object analysis with recommendations for improved reliability and security. kube-score actively prevents downtime and bugs in your Kubernetes YAML and Charts. Static code analysis for Kubernetes.
falco - Cloud Native Runtime Security
datree - Prevent Kubernetes misconfigurations from reaching production (again 😤 )! From code to cloud, Datree provides an E2E policy enforcement solution to run automatic checks for rule violations. See our docs: https://hub.datree.io
cloud-custodian - Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources
popeye - 👀 A Kubernetes cluster resource sanitizer
k-rail - Kubernetes security tool for policy enforcement
kube-bench - Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
connaisseur - An admission controller that integrates Container Image Signature Verification into a Kubernetes cluster
kube-no-trouble - Easily check your clusters for use of deprecated APIs
opa-envoy-plugin - A plugin to enforce OPA policies with Envoy
opa-image-scanner - Kubernetes Admission Controller for Image Scanning using OPA