jspolicy VS datree

Compare jspolicy vs datree and see what are their differences.

jspolicy

jsPolicy - Easier & Faster Kubernetes Policies using JavaScript or TypeScript (by loft-sh)

datree

Prevent Kubernetes misconfigurations from reaching production (again šŸ˜¤ )! From code to cloud, Datree provides an E2E policy enforcement solution to run automatic checks for rule violations. See our docs: https://hub.datree.io (by datreeio)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
jspolicy datree
10 34
341 6,407
3.2% 0.1%
6.1 5.2
about 1 month ago 29 days ago
Go Go
Apache License 2.0 Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

jspolicy

Posts with mentions or reviews of jspolicy. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-11-10.
  • Test your infrastructure with test cases in JavaScript
    1 project | /r/sre | 24 Apr 2023
  • Is OPA Gatekeeper the best solution for writing policies for k8s clusters?
    14 projects | /r/kubernetes | 10 Nov 2022
  • OPA Rego is ridiculously confusing - best way to learn it?
    6 projects | /r/kubernetes | 20 Sep 2022
    I struggled with understanding OPA too! I have not seen this mentioned, but one straightforward alternative is JSPolicy (https://www.jspolicy.com/), which allows you to write policies in Javascript or Typescript. It is really easy to understand and get started.
  • Checklist for Platform Engineers
    6 projects | dev.to | 16 Jun 2022
    You will likely want to implement certain restrictions, limits, quotas, or security policies for your Kubernetes clusters. This could help with auditing or monitoring tasks, or with standardizing a quota for certain resources. Tools like the Open Policy Agent (OPA), jsPolicy, or Kyverno can be used based on your needs. Many developers are more comfortable with YAML or JavaScript, so Kyverno or jsPolicy might be preferred.
  • 7 Kubernetes Companies to Watch in 2022
    6 projects | dev.to | 16 Jun 2022
    In 2021 we also released two new open source projects: vcluster, a tool for creating and using virtual Kubernetes clusters, and jsPolicy, a tool for writing policies for Kubernetes clusters in JavaScript or TypeScript. vcluster especially gained a lot of traction and our CEO Lukas Gentele gave a talk about it at KubeCon Los Angeles.
  • Kubernetes Policy Enforcement: OPA vs jsPolicy
    5 projects | dev.to | 16 Jun 2022
    Either engine could be a good choice for your business. Consider which factors are most relevant to your project and your use case before you make a decision. You can learn more about jsPolicy here and about OPA here.
  • Loft Labs Raises $4.6 Million Seed Funding to Scale Up Self-Service
    3 projects | dev.to | 16 Jun 2022
    Loft Labs is the creator of several popular open-source projects in the cloud-native technology space, including the Kubernetes developer tool DevSpace, the certified Kubernetes distribution vcluster, and the policy engine jsPolicy. The companyā€™s commercial product, Loft, enables any organization to scale self-service access to Kubernetes to hundreds or even thousands of engineers. Loft's customers span from fast-growing startups Gusto, Urbint, and HqO to well-established Fortune 500 companies that include one of the largest U.S. financial institutions and one of the worldā€™s largest car manufacturers.
  • New Open-Source Project Makes Kubernetes Policies Simple, Maintainable
    2 projects | dev.to | 16 Jun 2022
    Loft Labs also recently released vcluster, a first-of-its-kind virtual cluster technology for Kubernetes. jsPolicy now available at www.jspolicy.com and on Github.
  • Running containers as non-root in Kubernetes
    2 projects | /r/kubernetes | 2 Feb 2022
    Would you mind explaining why is it hard for admission controllers to check container definitions of the pod? I've never used OPA or Kyverno, but I want to start contributing to a competitor project, so I am really curious to find out. Thank you! :)
  • How To Create Virtual Kubernetes Clusters With vcluster By loft
    1 project | /r/kubernetes | 29 Jun 2021
    This makes sense and I made the assumption that someone thought about the root-ability thing after I saw loft-sh/jspolicy.

datree

Posts with mentions or reviews of datree. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-04.
  • Show HN: Datree (YC W20) ā€“ End-to-End Policy Management for Kubernetes
    2 projects | news.ycombinator.com | 4 Apr 2023
    Hi HN, Iā€™m Shimon, the co-founder of Datree: A policy management solution for Kubernetes. We help DevOps engineers prevent misconfigurations in their Kubernetes by enforcing an organizational policy on their clusters. Engineers can define a custom policy or use one of Datreeā€™s built-in policies, such as NIST/NSA Hardening Guide, EKS Security Best Practices, CIS Benchmark, and more.

    Our website is at https://datree.io and our GitHub is here: https://github.com/datreeio/datree

    This is not the first time I have shown Datree to the HN community: A little over a year ago, I posted here an earlier version of Datree (https://news.ycombinator.com/item?id=28918850). At that time, Datree consisted of a CLI tool to detect Kubernetes misconfigurations during the development process (locally or in the CI/CD), unlike the version I present today in which the enforcement happens in production.

    We built the CLI tool because we detected a big problem among Kubernetes operators: Misconfigurations. Kubernetes is extremely complex and flexible, which makes it very easy to poorly configure it in ways that are not secure. And indeed, we talked to dozens of Kubernetes operators who suffered from various problems, starting with failed audits, all the way to downtime in production, all because of misconfigurations.

    Our solution was simple: Give the developers the means to shift-left security testing during the development process with a CLI tool that can be integrated into the CI/CD. We thought this was the best way to approach the problem: It is easiest to fix misconfigurations in the development process before they are deployed to production, it prevents context-switching and relieves resources from the DevOps team.

    While the CLI tool was very popular among the open-source community (it got over 6000 stars on GitHub), we soon realized that CI/CD enforcement is not enough. As we talked with Datreeā€™s users, we realized we had made a fundamental mistake: We thought of misconfiguration prevention in technical terms rather than organizational terms.

    Indeed, from a technical point of view, it makes sense to shift-left Kubernetes security. But when considering the organizational structure in which it takes place, it simply isnā€™t enough. DevOps engineers told us that they love the shift-left concept, but they simply cannot rely on the goodwill of the engineers to run a CLI tool locally or to monitor all the pipelines leading to production. They need governance, something to help them stay in control of the state of their clusters.

    Moreover, we realized that many companies who use Kubernetes are heavily regulated, and cannot take any chances with their security. Sure, these companies want the engineers to fix misconfigurations during development, but they also want something to make sure that no matter what, their clusters remain misconfiguration-free.

    Based on this understanding, we developed a new version of Datree that sits on the cluster itself (rather than in the CI/CD) and protects the production environment by blocking misconfigured resources with an admission webhook. It has a centralized policy management solution to enable governance, and native monitoring to get real-time insights into the state of your Kubernetes.

    I look forward to hearing your feedback and answering any questions you may have.

  • Is OPA Gatekeeper the best solution for writing policies for k8s clusters?
    14 projects | /r/kubernetes | 10 Nov 2022
  • datreeio/datree: Prevent Kubernetes misconfigurations from reaching production (again šŸ˜¤ )! Datree is a CLI tool to ensure K8s configs follow stability & security best practices as well as your organizationā€™s policies. See our docs: https://hub.datree.io
    1 project | /r/devopsish | 7 Jun 2022
  • Question for the Argo-Verse
    3 projects | /r/argoproj | 12 May 2022
  • How to create a react app with Go support using WebAssembly in under 60 seconds
    4 projects | dev.to | 26 Apr 2022
    Go is a statically typed, compiled programming language designed at Google, it is syntactically similar to C, but with memory safety, garbage collection, structural typing, and CSP-style concurrency. In my case, I needed to run Go for JSON schema validations, in other cases, you might want to perform a CPU-intensive task or use a CLI tool written in Go.
  • Techworld with Nana: Enforce K8s Best Practices with Datree
    1 project | /r/u_datree_io | 26 Apr 2022
  • Gatekeeper vs Kyverno
    3 projects | /r/kubernetes | 18 Apr 2022
    I worked with both of them and from my experience Gatekeeper is more solid and accountable, I even wrote an article about Gatekeeper. Both Gatekeeper and Kyverno require a lot of heavy lifting work. On the one hand, Gatekeeper will probably require more configuration work however the community and the tool itself are more stable than Kyverno. On the other hand, Kyverno policy-as-code capabilities are much easier to use/understand. This way or another, for me using Kyvernoā€™s policy language or Rego for my policies, wasnā€™t such a pleasant experience. I personally believe in GitOps and shifting left so if youā€™re looking for tools I would highly recommend you to review Datree, which is an open-source CLI (Disclaimer: Iā€™m one of the developers at Datree). Datree is a more centralized policy management solution rather than a policy engine. Unlike Kyverno/Gatekeeper Datree was built to help DevOps teams to shift left and practice GitOps by delegating more responsibilities to the developers more efficiently. In practice, Datree already comes with built-in rules and policies along with YAML and schema validation for K8s resources and CRDs such as Argo CRDs. Datreeā€™s policies are written in JSONScheme which is a common solid policy language supported by the community for many years. Additionally, Datreeā€™s CLI also comes with a dashboard app where you can monitor the policies in your organization. You can modify and update your policies, review which policies are being used in practice, and control who can create/delete/update your policies. The major difference is that at the moment, unlike Kyverno/Gatekeeper Datree doesnā€™t provide native policy enforcement in the Kubernetes cluster at the moment but we expect to release this support very soon. At the moment, we provide a way to scan the cluster using a kubectl plugin. Feel free to check it out :)
  • Working with Datreeā€™s Helm Plugin
    2 projects | dev.to | 27 Mar 2022
    $ helm plugin install https://github.com/datreeio/helm-datree Installing helm-datree... https://github.com/datreeio/datree/releases/download/1.0.6/datree-cli_1.0.6_Darwin_x86_64.zip % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 673 100 673 0 0 1439 0 --:--:-- --:--:-- --:--:-- 1469 100 6901k 100 6901k 0 0 1852k 0 0:00:03 0:00:03 --:--:-- 2865k helm-datree is installed. See https://hub.datree.io for help getting started. Installed plugin: datree
  • Adding custom rules in Datree
    1 project | dev.to | 19 Feb 2022
    GitHub
  • Learn from Nana, AWS Hero & CNCF Ambassador, how to enforce K8s best practices with Datree.
    1 project | /r/u_datree_io | 26 Jan 2022

What are some alternatives?

When comparing jspolicy and datree you can also consider the following projects:

Kubewarden - Kubewarden is a policy engine for Kubernetes. It helps with keeping your Kubernetes clusters secure and compliant. Kubewarden policies can be written using regular programming languages or Domain Specific Languages (DSL) sugh as Rego. Policies are compiled into WebAssembly modules that are then distributed using traditional container registries.

KubeArmor - Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (BPF-LSM, AppArmor).

devspace-plugin-loft - Loft Plugin for DevSpace - adds commands like `devspace create space` or `devspace create vcluster` to DevSpace

polaris - Validation of best practices in your Kubernetes clusters

jspolicy-sdk

kube-score - Kubernetes object analysis with recommendations for improved reliability and security. kube-score actively prevents downtime and bugs in your Kubernetes YAML and Charts. Static code analysis for Kubernetes.

website - User docs and sample policies: https://kyverno.io

polaris - Shopifyā€™s design system to help us work together to build a great experience for all of our merchants.

slsa - Supply-chain Levels for Software Artifacts

reviewdog - šŸ¶ Automated code review tool integrated with any code analysis tools regardless of programming language

Kyverno - Kubernetes Native Policy Management