jspolicy
website
jspolicy | website | |
---|---|---|
10 | 2 | |
340 | 30 | |
2.9% | - | |
6.1 | 9.4 | |
23 days ago | 5 days ago | |
Go | JavaScript | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
jspolicy
- Test your infrastructure with test cases in JavaScript
- Is OPA Gatekeeper the best solution for writing policies for k8s clusters?
-
OPA Rego is ridiculously confusing - best way to learn it?
I struggled with understanding OPA too! I have not seen this mentioned, but one straightforward alternative is JSPolicy (https://www.jspolicy.com/), which allows you to write policies in Javascript or Typescript. It is really easy to understand and get started.
-
Checklist for Platform Engineers
You will likely want to implement certain restrictions, limits, quotas, or security policies for your Kubernetes clusters. This could help with auditing or monitoring tasks, or with standardizing a quota for certain resources. Tools like the Open Policy Agent (OPA), jsPolicy, or Kyverno can be used based on your needs. Many developers are more comfortable with YAML or JavaScript, so Kyverno or jsPolicy might be preferred.
-
7 Kubernetes Companies to Watch in 2022
In 2021 we also released two new open source projects: vcluster, a tool for creating and using virtual Kubernetes clusters, and jsPolicy, a tool for writing policies for Kubernetes clusters in JavaScript or TypeScript. vcluster especially gained a lot of traction and our CEO Lukas Gentele gave a talk about it at KubeCon Los Angeles.
-
Kubernetes Policy Enforcement: OPA vs jsPolicy
Either engine could be a good choice for your business. Consider which factors are most relevant to your project and your use case before you make a decision. You can learn more about jsPolicy here and about OPA here.
-
Loft Labs Raises $4.6 Million Seed Funding to Scale Up Self-Service
Loft Labs is the creator of several popular open-source projects in the cloud-native technology space, including the Kubernetes developer tool DevSpace, the certified Kubernetes distribution vcluster, and the policy engine jsPolicy. The company’s commercial product, Loft, enables any organization to scale self-service access to Kubernetes to hundreds or even thousands of engineers. Loft's customers span from fast-growing startups Gusto, Urbint, and HqO to well-established Fortune 500 companies that include one of the largest U.S. financial institutions and one of the world’s largest car manufacturers.
-
New Open-Source Project Makes Kubernetes Policies Simple, Maintainable
Loft Labs also recently released vcluster, a first-of-its-kind virtual cluster technology for Kubernetes. jsPolicy now available at www.jspolicy.com and on Github.
-
Running containers as non-root in Kubernetes
Would you mind explaining why is it hard for admission controllers to check container definitions of the pod? I've never used OPA or Kyverno, but I want to start contributing to a competitor project, so I am really curious to find out. Thank you! :)
-
How To Create Virtual Kubernetes Clusters With vcluster By loft
This makes sense and I made the assumption that someone thought about the root-ability thing after I saw loft-sh/jspolicy.
website
-
My LFX Mentorship With Kyverno
But I keep attending it, went through the documentation of the project for better understanding, kept asking questions on the communication channels, and learnt how to set up the project locally. And soon I made a Pull Request to fix a minor documentation issue. Along with this I also got a chance to take a Kyverno 101 session.
-
Running containers as non-root in Kubernetes
It's pending a release this week but you can find some examples at https://github.com/kyverno/website/issues/442
What are some alternatives?
Kubewarden - Kubewarden is a policy engine for Kubernetes. It helps with keeping your Kubernetes clusters secure and compliant. Kubewarden policies can be written using regular programming languages or Domain Specific Languages (DSL) sugh as Rego. Policies are compiled into WebAssembly modules that are then distributed using traditional container registries.
policies - Kyverno policies for security and best practices
devspace-plugin-loft - Loft Plugin for DevSpace - adds commands like `devspace create space` or `devspace create vcluster` to DevSpace
Kyverno - Kubernetes Native Policy Management
jspolicy-sdk
slsa - Supply-chain Levels for Software Artifacts
kiosk - kiosk 🏢 Multi-Tenancy Extension For Kubernetes - Secure Cluster Sharing & Self-Service Namespace Provisioning
vcluster - vCluster - Create fully functional virtual Kubernetes clusters - Each vcluster runs inside a namespace of the underlying k8s cluster. It's cheaper than creating separate full-blown clusters and it offers better multi-tenancy and isolation than regular namespaces.
k-rail - Kubernetes security tool for policy enforcement
cost-model - Cross-cloud cost allocation models for Kubernetes workloads [Moved to: https://github.com/kubecost/opencost]
OPA (Open Policy Agent) - Open Policy Agent (OPA) is an open source, general-purpose policy engine.