Kubewarden
neuvector-helm
Kubewarden | neuvector-helm | |
---|---|---|
4 | 2 | |
132 | 108 | |
0.8% | 3.7% | |
9.5 | 8.9 | |
3 days ago | 6 days ago | |
Rust | Go | |
Apache-2.0 License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Kubewarden
-
Kubernetes Security tooling -Open Source (Non-SaaS
If you're already playing with webassembly, take a look at kubewarden.io
-
Is OPA Gatekeeper the best solution for writing policies for k8s clusters?
I'm one of the developers of kubewarden, a CNCF sandbox project that operates in the same space as OPA/Gatekeeper and Kyverno.
-
OPA Rego is ridiculously confusing - best way to learn it?
An alternative to OPA (and Rego) is Kubewarden (kubewarden.io), which can actually run Rego policies, but really allows policy writing in any language that compiles to wasm. This opens up your options a lot.
-
Kyverno VS policy-server - a user suggested alternative
2 projects | 14 Mar 2022
Kubewarden is a policy engine for Kubernetes. It helps with keeping your Kubernetes clusters secure and compliant. Kubewarden policies can be written using regular programming languages or Domain Specific Languages (DSL). Policies are compiled into WebAssembly modules that are then distributed using traditional container registries.
neuvector-helm
- stopping namespaces to talk with each other
-
Is OPA Gatekeeper the best solution for writing policies for k8s clusters?
You can test and have this up-and-running in less than 30 minutes... 1. deploy NeuVector into your cluster and login (~10 minutes via helm?) 2. login & change admin password - (2 minutes?) 3. Policy > Admission Control 4. click Add - select "Image Registry", "is one of", add your registries, click add - (2 minutes?) 5. click Add - select "Resource Limit Configuration (RLC) - set appropriate values, click add - (4 minutes?) 6. Click Status to "Enabled" & confirm Mode is set to "Monitor" so you can collect violation data without pissing someone off. (the Protect mode will block scheduling of image by kubernetes) - 2 minutes
What are some alternatives?
Kyverno - Kubernetes Native Policy Management
photon - ⚡ Rust/WebAssembly image processing library
k-rail - Kubernetes security tool for policy enforcement
artichoke - 💎 Artichoke is a Ruby made with Rust
bridgekeeper - Kubernetes policy enforcement using python
jspolicy - jsPolicy - Easier & Faster Kubernetes Policies using JavaScript or TypeScript
datree - Prevent Kubernetes misconfigurations from reaching production (again 😤 )! From code to cloud, Datree provides an E2E policy enforcement solution to run automatic checks for rule violations. See our docs: https://hub.datree.io
lucet - Lucet, the Sandboxing WebAssembly Compiler.
checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more