spicedb-operator
rbacsync
spicedb-operator | rbacsync | |
---|---|---|
2 | 1 | |
57 | 236 | |
- | -0.4% | |
7.8 | 3.9 | |
7 days ago | 5 months ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
spicedb-operator
-
Writing a Kubernetes Operator
This is a common frustration of mine as well!
In the latest release of the spicedb-operator[0], I added a feature that allows users to specify arbitrary patches over operator-managed resources directly in the API (examples in the link).
There are some other projects like Kyverno and Gatekeeper that try to do this generically with mutating webhooks, but embedding a `patches` API into the operator itself gives the operator a chance to ensure the changes are within some reasonable guardrails.
[0]: https://github.com/authzed/spicedb-operator/releases/tag/v1....
rbacsync
-
Struggling to understand how Google Groups for RBAC is scalable
Prior to google groups being supported in any manner we made rbacsync that does analogous. It's a custom controller that takes IaC declarations for rolebindings, and maps a given google group name to them on a per namespace or cluster basis. In GKE, this worked with a user's auth token from GCP (claims were in the JWT). Id expect it to work with your OIDC integration as well.
What are some alternatives?
examples - A collection of examples for SpiceDB users
openunison-k8s-login-oidc - Kubernetes login portal for both kubectl and the dashboard using OpenID Connect. Use groups from your assertion in RBAC policies to control access to your cluster. Supports impersonation and OpenID Connect integration with your API server.
prometheus-operator - Prometheus Operator creates/configures/manages Prometheus clusters atop Kubernetes
nifikop - The NiFiKop NiFi Kubernetes operator makes it easy to run Apache NiFi on Kubernetes. Apache NiFI is a free, open-source solution that support powerful and scalable directed graphs of data routing, transformation, and system mediation logic.
kubebuilder - Kubebuilder - SDK for building Kubernetes APIs using CRDs
argocd-operator - A Kubernetes operator for managing Argo CD clusters.
kubeplus - Kubernetes Operator to create multi-instance SaaS from Helm charts using Kubernetes-native APIs
k8s-pod-restart-info-collector - Automated troubleshooting of Kubernetes Pods issues. Collect K8s pod restart reasons, logs, and events automatically.
databricks-kube-operator - A Kubernetes operator to enable GitOps style deploys for Databricks resources
kube-httpcache - Varnish Reverse Proxy on Kubernetes
schemahero - A Kubernetes operator for declarative database schema management (gitops for database schemas)
skipper - An HTTP router and reverse proxy for service composition, including use cases like Kubernetes Ingress