spicedb-operator
schemahero
spicedb-operator | schemahero | |
---|---|---|
2 | 2 | |
57 | 952 | |
- | 0.6% | |
7.8 | 8.4 | |
7 days ago | 3 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
spicedb-operator
-
Writing a Kubernetes Operator
This is a common frustration of mine as well!
In the latest release of the spicedb-operator[0], I added a feature that allows users to specify arbitrary patches over operator-managed resources directly in the API (examples in the link).
There are some other projects like Kyverno and Gatekeeper that try to do this generically with mutating webhooks, but embedding a `patches` API into the operator itself gives the operator a chance to ensure the changes are within some reasonable guardrails.
[0]: https://github.com/authzed/spicedb-operator/releases/tag/v1....
schemahero
- SchemaHero Is a Kubernetes Operator for Declarative Schema Management
-
Warrant - Open source, self-hostable application authorization and access control service
For projects that I use, I sure do where I fixed that exact bug in another project that should have known better, but they weren't claiming to be a security product and then swallowing error. I also bet $1 that GoLand would flag those swallowed err instances, meaning this is yet another project being cool by using vim or vscode or whatever non-serious people use for coding
What are some alternatives?
examples - A collection of examples for SpiceDB users
k8up - Kubernetes and OpenShift Backup Operator
prometheus-operator - Prometheus Operator creates/configures/manages Prometheus clusters atop Kubernetes
k8gb - A cloud native Kubernetes Global Balancer
kubebuilder - Kubebuilder - SDK for building Kubernetes APIs using CRDs
warrant - Warrant is a highly scalable, centralized authorization service based on Google Zanzibar, used for defining, querying, and auditing application authorization models and access control rules.
rbacsync - Automatically sync groups into Kubernetes RBAC
eraser - 🧹 Cleaning up images from Kubernetes nodes
kubeplus - Kubernetes Operator to create multi-instance SaaS from Helm charts using Kubernetes-native APIs
postgres-operator - Production PostgreSQL for Kubernetes, from high availability Postgres clusters to full-scale database-as-a-service.
databricks-kube-operator - A Kubernetes operator to enable GitOps style deploys for Databricks resources
hyperconverged-cluster-operator - Operator pattern for managing multi-operator products