New OPA environment. #680
Gray-Ghost347
started this conversation in
Ecosystem
Replies: 1 comment 3 replies
-
Hi there! I'm happy to hear that you enjoy using OPA 🙂 For policy enforcement outside of Kubernetes, you could either use OPA core* for that, or possibly Conftest, which is popular in combination with Terraform. Your requirement sounds like it's still Kube though?
But perhaps I'm just not getting it yet. (*FWIW, you can totally use OPA core in the context of Kubernetes too!) |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hey guys,
First of all, I'm becoming a big fan of this tool, it's awesome! I'm from Cyber Security and I'm new to the OPA world.
We are currently deploying Gatekeeper in my organization, which is controlling my entire k8s environment, in conjunction with Terraform/Atlantis. Later this year, we want to migrate our entire environment to Kubernetes!
In the above environment, we have policies in production and everything works fine! But I would like to know how to build a new approach for another environment, outside of Kubernetes.
I have a cloud environment that is currently accessed by a limited number of people, but they can make significant changes within the dashboard. For example, letting a security group accept ingresses to 0.0.0.0./0.
My question, I already know that Gatekeeper only works within k8s, so would I have to have another OPA environment (other than Gatekeeper) installed to control these aspects via Terraform or something else I don't know yet (Lambda function?), via Rego policies?
For example: I want an OPA policy not to allow an SG to be created or changed (CREATE or UPDATE) when it violates the Rego rule that doesn't enable ingress to 0.0.0.0./0.
Is it possible to create a project to control a cloud environment like this?
Beta Was this translation helpful? Give feedback.
All reactions