Automate, monitor and enforce OPA policies with visibility across multiple clusters and multiple teams. It ensures the same policies are applied across all your clusters and gives some flexibility if you want certain policies to apply to only certain workloads. Run the same policies in CI/CD, Admission Control, and In-cluster scanning to apply policy consistently throughout the development and deployment process.
Tutorials
Videos
Blogs
- https://www.fairwinds.com/blog/managing-opa-policies-with-fairwinds-insights
- https://www.fairwinds.com/blog/manage-open-policy-agent-opa-consistently
- https://www.fairwinds.com/blog/kubernetes-multi-cluster-visibility-why-how-to-get-it
- https://www.fairwinds.com/blog/what-is-kubernetes-policy-as-code
- https://www.fairwinds.com/blog/why-kubernetes-policy-enforcement
- https://www.fairwinds.com/blog/an-interview-with-flatfile-on-why-fairwinds-insights-kubernetes-configuration-validation
Related Software
- Kubernetes in the OPA Ecosystem
- Docker in the OPA Ecosystem
- Helm in the OPA Ecosystem
Inventors
- Fairwinds in the OPA Ecosystem
Labels
Category | kubernetes |
---|---|
Layer | cicd |
Do you have an OPA-based project or integration to share? Follow
these instructions
to get it listed or go to the #ecosystem
channel in the
OPA Slack
if you have any questions.