Webinar: K8s with OPA Gatekeeper

preview_player
Показать описание
If your organization has been operating Kubernetes, you probably have been looking for ways to control what end-users can do on the cluster and ways to ensure that clusters are in compliance with company policies. With Kubernetes, how do you ensure compliance without sacrificing development agility and operational independence? Gatekeeper is a customizable admission webhook for Kubernetes that enforces policies executed by the Open Policy Agent (OPA), a policy engine for Cloud Native environments hosted by CNCF.

Presenters:

Sertaç Özercan, Software Engineer @Microsoft
Lachie Evenson, Principal Program Manager @Microsoft
Рекомендации по теме
Комментарии
Автор

Thank you Sertaç for this demonstration. The examples you gave nearly cover all we can face during a cluster administration process. Really helped me a lot

manaspecenek
Автор

@sozercan - Great presentation; really clear explanation of a complex system.

I really liked the idea that one of the viewers posted -- putting events on to the resource that was not admitted. I understand the viewpoint of having all of the violations in one place (in the constraint CRs). But as an admin, if I stumble across a deployment that isn't able to start up its pods, it is much easier to describe the deployment and see the violations as events in the deployment, than it is to sift through the violations on N different constraint resources. Maybe put the violations in both places.

JasonPriebe
Автор

@sozercan - Hi Sertac and Lachie - thank you for the webinar. I am interested in any load testing information. Do you have any results that are published? Thanks!

kellydasilva
Автор

15:00 sounds like OR-Ed together, not AND-ed together. 1 or 0 = 1, 1and 0 = 0

mancewicz