Skip to content

Implement admission controllers in Kubernetes clusters

Notifications You must be signed in to change notification settings

sajints/admissioncontrollers

Repository files navigation

Deploy OPA Gatekeeper

kubectl apply -f https://raw.githubusercontent.com/open-policy-agent/gatekeeper/master/deploy/gatekeeper.yaml

REGO Policy OPA is purpose built for reasoning about information represented in structured documents. The data that your service and its users publish can be inspected and transformed using OPA’s native query language Rego.

What is Rego? Rego was inspired by Datalog, which is a well understood, decades old query language. Rego extends Datalog to support structured document models such as JSON.

Rego queries are assertions on data stored in OPA. These queries can be used to define policies that enumerate instances of data that violate the expected state of the system.

Why use Rego? Use Rego for defining policy that is easy to read and write.

Rego focuses on providing powerful support for referencing nested documents and ensuring that queries are correct and unambiguous.

Rego is declarative so policy authors can focus on what queries should return rather than how queries should be executed. These queries are simpler and more concise than the equivalent in an imperative language.

Like other applications which support declarative query languages, OPA is able to optimize queries to improve performance. For more info, refer the link - https://www.openpolicyagent.org/docs/latest/policy-language/

About

Implement admission controllers in Kubernetes clusters

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published