A set of curated exercises to help you prepare for the CKS exam
-
Updated
Aug 23, 2022 - Shell
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
A set of curated exercises to help you prepare for the CKS exam
koans for OPA
Kubernetes Fury Distribution OPA Core Module: Policy enforcement for your Kubernetes Cluster
Enterprise OPA is a distribution of Open Policy Agent with enterprise-grade features to get OPA into production quickly, easily, and inexpensively.
Demo scripts for 'Enforcing Automatic mTLS with Linkerd and OPA Gatekeeper'
Run opa test command with GitHub Actions
Annotated OPA sidecar configuration
Ultra fast and slim kubernetes playground.
A Buildkite plugin for executing Open Policy Agent against Terraform plans in a pipeline.
GitOps template with K3d, ArgoCD, ELK stack and Open Policy Agent
[Archived] Blog post about OPA, Conftest, Gatekeeper and Konstraint
Run conftest test command with GitHub Actions
OPA Test Runner: Apply policies to arbitrary json or yaml data using OPA and Rego.
Kubernetes security-aware scheduling of workloads
gator plugin for asdf version manager https://github.com/asdf-vm/asdf
OPA rules for the Please build system