The talk on running #OPA via #Wasm for policy evaluation in hard to reach places, from the #CloudNative Wasm day preceding #KubeCon last week, by #Styra colleague @charlieegan3, has just been published online π
#opa #wasm #cloudnative #kubecon #styra
Lots of #OPA, #authorization and #PolicyAsCode this #KubeCon! Check out the new #Styra blog for a summary, but there's even more in the pipeline :)
https://www.styra.com/blog/join-us-at-kubecon-cloudnativecon-eu/
#opa #authorization #PolicyAsCode #kubecon #styra
The #KubeCon hype is ON! And Iβm delighted to see so much of it in my Mastodon feed. Looking forward to seeing many of you there!
Iβll be spending most of my time in the #Styra booth and the #OPA kiosk, but also doing a talk on Thursday, and a panel debate on Friday. Good times! π
#kubecon #styra #opa #kubeconeu #cloudnative
@katexochen Iβll be there! Most often in the #Styra booth and the #OpenPolicyAgent kiosk. Come by and say hi π
Released yesterday, and I'm proud to have contributed to Styra Load! An enterprise distribution of #OpenPolicyAgent
with some seriously impressive features, like a 10x reduction in memory usage, 40% increase in CPU throughput, and more. If you're running OPA for data-heavy workloads, try it out! π
#OpenPolicyAgent #styra #styraload
Looks like #KubeCon EU will be a real #OpenPolicyAgent event this year! π Maintainer track with @charlieegan3, Conftest talk by @NYTimes devs, #OPA for #EUCS compliance with me and Robert Ficcaglia, a contribfest session, *and* OPA and #Styra booths! Can't wait π
#kubecon #OpenPolicyAgent #opa #eucs #styra #kubeconeu #cncf #opensource
Summarizing yet another great year for #OpenPolicyAgent in this blog just published! Amazing how much this community accomplished in just a year. Looking forward to many more!
#OPA #Rego #PolicyAsCode #Styra
https://blog.openpolicyagent.org/open-policy-agent-2022-year-in-review-79324ad54535
#OpenPolicyAgent #opa #Rego #PolicyAsCode #styra
Best of times in California, meeting with colleagues and friends from #Styra. A great year ahead, for #OpenPolicyAgent and the company who made it happen π
Two founders, one fan boy.
New month, new year, new #OPA release! v0.48.0 brings improved error reporting to the βopa evalβ command, a new time.format built in function, AWS v4 signature verification for remote bundles, rule indexing optimizations, and MUCH more. Check it out!
https://github.com/open-policy-agent/opa/releases/tag/v0.48.0
Long day of travel ahead!
ARN πΈπͺ βοΈ -> CPH π©π° -> 5 hours of waiting β°π΄βοΈ -> SFO πΊπΈπ -> Los Gatos πΊπΈπ΄
But Iβm really excited to meet up with friends and colleagues from #Styra π
New rule added to the #Rego style guide, pertaining to the use of a redundant rule body for unconditional assignment. Prefer assignment in the rule head directly βοΈπ‘
#Rego #opa #OpenPolicyAgent #PolicyAsCode #styra
@lloydmeta Iβd be happy to answer any questions on using #OPA for that purpose. The #Rego Playground has a couple of example policies using RBAC / ABAC, and the #Styra academy is a great resource too π
Spending today in recovery mode after yesterdayβs Julbord with #Styra colleagues Gustaf and @johanfylling. It wasβ¦ a lot. https://www.swedishfood.com/julbord
Meeting with Bart Farrell for lunch in London, and he's just as nice in person as he is online. Also with Charlie Egan, at his very first day at #Styra, joining me in the devrel team. The future for #OpenPolicyAgent looks brighter than ever. Good times!
Contrary to admission control, externalizing Kubernetes authorization via webhooks isβ¦ complicated. If you can pull it off, the result β fine-grained, policy-driven access control β could however be rewarding. I did my best to describe all the gotchas in the #Styra blog, together with examples of how #OpenPolicyAgent may be deployed for that use case.
https://www.styra.com/blog/kubernetes-authorization-webhook/