In this section, we will setup OPA Gatekeeper
within the cluster.
kubectl apply -f https://raw.githubusercontent.com/open-policy-agent/gatekeeper/release-3.1/deploy/gatekeeper.yaml
kubectl get pods -n gatekeeper-system
The output will be similar to:
NAME READY STATUS RESTARTS AGE
gatekeeper-audit-5bc9b59c57-9d9hc 1/1 Running 0 25s
gatekeeper-controller-manager-744cdc8556-hxf2n 1/1 Running 0 25s
gatekeeper-controller-manager-744cdc8556-jn42m 1/1 Running 0 25s
gatekeeper-controller-manager-744cdc8556-wwrb6 1/1 Running 0 25s
You can follow the OPA logs to see the webhook requests being issued by the Kubernetes API server:
kubectl logs -l control-plane=audit-controller -n gatekeeper-system
kubectl logs -l control-plane=controller-manager -n gatekeeper-system
This completes the OPA Gatekeeper setup on Amazon EKS cluster. To order to define and enforce the policy, OPA Gatekeeper uses a framework OPA Constraint Framework