How to use Gatekeeper
Gatekeeper uses the OPA Constraint Framework to describe and enforce policy. Look there for more detailed information on their semantics and advanced usage.
Constraint Templates
Before you can define a constraint, you must first define a ConstraintTemplate
, which describes both the Rego that enforces the constraint and the schema of the constraint. The schema of the constraint allows an admin to fine-tune the behavior of a constraint, much like arguments to a function.
Here is an example constraint template that requires all labels described by the constraint to be present:
apiVersion: templates.gatekeeper.sh/v1
kind: ConstraintTemplate
metadata:
name: k8srequiredlabels
spec:
crd:
spec:
names:
kind: K8sRequiredLabels
validation:
# Schema for the `parameters` field
openAPIV3Schema:
type: object
properties:
labels:
type: array
items:
type: string
targets:
- target: admission.k8s.gatekeeper.sh
rego: |
package k8srequiredlabels
violation[{"msg": msg, "details": {"missing_labels": missing}}] {
provided := {label | input.review.object.metadata.labels[label]}
required := {label | label := input.parameters.labels[_]}
missing := required - provided
count(missing) > 0
msg := sprintf("you must provide labels: %v", [missing])
}
You can install this ConstraintTemplate with the following command:
kubectl apply -f https://raw.githubusercontent.com/open-policy-agent/gatekeeper/master/demo/basic/templates/k8srequiredlabels_template.yaml
Constraints
Constraints are then used to inform Gatekeeper that the admin wants a ConstraintTemplate to be enforced, and how. This constraint uses the K8sRequiredLabels
constraint template above to make sure the gatekeeper
label is defined on all namespaces:
apiVersion: constraints.gatekeeper.sh/v1beta1
kind: K8sRequiredLabels
metadata:
name: ns-must-have-gk
spec:
match:
kinds:
- apiGroups: [""]
kinds: ["Namespace"]
parameters:
labels: ["gatekeeper"]
You can install this Constraint with the following command:
kubectl apply -f https://raw.githubusercontent.com/open-policy-agent/gatekeeper/master/demo/basic/constraints/all_ns_must_have_gatekeeper.yaml
The match field
The match
field defines the scope of objects to which a given constraint will be applied. It supports the following matchers:
kinds
accepts a list of objects withapiGroups
andkinds
fields that list the groups/kinds of objects to which the constraint will apply. If multiple groups/kinds objects are specified, only one match is needed for the resource to be in scope.scope
determines if cluster-scoped and/or namespaced-scoped resources are matched. Accepts*
,Cluster
, orNamespaced
. (defaults to*
)namespaces
is a list of namespace names. If defined, a constraint only applies to resources in a listed namespace. Namespaces also supports a prefix-based glob. For example,namespaces: [kube-*]
matches bothkube-system
andkube-public
.excludedNamespaces
is a list of namespace names. If defined, a constraint only applies to resources not in a listed namespace. ExcludedNamespaces also supports a prefix-based glob. For example,excludedNamespaces: [kube-*]
matches bothkube-system
andkube-public
.labelSelector
is the combination of two optional fields:matchLabels
andmatchExpressions
. These two fields provide different methods of selecting or excluding k8s objects based on the label keys and values included in object metadata. All selection expressions are ANDed to determine if an object meets the cumulative requirements of the selector.namespaceSelector
is a label selector against an object's containing namespace or the object itself, if the object is a namespace.name
is the name of an object. If defined, it matches against objects with the specified name. Name also supports a prefix-based glob. For example,name: pod-*
matches bothpod-a
andpod-b
.
Note that if multiple matchers are specified, a resource must satisfy each top-level matcher (kinds
, namespaces
, etc.) to be in scope. Each top-level matcher has its own semantics for what qualifies as a match. An empty matcher is deemed to be inclusive (matches everything). Also understand namespaces
, excludedNamespaces
, and namespaceSelector
will match on cluster scoped resources which are not namespaced. To avoid this adjust the scope
to Namespaced
.
The parameters field
The parameters
field describes the intent of a constraint. It can be referenced as input.parameters
by the ConstraintTemplate's Rego source code. Gatekeeper populates input.parameters
with values passed into the parameters
field in the Constraint.
Example:
rego: |
package k8srequiredlabels
violation[{"msg": msg, "details": {"missing_labels": missing}}] {
provided := {label | input.review.object.metadata.labels[label]}
required := {label | label := input.parameters.labels[_]}
missing := required - provided
count(missing) > 0
msg := sprintf("you must provide labels: %v", [missing])
}
The schema for the input Constraint parameters
is defined in the ConstraintTemplate. The API server will reject a Constraint with an incorrect parameters field if the data types do not match.
Example:
# Apply the Constraint with incorrect parameters schema
$ cat << EOF | kubectl apply -f -
apiVersion: constraints.gatekeeper.sh/v1beta1
kind: K8sRequiredLabels
metadata:
name: ns-must-have-gk
spec:
match:
kinds:
- apiGroups: [""]
kinds: ["Namespace"]
parameters:
# Note that "labels" is now an array item, rather than an object
- labels: ["gatekeeper"]
EOF
The K8sRequiredLabels "ns-must-have-gk" is invalid: spec.parameters: Invalid value: "array": spec.parameters in body must be of type object: "array"
The enforcementAction field
The enforcementAction
field defines the action for handling Constraint violations. By default, enforcementAction
is set to deny
as the default behavior is to deny admission requests with any violation. Other supported enforcementActions include dryrun
and warn
. Refer to Handling Constraint Violations for more details.
Listing constraints
You can list all constraints in a cluster with the following command:
kubectl get constraints
Input Review
The input.review
object stores the admission request under evaluation. It has the following fields:
dryRun
: Describes if the request was invoked bykubectl --dry-run
. This cannot be populated by Kubernetes for audit.kind
: The resourcekind
,group
,version
of the request object under evaluation.name
: The name of the request object under evaluation. It may be empty if the deployment expects the API server to generate a name for the requested resource.namespace
: The namespace of the request object under evaluation. Empty for cluster scoped objects.object
: The request object under evaluation to be created or modified.oldObject
: The original state of the request object under evaluation. This is only available for UPDATE operations.operation
: The operation for the request (e.g. CREATE, UPDATE). This cannot be populated by Kubernetes for audit.uid
: The request's unique identifier. This cannot be populated by Kubernetes for audit.userInfo
: The request's user's information such asusername
,uid
,groups
,extra
. This cannot be populated by Kubernetes for audit.
NOTE For
input.review
fields above that cannot be populated by Kubernetes for audit reviews, the constraint templates that rely on them are not auditable. It is up to the rego author to handle the case where these fields are unset and empty in order to avoid every matching resource being reported as violating resources.