1
0
Fork 0
mirror of https://github.com/kyverno/policy-reporter.git synced 2024-12-14 11:57:32 +00:00
Monitoring and Observability Tool for the PolicyReport CRD with an optional UI.
Find a file
Frank Jogeleit 9cac2de3fb
Merge pull request #32 from fjogeleit/ui-update
Update Policy Reporter UI
2021-04-29 11:58:18 +02:00
.github Manage PolicyPriorities with Helm (#17) 2021-03-17 11:51:44 +01:00
charts/policy-reporter Update Policy Reporter UI 2021-04-29 11:46:14 +02:00
cmd Development (#29) 2021-04-24 12:32:15 +02:00
docs/images Monitoring improvements (#23) 2021-04-10 11:16:46 +02:00
pkg Update Policy Reporter UI 2021-04-29 11:46:14 +02:00
.dockerignore Add concurrency to metrics and loki client 2021-02-20 11:00:10 +01:00
.gitignore Rename PolicyReport UI Subchart (#18) 2021-03-18 14:57:16 +01:00
CHANGELOG.md Update Policy Reporter UI 2021-04-29 11:46:14 +02:00
Dockerfile remove labels from deleted reports and rules 2021-02-23 10:26:00 +01:00
go.mod Development (#29) 2021-04-24 12:32:15 +02:00
go.sum Development (#29) 2021-04-24 12:32:15 +02:00
LICENSE.md init 2021-02-20 00:58:01 +01:00
main.go init 2021-02-20 00:58:01 +01:00
Makefile Development (#11) 2021-03-05 14:26:47 +01:00
README.md Update README 2021-04-17 13:42:04 +02:00

Policy Reporter

CI Go Report Card Coverage Status

Motivation

Kyverno ships with two types of validation. You can either enforce a rule or audit it. If you don't want to block developers or if you want to try out a new rule, you can use the audit functionality. The audit configuration creates PolicyReports which you can access with kubectl. Because I can't find a simple solution to get a general overview of this PolicyReports and PolicyReportResults, I created this tool to send information about PolicyReports to different targets like Grafana Loki, Elasticsearch or Slack.

Policy Reporter provides also a Prometheus Metrics API as well as an standalone mode along with the Policy Reporter UI.

This project is in an early stage. Please let me know if anything did not work as expected or if you want to send your audits to unsupported targets.

Documentation

You can find detailed Information and Screens about Features and Configurations in the Documentation.

Getting Started

Installation with Helm v3

Installation via Helm Repository

Add the Helm repository

helm repo add policy-reporter https://fjogeleit.github.io/policy-reporter
helm repo update

Basic Installation - Provides Prometheus Metrics

helm install policy-reporter policy-reporter/policy-reporter -n policy-reporter --create-namespace

Policy Reporter UI

You can use the Policy Reporter as standalone Application along with the optional UI SubChart.

Installation with Policy Reporter UI enabled

helm install policy-reporter policy-reporter/policy-reporter --set ui.enabled=true -n policy-reporter --create-namespace
kubectl port-forward service/policy-reporter-ui 8082:8080 -n policy-reporter

Open http://localhost:8082/ in your browser.

Check the Documentation for Screens and additional Information

Targets

Policy Reporter supports the following Targets to send new (Cluster)PolicyReport Results too:

Monitoring

The Helm Chart includes optional SubChart for Prometheus Operator Integration. The provided Dashboards working without Loki and are only based on the Prometheus Metrics.

Have a look into the Documentation for details.

Grafana Dashboard Import

If you are not using the MonitoringStack you can import the dashboards from Grafana

Resources