The environment-variable-policy can be used to inspect environment variables defined in the resources deployed in the cluster. It's able to validate both variables names and values. The policy allows the users define multiple validation rules. And the resource must pass all the rules to be allowed in the cluster.
The policy can either target Pods, or workload resources (Deployments, ReplicaSets, DaemonSets, ReplicationControllers, Jobs, CronJobs). Both have trade-offs:
-
Policy targets Pods: Different kind of resources (be them native or CRDs) can create Pods. By having the policy target Pods, we guarantee that all the Pods are going to be compliant, even those created from CRDs. However, this could lead to confusion among users, as high level Kubernetes resources would be successfully created, but they would stay in a non reconciled state. Example: a Deployment creating a non-compliant Pod would be created, but it would never have all its replicas running.
-
Policy targets workload resources (e.g: Deployment): the policy inspect higher order resource (e.g. Deployment): users will get immediate feedback about rejections. However, non compliant pods created by another high level resource (be it native to Kubernetes, or a CRD), may not get rejected.
Each rule defined in the policy settings is composed by a reject
operator and a set
of the environment variable used with the operator against the environment variables
from the resources. The rules are evaluated in the order that they are defined.
The resource is denied in the first failed evaluated rule. The following yaml is a settings example:
settings:
rules:
- reject: anyIn
environmentVariables:
- name: "envvar1"
value: "envvar1_value"
- name: "envvar2"
value: "envvar2_value"
The supported reject
operator are:
anyIn
(default): checks if any of theenvironmentVariables
are in the Pod/Workload resourceanyNotIn
: checks if any of theenvironmentVariables
are not in the Pod/Workload resourceallAreUsed
: checks if all of theenvironmentVariables
are in the Pod/Workload resourcenotAllAreUsed
: checks if all of theenvironmentVariables
are not in the Pod/Workload resource
The environment variables are defined as objects:
- name: "variable name"
value: "variable value"
The name should follow the C_IDENTIFIER
standard and the value
field is optional. When it is not define the ""
value is used by default.
It is not allowed define a rule with an empty environmentVariables
list.
In the following example, the resources that have least one of the variables will be denied:
settings:
rules:
- reject: anyIn
environmentVariables:
- name: "envvar1"
- name: "envvar2"
In the following example, the resources cannot use both environment variables at once, only one or the other
settings:
rules:
- reject: allAreUsed
environmentVariables:
- name: "envvar2"
value: ""
In the following example, only resources that have the envvar3
or envvar2
defined will be allowed:
settings:
rules:
- reject: anyNotIn
environmentVariables:
- name: "envvar2"
value: "envvar2_value"
- name: "envvar3"
In the following example, the resources can use both variables at once, but not only one of them
settings:
rules:
- reject: notAllAreUsed
environmentVariables:
- name: "envvar3"
value: "envvar3_value"
- name: "envvar4"
value: "envvar4_value"