Skip to content
This repository was archived by the owner on Jun 6, 2024. It is now read-only.
/ datree Public archive

Prevent Kubernetes misconfigurations from reaching production (again 😤 )! From code to cloud, Datree provides an E2E policy enforcement solution to run automatic checks for rule violations. See our docs: https://hub.datree.io

License

Notifications You must be signed in to change notification settings

datreeio/datree

Folders and files

NameName
Last commit message
Last commit date

Latest commit

author
Eyar Zilberman
Aug 1, 2023
0c3b63e · Aug 1, 2023
Oct 30, 2022
Dec 1, 2022
May 8, 2023
Dec 13, 2022
May 28, 2023
Dec 8, 2022
Jul 23, 2023
Jul 13, 2023
Sep 13, 2022
Jul 24, 2023
May 10, 2023
Oct 19, 2021
May 12, 2022
May 11, 2022
Sep 28, 2022
Nov 1, 2021
Apr 5, 2022
Mar 14, 2023
May 1, 2022
Apr 28, 2022
May 7, 2023
Apr 14, 2021
Jul 9, 2023
Aug 1, 2023
Jul 20, 2023
Jul 20, 2023
Sep 15, 2022
Jun 13, 2022
Dec 9, 2021

Repository files navigation

datree=github

Explore the docs »

Datree [DEPRECATED]

Datree (pronounced /da-tree/) was built to secure Kubernetes workloads by blocking the deployment of misconfigured resources. Since July 2023, the commercial company that supports and actively maintains this project has been closed.

Migrating to the (fully) open-source version of Datree

For existing users, it is still possible to run Datree as a standalone: https://hub.datree.io/cli/offline-mode

What will not be available anymore

All the archived open source repositories under datreeio org will no longer be maintained and accept any new code changes, including any security patches. In addition, the following key capabilities will not longer be available anymore:

  • Centralized policy registry
  • Automatic Kubernetes schema validation
  • Access to the dashboard and all of its components (e.g. activity-log page, token management, etc.)

⚙️ How it works

Datree scans Kubernetes resources against a centrally managed policy, and blocks those that violate your desired policies.

Datree comes with over 100 rules covering various use-cases, such as workload security, high availability, ArgoCD best practices, NSA hardening guide, and many more.

In addition to our built-in rules, you can write any custom rule you wish and then run it against your Kubernetes configurations to check for rule violations. Custom rules can be written in JSON schema or in Rego.

Contributing

We want to thank our contributors for helping us build Datree ❤️

Contributors