Open Policy Agent (OPA) controls for OpenTofu and Terraform
-
Updated
Sep 9, 2025 - Open Policy Agent
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
Open Policy Agent (OPA) controls for OpenTofu and Terraform
GitHub Action workflow to validate Terraform plans against Open Policy Agent (OPA) policies
gator plugin for asdf version manager https://github.com/asdf-vm/asdf
Automated manifest file validation mechanism using Open Policy Agent and GitHub Actions
Real-time, AI-powered sustainability platform (FastAPI + Next.js) to measure, forecast, and reduce carbon footprint.
A hands-on, step-by-step lab to provision, secure, and govern Kubernetes clusters using Infrastructure as Code. Includes RBAC, NetworkPolicy, Admission Controllers, GitOps (ArgoCD) and Policy as Code (OPA Gatekeeper) with real-world scenarios and documentation.
A FastAPI-based backend server that integrates with Open Policy Agent (OPA) to provide dynamic, centralized permission management for multi applications/tenants
Go microservice using Kubernetes, Vault, OpenTelemetry, Elasticsearch(Geolocation), PostgreSQL, OPA.
Kubernetes security-aware scheduling of workloads
OPA (One Page Acceptance) is a testing framework provided by SAPUI5 for integration testing. OPA tests simulate user interactions with the application and check if the application behaves as expected.
Multi-cloud Policy-as-Code lab: Kubernetes OPA Gatekeeper, Azure Policy (Bicep), AWS SCPs, CI/CD with GitHub Actions, Security & Compliance Automation.