TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: Datree (YC W20): Prevent K8s misconfigurations from reaching production

144 点作者 shimont超过 3 年前
Hi HN, this is Shimon and Eyar of Datree (<a href="https:&#x2F;&#x2F;www.datree.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.datree.io&#x2F;</a>).<p>When I was an Engineering Manager of Infrastructure at ironSource (NASDAQ:IS) for 400 developers, a developer made a mistake, causing a misconfiguration to reach production, which caused major problems for the company&#x27;s infrastructure.<p>Mistakes happen all the time - you learn from them and hope to never make them again. But how can we prevent a production issue from recurring, or, how about a bigger challenge — how can you prevent the next one from the get-go?<p>In our case, we tried sending emails to our devs, writing Wikis, and hosting meetups and live sessions to educate our developers, but I felt that it just wasn’t driving the message home. How can developers be expected to remember to configure a liveness probe or to put a memory limit in place for their Kubernetes workload when there are so many things that a dev must remember? Infra just isn’t their primary focus.<p>Today, organizations want to delegate infra-as-code responsibilities to developers, but face a dilemma — even a small misconfiguration can cause major production issues. Some companies lock up infra changes and require ops teams to review all changes, which frustrates both sides. Developers want to ship features without waiting for infra. And infra teams don&#x27;t want to “babysit” developers by reviewing config files all day long, essentially acting as human debuggers for misconfigurations.<p>That’s why I teamed up with Eyar to found Datree. Our mission is to help engineering teams prevent Kubernetes misconfigurations from reaching production. We believe that providing guardrails to developers protects their infra changes and frees up DevOps teams to focus on what matters most.<p>Datree provides a CLI tool (<a href="https:&#x2F;&#x2F;github.com&#x2F;datreeio&#x2F;datree" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;datreeio&#x2F;datree</a>) that runs automated policy checks against your Kubernetes manifests and Helm charts, identifies any misconfigurations within, and suggests how to fix them. The tool comes with dozens of preset, best-practice rules covering the most common mistakes that could affect your production. In addition, you can write custom rules for your policy.<p>Our built-in rules are based on hundreds of Kubernetes post-mortems to ensure the prevention of issues such as resource limits&#x2F;requests (MEM&#x2F;CPU), liveness and readiness probes, labels on resources, Kubernetes schema validation, API version deprecation, and more.<p>Datree comes with a centralized policy dashboard enabling the infra team to dynamically configure rules that run on dev computers during the development phase, as well as within the CI&#x2F;CD process. This central control point propagates policy checks automatically to all developers&#x2F;machines in your company.<p>We initially launched Datree as a general purpose policy engine (see our YC Launch <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22536228" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22536228</a>) in which you could configure all sorts of rules, but the market drove our focus toward infrastructure-as-code and, more specifically, Kubernetes, one of the most painful points of friction between developers and infrastructure teams.<p>When we adjusted to a Kubernetes-focused product, we pivoted our top-down sales-driven model to a bottom-up adoption-driven model focused on the user.<p>Our new dev tool is self-served and open-source. Hundreds of companies are using it to prevent Kubernetes misconfigurations and, in turn, are helping the tool improve by opening issues and submitting pull requests on GitHub. Our product is well suited for self-evaluation and immediate value delivery. No demo calls — just 2 quick steps to try the product yourself!<p>TechWorld with Nana did a deep technical review of our product, which can be viewed at <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=hgUfH9Ab258" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=hgUfH9Ab258</a>.<p>We look forward to hearing your feedback and answering any questions you may have. Thank you :)

6 条评论

exdsq超过 3 年前
I can&#x27;t believe how complex a tool has to be for several startups to get funding purely to try stop it doing bad things. Kudos to Datree for making the most of this, but feels like something&#x27;s wrong with k8s for this to be such a thing.
评论 #28924388 未加载
评论 #28920900 未加载
评论 #28920725 未加载
评论 #28920943 未加载
评论 #28924112 未加载
mr_moose超过 3 年前
As someone who works in a similar space (K8s configuration management and IaC), I&#x27;m curious what drove you to develop a CLI tool for enforcing policies as opposed to something that is able to integrate with K8s more closely such as OPA Gatekeeper or Kyverno?<p>As I understand, the primary users of policy tools are platform teams, infrastructure teams, or some other entity who needs to able to create, manage, and enforce policies over domains that they&#x27;re responsible for.<p>When I look at Datree from the POV of a platform team, I see a tool that I must trust dev teams to use to enforce policies.<p>Yes, I can hide my K8s cluster behind a CI&#x2F;CD pipeline that runs Datree, but this is limiting for organizations that actually want to let its dev teams access its K8s clusters directly or run workloads that themselves can create K8s resources (e.g. operators).<p>By contrast, OPA Gatekeeper or Kyverno do not have such limitations because they allow policies to be enforced at the cluster itself.<p>Both also allow platform teams to create new policies and detect if there are any K8s resources _already_ in the cluster that are in violation of the new policies (i.e. Day 2 operations).<p>Lastly, both even offer CLI tools for dev teams to use to detect issues earlier during development.<p>I would argue though that dev teams are actually secondary to platform teams in terms of who to focus on when building policy tools since platform teams usually have more of an interest&#x2F;responsibility in enforcing policies and therefore more of a say in what policy tools to adopt for an organization.<p>Hence, I was curious why you started with a CLI tool which seems to be more of a dev-centric approach rather than platform-centric.<p>Also, more specifically, what makes Datree a better option over OPA Gatekeeper or Kyverno?
评论 #28928713 未加载
bobbiechen超过 3 年前
Looks like this is a policy-as-code tool in the vein of Terraform Cloud&#x27;s Sentinel Policies, or more generally Open Policy Agent, but specifically targeted at k8s use cases.<p>From the custom rules overview <a href="https:&#x2F;&#x2F;hub.datree.io&#x2F;custom-rules-overview" rel="nofollow">https:&#x2F;&#x2F;hub.datree.io&#x2F;custom-rules-overview</a> , though it is docs WIP, I noticed these are defined as YAML&#x2F;JSON somehow. That&#x27;s a contrast to HashiCorp&#x27;s Sentinel <a href="https:&#x2F;&#x2F;docs.hashicorp.com&#x2F;sentinel&#x2F;concepts&#x2F;language" rel="nofollow">https:&#x2F;&#x2F;docs.hashicorp.com&#x2F;sentinel&#x2F;concepts&#x2F;language</a> and OPA&#x27;s Rego <a href="https:&#x2F;&#x2F;www.openpolicyagent.org&#x2F;docs&#x2F;latest&#x2F;policy-language&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.openpolicyagent.org&#x2F;docs&#x2F;latest&#x2F;policy-language&#x2F;</a> . Is this an intentional design decision?
评论 #28928736 未加载
sbkg0002超过 3 年前
Is it me, or is the dashboard only for paying customers?<p>What does this add compared to Polaris by fairwinds ?
评论 #28920838 未加载
verchol超过 3 年前
K8s manifest are yamls that translated to tens of K8s actions that change production environment .Misconfigurtions that can be prevented by integrating datree cli into CI&#x2F;CD cycle can save hours of production unreliability. For me it&#x27;s must have phase in K8s release flow.
评论 #28928750 未加载
nawgz超过 3 年前
Why is this whole thread dead? Just because of the blatant appearance of astroturf or what?
评论 #28920543 未加载