KubeCon week is here, and so are we! Come meet Anders, Charlie and Johan at the OPA kiosk in the project pavilion to ask anything you ever wanted to know about OPA.
And check out our OPA event schedule for all things OPA happening at the conference!
| Website | https://www.openpolicyagent.org/ |
| Slack | https://inviter.co/opa |
| https://www.linkedin.com/company/open-policy-agent |
KubeCon week is here, and so are we! Come meet Anders, Charlie and Johan at the OPA kiosk in the project pavilion to ask anything you ever wanted to know about OPA.
And check out our OPA event schedule for all things OPA happening at the conference!
Resurrecting my blog after 9 years of inactivity.
https://danielfm.me/posts/opa-policies-without-breaking-the-bank/
2026 Update on the #opa plugins for #backstage !
Despite being insanely busy with work things, have been able to push some cool features and updates!
- Some slight UX/UI adjustments to the docs site
- Updated a lot of the docs for more clarity
- Added an `opa-node` package for plugin authors to use in their backend plugins and modules to protect their API routes (just provide an input and an entrypoint and you're good to go!)
- Some framework updates (from backstage)
I am very happy with where these plugins are right now! Let's see if I get any other bright ideas 💡 to add some other features this year 👍
@ellie sorry it took us so long to see this! Tag us next time and we’ll be happy to help :) To your question — there’s no real max limit in terms of bundle data size, although Go structs tend to be ~10x the size of the raw JSON bytes or more, so it depends on resources available. Otherwise you may want to load some data on demand, as you allude to.
Would love to hear more about your project!
I love spacelift.io for a number of reasons, namely it saves you from running #Terraform or #OpenTofu in whatever "CI" tool your company uses this week (been there, hated it) and doesn't cost an arm, leg and kidney that Terraform Cloud charge you (loved TFC until that switcharoo).
Anyway, I've been wrapping up a thing I've been working on. Many SaaS tools allow you to send #webhooks, but rarely give you control over if, where and what is sent. Now #Spacelift let you control all of this using a Policy based on #OpenPolicyAgent.
SL provide an event, you develop your policy in the #Rego language, not only can you use that policy to decide: Is this an event I want to send a webhook for? But more than that, you can use the policy language to craft the exact payload. Since you may not get a choice of what that looks like on the other end.
Docs: https://docs.spacelift.io/concepts/policy/notification-policy
Now that's just for notifications etc. You can control almost anything within the tool: Logins, Plans, Triggers, Pushes and more.
My discoveries in 2025: https://skybert.net/various/my-discoveries-in-2025/
Happy New Year from the Regal maintainers! Regal v0.38.0 is out with full support for OPA v1.12.2's template string interpolation, one new linter rule, three new auto-fixers, and performance improvements. Happy linting!
https://github.com/open-policy-agent/regal/releases/tag/v0.38.0
Did you miss OPA's talk at #KubeCon? It's not too late, the video for you all to get up to speed on the latest and greatest:
https://www.youtube.com/watch?v=tDBYMF2XXLA
While we have you here... we're closing the OPA survey real soon. If you still need to fill it out, please do so here: https://www.surveymonkey.com/r/SCBSDZN