openova/platform/coraza
e3mrah 1689ffcd1a
fix(bp-coraza,bp-syft-grype): add common library subchart to satisfy hollow-chart gate (#220)
Both charts are scratch (no upstream Helm chart published — Coraza
project + anchore/syft+grype CLIs ship containers only). The
blueprint-release.yaml hollow-chart gate (issue #181) rejects charts
with zero declared dependencies. Adding sigstore/common as a tiny
library subchart satisfies the gate; common is a library type so it
contributes zero runtime resources to either chart's rendered output.

The Catalyst-side templates (Deployment+Service for bp-coraza,
CronJob+PVC for bp-syft-grype) remain entirely in templates/ — the
library dep is purely a CI-gate mechanism, NOT a functional dependency.

Co-authored-by: hatiyildiz <hatice.yildiz@openova.io>
2026-04-30 06:15:28 +02:00
..
chart fix(bp-coraza,bp-syft-grype): add common library subchart to satisfy hollow-chart gate (#220) 2026-04-30 06:15:28 +02:00
blueprint.yaml feat(platform): security umbrellas (falco/kyverno/trivy/sigstore/syft-grype/reloader/coraza/litmus) (#216) 2026-04-30 06:07:38 +02:00
README.md docs(pass-10): banners on 7 more components + opentofu active-active drift fix 2026-04-27 21:43:45 +02:00

Coraza

Web Application Firewall with OWASP Core Rule Set. Per-host-cluster infrastructure (see docs/PLATFORM-TECH-STACK.md §3.1) — runs at the DMZ edge of every host cluster Catalyst manages.

Category: WAF | Type: Mandatory per host cluster (DMZ block)


Overview

Coraza is a high-performance WAF that integrates with Cilium/Envoy to provide application-layer protection using the OWASP Core Rule Set (CRS). Protects against SQL injection, XSS, and other OWASP Top 10 threats.

Key Features

  • OWASP Core Rule Set (CRS) compliance
  • Envoy external processing filter integration
  • Request/response inspection
  • Custom rule support
  • Low-latency inline processing

Integration

Component Integration
Cilium/Envoy Inline WAF via ext_proc filter
Grafana WAF metrics and blocked request dashboards
Falco Correlate WAF blocks with runtime events
OpenSearch WAF log analysis in SIEM

Deployment

apiVersion: kustomize.toolkit.fluxcd.io/v1
kind: Kustomization
metadata:
  name: coraza
  namespace: flux-system
spec:
  interval: 10m
  path: ./platform/coraza
  prune: true

Part of OpenOva