Skip to main content
South Korea
AIMenta
C

Conftest

by Open Policy Agent

Open-source CLI for testing Kubernetes manifests, Terraform plans, and configuration files against OPA Rego policies in CI/CD pipelines.

AIMenta verdict
Recommended
5/5

"Open-source policy testing for Kubernetes and IaC — APAC platform teams use Conftest to write OPA Rego policies that validate Kubernetes manifests, Terraform plans, and Dockerfiles in CI/CD, catching non-compliant APAC infrastructure configuration before cluster deployment."

Features
6
Use cases
1
Watch outs
3
What it does

Key features

  • Policy testing for Kubernetes, Terraform, Dockerfile, Helm, and JSON/YAML
  • OPA Rego policy language with full logic expression capability
  • CI/CD integration with non-zero exit on policy violation
  • Policy distribution via OCI registries for centralized APAC governance
  • Multiple output formats (table, JSON, TAP) for different CI/CD systems
  • Namespace support for organizing APAC policy libraries
When to reach for it

Best for

  • APAC platform engineering teams who want to enforce infrastructure compliance standards in CI/CD pipelines before Kubernetes or Terraform configurations reach production.
Don't get burned

Limitations to know

  • ! Rego policy language has a learning curve for APAC teams unfamiliar with OPA
  • ! Pre-deployment only — does not enforce at runtime (use Gatekeeper for that)
  • ! Policy management at scale requires OCI registry or dedicated policy repo strategy
Context

About Conftest

Conftest is an open-source command-line tool that enables APAC platform engineering teams to test configuration files — Kubernetes manifests, Terraform plans, Dockerfiles, Helm charts, and JSON/YAML configs — against policies written in Open Policy Agent (OPA) Rego. APAC teams integrate Conftest into CI/CD pipelines to enforce infrastructure compliance standards before any configuration reaches a cluster or production environment.

Conftest enables APAC platform teams to codify their organization's infrastructure standards as version-controlled Rego policies: Kubernetes resources must define CPU/memory limits, container images must come from approved APAC registries, Terraform resources must apply required tags, and Dockerfiles must not run as root. These policies run in CI/CD as part of pull request validation, providing immediate feedback to APAC developers before their infrastructure changes are merged.

The tool supports multiple configuration file formats (YAML, JSON, TOML, HCL, Dockerfile, CUE, Jsonnet) and can evaluate policies stored in OCI registries for centralized APAC policy distribution. Conftest pairs naturally with OPA/Gatekeeper for runtime enforcement — Conftest catches violations pre-deployment, Gatekeeper enforces the same policies at the Kubernetes API server in production.

Beyond this tool

Where this category meets practice depth.

A tool only matters in context. Browse the service pillars that operationalise it, the industries where it ships, and the Asian markets where AIMenta runs adoption programs.