Skip to content

Overview

UDS Core is a curated collection of platform capabilities packaged as a single deployable Zarf package. It establishes a secure, compliant baseline for cloud-native systems, particularly those operating in highly regulated or air-gapped environments.

At its heart, UDS Core answers a fundamental question for teams building on Kubernetes: what secure platform layer do I need before I deploy my application? UDS Core is that layer.

UDS Core is organized into functional layers — discrete Zarf packages grouped by capability.

LayerWhat it provides
core-baseRequired. Istio, UDS Operator, Pepr Policy Engine
core-identity-authorizationKeycloak + Authservice (SSO)
core-metrics-serverKubernetes Metrics Server
core-runtime-securityFalco
core-loggingVector + Loki
core-monitoringPrometheus + Grafana + Alertmanager + Blackbox Exporter
core-backup-restoreVelero

The UDS Operator is the control plane for UDS Core. The key integration point is the UDS Package custom resource (CR) — teams create a Package CR declaring networking intent, SSO requirements, and monitoring needs. The operator reconciles the CR and creates all necessary platform resources automatically.

It watches for Package, Exemption, and ClusterConfig custom resources. When a Package CR is created or updated, the operator:

  • Generates Istio VirtualService and AuthorizationPolicy resources to control traffic
  • Creates Kubernetes NetworkPolicy resources to enforce network boundaries
  • Configures Keycloak clients for SSO-protected services
  • Sets up an Authservice SSO flow to protect mission applications that don’t natively implement OIDC
  • Creates ServiceMonitor, PodMonitor, and blackbox probe resources for Prometheus to scrape application metrics

This automation means platform teams don’t need to write low-level Istio or Kubernetes networking configuration for each application, nor manually configure SSO for each app — the Package CR drives all of it from a single declaration.

The UDS Policy Engine (built on Pepr) runs as admission webhooks alongside the operator. It enforces a security baseline across all workloads — preventing privileged containers, enforcing non-root execution, restricting volume types, and more. Policies run as both mutations (automatically correcting safe defaults) and validations (blocking unsafe configurations). For the full list of enforced policies, see the Policy Engine reference.

When a workload legitimately needs an exemption, teams create an Exemption CR to declare the exemption explicitly, keeping the audit trail clear.


Core Features

Networking, identity, logging, monitoring, runtime security, backup, and policy — what each layer does and why.

Platform

Environments, cluster flavors, and how UDS Core adapts to different deployment targets.

Configuration & Packaging

Bundles, CRDs, and the packaging model that makes UDS Core composable.

How-to Guides

Step-by-step instructions for configuring and operating UDS Core in your environment.