Uploaded image for project: 'OpenShift Container Platform (OCP) Strategy'
  1. OpenShift Container Platform (OCP) Strategy
  2. OCPSTRAT-2894

Developer Preview: Coraza Kubernetes Operator (CKO) for an OpenShift WAF

XMLWordPrintable

    • Product / Portfolio Work
    • None
    • False
    • Hide

      None

      Show
      None
    • False
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Feature Overview (aka. Goal Summary)  

      This feature delivers a Developer Preview of a Coraza-based Kubernetes Operator that enables native Web Application Firewall (WAF) capabilities within OpenShift.

      The operator will deploy and manage Coraza WAF engines and ModSecurity-compatible rulesets integrated with OpenShift Gateway API through Istio/Envoy using a Wasm module. This provides signature-based web attack detection aligned with OWASP ruleset compatibility and embeds WAF protection directly into the OpenShift networking layer.

      The intent is not to deliver a production-ready WAF, but to ship a tightly-scoped MVP Developer Preview to customers in time for Red Hat Summit (May 11–14, 2026) in order to:

      • Validate real customer WAF use cases
      • Validate architectural direction (Gateway API, Wasm, Istio/Envoy)
      • Validate ruleset management and operator lifecycle model
      • Gather feedback to inform potential future GA investment

      OpenShift currently has no native WAF capability, forcing customers to rely on external appliances or public cloud implementations. This preview explores shifting WAF protection into the cluster, closer to applications, aligned with industry and upstream community direction.

      Goals (aka. expected user outcomes)

      1. Provide a functional Developer Preview WAF capability for OpenShift customers.
      2. Demonstrate Coraza WAF engine lifecycle management via an Operator.
      3. Demonstrate ModSecurity/OWASP ruleset lifecycle management via CRDs.
      4. Integrate WAF enforcement into Gateway API traffic paths using Istio/Envoy + Wasm.
      5. Enable customers to trial WAF in realistic environments and provide feedback.
      6. Deliver the preview via OperatorHub in time for Red Hat Summit 2026.
      7. Validate whether this problem space, architecture, and UX warrant future GA investment.

      Requirements (aka. Acceptance Criteria):

      Functional Requirements

      • Deploy and manage Coraza WAF engine instances via Operator
      • Deploy and manage ModSecurity-compatible rulesets via CRDs
      • Load rulesets dynamically into Coraza engines
      • Integrate with OpenShift Gateway API
      • Use Istio/Envoy with Wasm module for WAF execution
      • Provide basic examples and documentation for:
        • Enabling WAF on a Gateway
        • Loading OWASP CRS
        • Observing WAF detections

      Non-Functional Requirements (MVP scope)

      • Basic reliability within constrained environment
      • Basic test coverage (unit, integration, E2E on OCP)
      • QE validation sufficient for Developer Preview publishing
      • Operator packaging for OpenShift and OperatorHub publication

       
      Anyone reviewing this Feature needs to know which deployment configurations that the Feature will apply to (or not) once it's been completed.  Describe specific needs (or indicate N/A) for each of the following deployment scenarios. For specific configurations that are out-of-scope for a given release, ensure you provide the OCPSTRAT (for the future to be supported configuration) as well.

      Deployment considerations List applicable specific needs (N/A = not applicable)
      Self-managed, managed, or both  
      Classic (standalone cluster)  
      Hosted control planes  
      Multi node, Compact (three node), or Single node (SNO), or all  
      Connected / Restricted Network  
      Architectures, e.g. x86_x64, ARM (aarch64), IBM Power (ppc64le), and IBM Z (s390x)  
      Operator compatibility  
      Backport needed (list applicable versions)  
      UI need (e.g. OpenShift Console, dynamic plugin, OCM)  
      Other (please specify)  

      Milestones Timeline:

      Target availability: Before May 11, 2026 (Red Hat Summit)

       

      Milestone Release Duration Description Deliverables
      Gap Analysis, Expansion, Hardening & Testing v0.2.0 pre-release 6 weeks Identify MVP gaps, hardening, unit and integration tests, initial QE validation Hardened engine, SecRule validation, Initial QE report
      Operator, Packaging, E2E & Documentation v0.3.0 pre-release 4 weeks Extend controllers into full OpenShift operator, expand tests, create documentation OCP E2E test suite, Operator packaging, Documentation
      Packaging, Publishing & Ship-it v0.4.0 dev-preview 3 weeks Finalize metadata, QE validation, publish to OperatorHub OperatorHub listing, QE report, Documentation

      Use Cases:

      This preview targets validation of the following (non-exhaustive) customer scenarios:

      • Customer mandates decryption and inspection of all web traffic at the cluster edge
      • Customer wants a cluster-native alternative to external WAF appliances
      • Customer desires WAF capability for on-prem OpenShift where cloud WAFs are unavailable
      • Customer wants to apply OWASP CRS rules to Gateway traffic
      • Customer policy requires SSL termination at the load balancer, but still requires in-cluster inspection
      • Customer evaluating integration with commercial WAF tooling alongside open rulesets

      Questions to Answer:

      This Developer Preview is intended to answer:

      • Do customers want a native OpenShift WAF?
      • Is Gateway API integration the correct control point?
      • Is Wasm + Envoy a viable enforcement mechanism?
      • How do customers want to manage rulesets?
      • What performance and scale expectations exist?
      • Do customers require integrations beyond Istio/Envoy?
      • What operational UX do customers expect from a WAF Operator?
      • Is OWASP CRS sufficient, or are additional rule ecosystems required?

      Out of Scope

      To maintain velocity for Summit delivery, the following are explicitly out of scope:

      • Performance and large-scale validation
      • Production readiness
      • Support for non-Istio or non-Wasm integrations
      • Integration with IngressController, HAProxy, or other dataplanes
      • Deep upstream collaboration at this stage
      • GA migration path guarantees
      • Advanced observability, tuning, or UX polish
      • Commercial WAF integrations

      Background

      OpenShift today lacks any native WAF capability. Customers must rely on external WAFs, increasing:

      • Latency
      • Cost
      • Operational complexity
      • Architectural fragmentation

      There is growing upstream interest in embedding WAF capabilities directly into cloud-native networking layers (OWASP + Kubernetes ecosystems). This effort aligns with the broader industry trend of shifting security left and embedding protections closer to applications.

      The Coraza Kubernetes Operator project is near MVP status and provides a strong foundation to extend for OpenShift use.

      Customer Considerations

      Documentation Considerations

      Documentation must clearly include:

      • Developer Preview disclaimers
      • Installation via OperatorHub
      • Example Gateway + WAF configuration
      • Example OWASP CRS ruleset deployment
      • Known limitations
      • How to provide feedback
      • Architectural explanation (Gateway API → Envoy → Wasm → Coraza → Ruleset)

      Documentation is critical for Summit demos and customer enablement.

      Interoperability Considerations

      This preview intentionally limits interoperability to:

      • OpenShift Gateway API
      • Istio/Envoy dataplane
      • Wasm module deployment model
      • ModSecurity-compatible rulesets (OWASP CRS)

      Future iterations may evaluate:

      • Additional dataplanes
      • IngressController integrations
      • Broader rule ecosystems
      • Commercial WAF interoperability

      For this preview, interoperability breadth is traded for delivery speed and clarity of architecture.

              mcurry@redhat.com Marc Curry
              mcurry@redhat.com Marc Curry
              None
              Alex Snaps, Aslak Knutsen, Jonh Wendell, Ricardo Pchevuzinske Katz
              Shane Utt Shane Utt
              Cansin Tartici Cansin Tartici
              Ashley Hardin Ashley Hardin
              Chris Fields Chris Fields
              Votes:
              1 Vote for this issue
              Watchers:
              7 Start watching this issue

                Created:
                Updated: