Quick Start
Run Cerbos with the default configuration:- HTTP API on port 3592
- gRPC API on port 3593 (not exposed in this example)
- Default policy directory at
/policies
Container Images
Cerbos images are published to two registries:- GitHub Container Registry:
ghcr.io/cerbos/cerbos:latest - Docker Hub:
docker.io/cerbos/cerbos:latest
Image Verification
Cerbos images are signed using Sigstore and can be verified with Cosign:Custom Configuration
Container Details
The Cerbos container image is built on Alpine Linux and includes:- Base Image:
alpine:3.16with CA certificates - Exposed Ports:
3592- HTTP API3593- gRPC API
- Volumes:
/policies- Default policy directory/tmp- Temporary files/.cache- Cache directory
- Entrypoint:
/cerbos - Default Command:
server - Health Check: Built-in healthcheck on
/cerbos healthcheckendpoint
Environment Variables
The container supports configuration via environment variables:CERBOS_NO_TELEMETRY=1 to disable telemetry collection.
Running with Docker Compose
Create adocker-compose.yml file:
Verifying the Installation
Check that Cerbos is running:Production Considerations
- Use specific version tags instead of
latest - Mount policy directories as read-only volumes
- Configure appropriate resource limits
- Enable TLS for production deployments
- Use persistent volumes for policy storage
- Set up proper logging and monitoring
Next Steps
- Configure storage backends for policies
- Set up TLS encryption for secure communication
- Explore deployment patterns for different environments
- Review configuration options for production use