OSDU Community Implementation
Provision and operate the OSDU data platform on Azure with transparent automation and built-in platform safeguards.
One Command · One Platform · Production Ready
Simple -- Single command deploys the full stack. Isolated developer environments. No manual platform wiring.
Secure -- Hardened by default. Managed Istio, workload identity, policy enforcement with native monitoring.
Fast -- Full OSDU stack in minutes. Feature flags for every component. No fork required.
How does it work?
%%{init: {'theme': 'base', 'themeVariables': {'primaryColor': '#1a5276', 'primaryTextColor': '#fff', 'primaryBorderColor': '#154360', 'lineColor': '#1a5276', 'secondaryColor': '#1f6f8b', 'tertiaryColor': '#1f6f8b'}}}%%
graph LR
A[Run\nazd up] --> B[Provision\nAKS Automatic] --> C[Bootstrap\nFoundation] --> D[Deploy\nOSDU Stacks] -
Provision
Azure Developer CLI provisions the azure resources then bootstraps the necessary operators.
-
Deploy
Software stacks deploy middleware and all OSDU services with automatic compliance patching.
Why OSDU on Azure?
-
Transparent
Open-source Terraform with every design decision documented. No hidden scripts, no black-box modules.
-
Automated
One command deploys infrastructure, platform operators, and 20+ microservices with policy compliance at every layer.
-
Configurable
Feature flags control every component. Toggle any service with a single variable. No fork required.
-
Compliant
Built for AKS Automatic with deployment safeguards, managed Istio, pod security standards, and Azure RBAC.
Who is it for?
-
Platform Operators
Stand up a running OSDU instance on Azure. One command to deploy, one command to tear down.
-
Service Developers
Your own OSDU environment to code against, deploy to, and test with.
What can it do?
One-command deployment -- azd up orchestrates infrastructure, platform, and services through three independent Terraform layers with automatic credential and secret management.
Hardened by default -- AKS Automatic provides managed Istio, managed Prometheus/Grafana, deployment safeguards, and auto-upgrade with no additional configuration.
Safeguards compliance pipeline -- Helm postrender + Kustomize automatically patches any upstream chart to meet AKS admission policies without chart forking.
Zero-secret identity -- Workload Identity with federated credentials eliminates stored secrets for cross-subscription DNS, storage, and service authentication.
Zone-resilient scheduling -- Karpenter Node Auto Provisioning dynamically selects VM SKUs per availability zone, eliminating capacity allocation failures.
Config-driven multi-stack -- Deploy isolated OSDU instances on a shared cluster from a single Terraform root with one environment variable.
Inner-loop dev-test cycle -- Private container registry lets developers build, deploy, and validate service changes on a live cluster before opening a merge request.