Configuration Management
The Configuration Management feature is a different way to look at policies that are violated, correlating with the various objects that make up the configuration and use of the clusters. Using this feature, you can list all failing policies for all clusters and drill down to inspect all namespaces, deployments, and so on. You may be thinking that the same information can also be found in Violations and Vulnerability Management, and that is true! The same information is also there; however, here, you will find it grouped by clusters’ entities and also displaying summary data of each entity, which will help you to correlate the different entities and learn about the connections among them.
To access this feature, navigate to the Configuration Management menu:
Figure 12.47 – Configuration Management feature
You will first see a dashboard that summarizes the following information:
- POLICY VIOLATIONS BY SEVERITY...