Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
OpenShift Multi-Cluster Management Handbook

You're reading from   OpenShift Multi-Cluster Management Handbook Go from architecture to pipelines using GitOps

Arrow left icon
Product type Paperback
Published in Nov 2022
Publisher Packt
ISBN-13 9781803235288
Length 458 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (2):
Arrow left icon
Rafael Pecora Rafael Pecora
Author Profile Icon Rafael Pecora
Rafael Pecora
Giovanni Fontana Giovanni Fontana
Author Profile Icon Giovanni Fontana
Giovanni Fontana
Arrow right icon
View More author details
Toc

Table of Contents (23) Chapters Close

Preface 1. Part 1 – Design Architectures for Red Hat OpenShift
2. Chapter 1: Hybrid Cloud Journey and Strategies FREE CHAPTER 3. Chapter 2: Architecture Overview and Definitions 4. Chapter 3: Multi-Tenant Considerations 5. Chapter 4: OpenShift Personas and Skillsets 6. Part 2 – Leverage Enterprise Products with Red Hat OpenShift
7. Chapter 5: OpenShift Deployment 8. Chapter 6: OpenShift Troubleshooting, Performance, and Best Practices 9. Chapter 7: OpenShift Network 10. Chapter 8: OpenShift Security 11. Part 3 – Multi-Cluster CI/CD on OpenShift Using GitOps
12. Chapter 9: OpenShift Pipelines – Tekton 13. Chapter 10: OpenShift GitOps – Argo CD 14. Chapter 11: OpenShift Multi-Cluster GitOps and Management 15. Part 4 – A Taste of Multi-Cluster Implementation and Security Compliance
16. Chapter 12: OpenShift Multi-Cluster Security 17. Chapter 13: OpenShift Plus – a Multi-Cluster Enterprise Ready Solution 18. Chapter 14: Building a Cloud-Native Use Case on a Hybrid Cloud Environment 19. Part 5 – Continuous Learning
20. Chapter 15: What’s Next 21. Index 22. Other Books You May Enjoy

Configuration Management

The Configuration Management feature is a different way to look at policies that are violated, correlating with the various objects that make up the configuration and use of the clusters. Using this feature, you can list all failing policies for all clusters and drill down to inspect all namespaces, deployments, and so on. You may be thinking that the same information can also be found in Violations and Vulnerability Management, and that is true! The same information is also there; however, here, you will find it grouped by clusters’ entities and also displaying summary data of each entity, which will help you to correlate the different entities and learn about the connections among them.

To access this feature, navigate to the Configuration Management menu:

Figure 12.47 – Configuration Management feature

You will first see a dashboard that summarizes the following information:

  • POLICY VIOLATIONS BY SEVERITY...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime