Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
OpenShift Multi-Cluster Management Handbook

You're reading from   OpenShift Multi-Cluster Management Handbook Go from architecture to pipelines using GitOps

Arrow left icon
Product type Paperback
Published in Nov 2022
Publisher Packt
ISBN-13 9781803235288
Length 458 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (2):
Arrow left icon
Rafael Pecora Rafael Pecora
Author Profile Icon Rafael Pecora
Rafael Pecora
Giovanni Fontana Giovanni Fontana
Author Profile Icon Giovanni Fontana
Giovanni Fontana
Arrow right icon
View More author details
Toc

Table of Contents (23) Chapters Close

Preface 1. Part 1 – Design Architectures for Red Hat OpenShift
2. Chapter 1: Hybrid Cloud Journey and Strategies FREE CHAPTER 3. Chapter 2: Architecture Overview and Definitions 4. Chapter 3: Multi-Tenant Considerations 5. Chapter 4: OpenShift Personas and Skillsets 6. Part 2 – Leverage Enterprise Products with Red Hat OpenShift
7. Chapter 5: OpenShift Deployment 8. Chapter 6: OpenShift Troubleshooting, Performance, and Best Practices 9. Chapter 7: OpenShift Network 10. Chapter 8: OpenShift Security 11. Part 3 – Multi-Cluster CI/CD on OpenShift Using GitOps
12. Chapter 9: OpenShift Pipelines – Tekton 13. Chapter 10: OpenShift GitOps – Argo CD 14. Chapter 11: OpenShift Multi-Cluster GitOps and Management 15. Part 4 – A Taste of Multi-Cluster Implementation and Security Compliance
16. Chapter 12: OpenShift Multi-Cluster Security 17. Chapter 13: OpenShift Plus – a Multi-Cluster Enterprise Ready Solution 18. Chapter 14: Building a Cloud-Native Use Case on a Hybrid Cloud Environment 19. Part 5 – Continuous Learning
20. Chapter 15: What’s Next 21. Index 22. Other Books You May Enjoy

Policies and violations

ACS comes with dozens of security policies defined out of the box that you can just start using and also allows you to define custom security policies for your Kubernetes clusters. You can also easily check what policies are violated using the Violations feature.

In this section, we will see how to view and create policies and also walk through the Violations feature.

Security policies

To access the security policies, navigate to Platform Configuration | Policies. All out-of-the-box policies will be listed in this view:

Figure 12.22 – Security policies

Let’s use a simple policy to learn how a security policy works on ACS. In the Filter policies box, type Policy and hit Enter; then type admin secret and hit Enter again to find the OpenShift: Advanced Cluster Security Central Admin Secret Accessed policy:

Figure 12.23 – Latest tag policy

Now click on the link to see the Policy details...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime