Feature | Benefit |
Cluster configuration management at scale | Powered by the Open Cluster Management project, more easily manage and observe desired cluster configurations and state across a fleet. Use “inform” mode to detect configuration drift from desired controls; and “enforce” mode to ensure that those controls are continuously implemented and maintained. |
GitOps-enabled via Policy-as-Code design | Taking advantage of the Kubernetes CustomResourceDefinition (CRD) pattern, allows for policies to be declaratively defined and naturally integrated with git workflows using tools like OpenShift GitOps (Argo CD). Predefined “health checks” for Open Cluster Management policies enable Argo CD to intelligently understand the policy violation statuses and natively display in the Argo CD dashboard. |
Flexible multi-cluster deployment options | The RHACM policy framework provides a Continuous Delivery (CD) mechanism to deploy your policies to clusters that match Placement criteria via the Policy Custom Resource. For users that already have existing delivery tools in place, such as Argo CD, you can integrate policies into your existing workflows for deployment to clusters without any tooling or process changes. |
Dynamic run-time configuration via lookups and templating | Configurations may occasionally require unique cluster values or characteristics, or need to dynamically adapt based on the cluster state. With lookups, you can readily reference other values in the cluster such as the cluster name, secret values, and more. With templating, you can create highly customizable logic, using conditionals and more, for your tailored configuration needs.
Through lookups and templating, you can greatly reduce and simplify the number of resource manifests you need to manage resulting from variations in cluster characteristics, cluster or deployed software versions, environments, and more. |
Synchronization of secrets, ConfigMaps, or other configurations from hub to spoke | Security-hardened delivery and enforcement of content from the hub to managed clusters, using templatized policies and its underlying encryption (from secret and protect functions). |
Operator lifecycle management (OLM) | Use a single consolidated API, OperatorPolicy, to declaratively manage the lifecycle of OLM operators across your fleet. It provides a consolidated operator health status for expedited problem detection. Provides a GitOps-friendly API, even for operators deployed in “manual” mode and declarative management of the operator’s install plans for more controlled upgrades. |
Admission and mutation controls | Get full support for Open Policy Agent (OPA) Gatekeeper that allows deployment of the operator to your fleet. Initiate Gatekeeper controls across your fleet to enforce various OPA controls. Centrally view and drill down into violations for all of your Gatekeeper policies. |
Certificate issue detection | Use CertificatePolicy to detect certificates that will soon expire, configured with lifespans that are too long, or contain DNS names that fail to match specified patterns. |
Out-of-the-box and customization of policies | Use prebuilt policy templates to enforce policy on Kubernetes configuration, e.g., etcd encryption, identity and access management (IAM), certificate management, and deploy and configure operators, such as compliance operator, Gatekeeper/OPA, and container security uperator across your clusters. Implement policy-based governance via GitOps to meet internal and external standards, using the open source policy collection repository. Allow policies to be auto-generated, using the Policy Generator, and deployed via OpenShift GitOps from existing Kubernetes configuration, Gatekeeper, and Kyverno policies. |
Integration with observability tooling | Policies produce associated Prometheus metrics that allow for a reliable integration with Observability tooling; such as creating customized Grafana dashboards, or hooking into alerting tools, to naturally fit into SRE workflows. |
Ansible Automation Platform integration | Use Ansible Automation Platform integration with Red Hat Advanced Cluster Management to automate remediation of violation conditions and gather audit information about the clusters for analysis to promote proactive measures against policy violations detected by Red Hat Advanced Cluster Management. |
Red Hat OpenShift Platform Plus policy set | Get a consolidated experience by using Red Hat Advanced Cluster Management console to deploy OpenShift Platform Plus components consistently across hub and managed clusters by creating policy sets developed with the Policy Generator. |
Policy CLI | For improved local development of policies, use the policytools CLI, to more easily create and locally test the behavior of policies that use the lookup and templating functions. |
Simplified policy management experience | Use the governance dashboard to view and manage security risks and policy violations in all of your clusters and applications. Get details on violation history. Examine violation details by centrally accessing details from managed clusters from the Red Hat Advanced Cluster Management hub. Use PolicySets to group policies for specific purposes, e.g., Red Hat OpenShift Platform Plus deployment, Red Hat Advanced Cluster Management hardening, managed cluster hardening, grouping Gatekeeper policies, PCIStoreFront, and HIPAA backend. This ensures an enhanced user-friendly experience of organizing, managing, and enforcing policies or policy sets for clusters at scale. Preconfigured policy sets are available via GitOps as a starting point to use this feature. Customize policies for various compliance standards, governance dashboard views, and views for most-affected controls for specific standards. |
Automated policy discovery and user experience for multiple policy engines | The Red Hat Advanced Cluster Management Governance dashboard will automatically detect deployed policies from multiple policy engines to include: Open Cluster Management and Open Policy Agent Gatekeeper. |