Configuring
Red Hat Advanced Cluster Security for Kubernetes 4.6
Configuring Red Hat Advanced Cluster Security for Kubernetes
Abstract
This document describes how to perform common configuration tasks, including configuring certificates, automatic upgrades, and proxy settings. It also includes information on enabling monitoring and logging.