Red Hat Lightspeed 1-latest

About

Getting started with Red Hat Lightspeed

How to start using Red Hat Lightspeed

Release notes

Release Notes for Red Hat Lightspeed

Connecting your RHEL systems through the Red Hat Lightspeed proxy

Red Hat Lightspeed proxy allows those with constraints preventing Internet access to connect to Red Hat Lightspeed

Using company single sign-on integration

Using company single sign-on credentials to access your Red Hat account

Configuration (RHEL)

User Access Configuration Guide for Role-based Access Control (RBAC)

How to configure RBAC for Red Hat Insights and other services on the Hybrid Cloud Console

Remote host configuration and management

Using the remote host configuration and management features for Red Hat Lightspeed

Client configuration guide for Red Hat Lightspeed

Configuration options and use cases for the Red Hat Lightspeed client

Inventory (RHEL)

Viewing and managing system inventory

Using inventory to easily track and manage your infrastructure

Content and images (RHEL)

Deploying and managing RHEL systems in hybrid clouds

Deploying and managing your customized RHEL system images in hybrid clouds

Managing system content and patch updates on RHEL systems

How to review applicable advisories and affected systems, manage system content, and remediate issues

Operations (RHEL)

Assessing RHEL configuration issues by using the Red Hat Lightspeed advisor service

Assess and monitor the configuration issues impacting your Red Hat Enterprise Linux systems

Generating advisor service reports

Share reporting from advisor about the conditions affecting your RHEL infrastructure.

Monitoring and reacting to configuration changes by using policies

How to create policies to detect inventory configuration changes and send email notifications

Security (RHEL)

Assessing and monitoring security vulnerabilities on RHEL systems

Understanding your environmental exposure to potential security threats

Generating vulnerability service reports

Communicate the exposure of RHEL systems to CVE security vulnerabilities

Assessing and monitoring security policy compliance of RHEL systems

Understanding the security compliance status of your Red Hat Enterprise Linux Infrastructure

Generating compliance service reports

Communicate the compliance status of your Red Hat Enterprise Linux infrastructure to security stakeholders

Assessing and reporting malware signatures on RHEL systems

Know when systems in your Red Hat Enterprise Linux infrastructure are exposed to malware risks

Business (RHEL)

Assessing and monitoring RHEL resource optimization with Red Hat Lightspeed

Understanding Red Hat Enterprise Linux resource-usage statistics

Subscription Central Documentation

Learn about subscriptions tools on the Red Hat Hybrid Cloud Console

Automation Toolkit (RHEL)

Red Hat Lightspeed remediations guide

Fixing issues on Red Hat Enterprise Linux systems by using remediation plans

Assessing and remediating system issues by using Red Hat Lightspeed tasks

Use predefined playbooks provided by the Red Hat Lightspeed tasks service to resolve issues on your systems

Converting from a Linux distribution to RHEL using the Convert2RHEL utility in Red Hat Lightspeed

Instructions for a conversion from CentOS Linux 7 to Red Hat Enterprise Linux 7 using the Convert2RHEL utility in Red Hat Lightspeed

API Reference (RHEL)

Notifications and Integrations

Integrating the Red Hat Hybrid Cloud Console with third-party applications

Configuring integrations between third-party tools and the Red Hat Hybrid Cloud Console

Configuring notifications on the Red Hat Hybrid Cloud Console

Configuring Hybrid Cloud Console settings so that account users receive event-triggered notifications

Advisor (OpenShift)

Monitoring your OpenShift cluster health with Red Hat Lightspeed Advisor

Using Red Hat Lightspeed advisor service to monitor your OpenShift cluster infrastructure

Vulnerability (OpenShift)

Assessing security vulnerabilities in your OpenShift cluster using Red Hat Lightspeed

Using Red Hat Lightspeed vulnerability dashboard to assess cluster exposure to CVE vulnerabilities

Cost management (OpenShift)

Red Hat Lightspeed with FedRAMP (RHEL)

Getting started with Red Hat Lightspeed with FedRAMP

How to start using Red Hat Lightspeed

Assessing and monitoring security policy compliance of RHEL systems with FedRAMP

Understanding the security compliance status of your Red Hat Enterprise Linux infrastructure

User Access Configuration Guide for Role-based Access Control (RBAC) with FedRAMP

How to use the User Access feature to configure RBAC for services hosted on the Red Hat Hybrid Cloud Console

Assessing and monitoring RHEL resource optimization with Red Hat Lightspeed with FedRAMP

Understanding Red Hat Enterprise Linux resource-usage statistics

Assessing and monitoring security vulnerabilities on RHEL systems with FedRAMP

Understanding your environmental exposure to potential security threats

Assessing and remediating system issues by using Red Hat Lightspeed tasks with FedRAMP

Use predefined Red Hat Lightspeed tasks playbooks to resolve issues on your systems

Assessing and reporting malware signatures on RHEL systems with FedRAMP

Know when systems in your Red Hat Enterprise Linux infrastructure are exposed to malware risks

Assessing RHEL configuration issues by using the Red Hat Lightspeed advisor service with FedRAMP

Assess and monitor the configuration issues impacting your Red Hat Enterprise Linux systems

Client configuration guide for Red Hat Lightspeed with FedRAMP

Configuration options and use cases for the Red Hat Lightspeed client

Generating advisor service reports with FedRAMP

Share reporting from advisor with FedRAMP® about the conditions affecting your RHEL infrastructure.

Generating compliance service reports with FedRAMP

Communicate the compliance status of your Red Hat Enterprise Linux infrastructure to security stakeholders

Generating vulnerability service reports with FedRAMP

Communicate the exposure of RHEL systems to CVE security vulnerabilities

Monitoring and reacting to configuration changes by using policies with FedRAMP

How to create policies to detect inventory configuration changes and send email notifications

Red Hat Lightspeed remediations guide with FedRAMP

Fixing issues on Red Hat Enterprise Linux systems by using remediation plans

Managing system content and patch updates on RHEL systems with FedRAMP

How to review applicable advisories and affected systems, manage system content, and remediate issues

Viewing and managing system inventory with FedRAMP

Using workspaces to organize system inventory and manage User Access to groups of systems

Back to top
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2025 Red Hat