Este contenido no está disponible en el idioma seleccionado.

Chapter 1. Red Hat Advanced Cluster Security for Kubernetes 3.69 Documentation


Welcome to the official Red Hat Advanced Cluster Security for Kubernetes documentation, where you can learn about Red Hat Advanced Cluster Security for Kubernetes and start exploring its features.

To navigate the Red Hat Advanced Cluster Security for Kubernetes documentation, you can use one of the following methods:

  • Use the left navigation bar to browse the documentation.
  • Select the task that interests you from the contents of this Welcome page.

1.1. Installation activities

Explore the following Red Hat Advanced Cluster Security for Kubernetes installation tasks:

  • Installation methods for different platforms: Determine the best installation method for your platform.
  • Installing by using an Operator: Learn how to install Red Hat Advanced Cluster Security for Kubernetes on OpenShift Container Platform or a Kubernetes cluster by using the Red Hat Advanced Cluster Security for Kubernetes Operator. This is the recommended installation method for most platforms.
  • Installing using Helm charts: Learn how to install Red Hat Advanced Cluster Security for Kubernetes by using Helm charts. This is the recommended installation method for Amazon Elastic Kubernetes Service (Amazon EKS), Google Kubernetes Engine (Google GKE), and Microsoft Azure Kubernetes Service (Microsoft AKS).
  • Installing by using the roxctl CLI: Learn how to install Red Hat Advanced Cluster Security for Kubernetes by using the roxctl command-line interface (CLI). roxctl is a CLI for running commands on Red Hat Advanced Cluster Security for Kubernetes.

1.2. Operating Red Hat Advanced Cluster Security for Kubernetes

Explore various activities you can perform by using Red Hat Advanced Cluster Security for Kubernetes:

  • Viewing the dashboard: Find information about the Red Hat Advanced Cluster Security for Kubernetes real-time interactive dashboard. Learn how to use it to view key metrics from all your hosts, containers, and services.
  • Managing compliance: Understand how to run automated checks and validate compliance based on industry standards, including CIS, NIST, PCI, and HIPAA.
  • Managing vulnerabilities: Learn how to identify and prioritize vulnerabilities for remediation.
  • Responding to violations: Learn how to view policy violations, drill down to the actual cause of the violation, and take corrective actions.

1.3. Configuring Red Hat Advanced Cluster Security for Kubernetes

Explore the following typical configuration tasks in Red Hat Advanced Cluster Security for Kubernetes:

1.4. Integrating with other products

Learn how to integrate Red Hat Advanced Cluster Security for Kubernetes with the following products:

  • Integrating with PagerDuty: Learn how to integrate with PagerDuty and forward alerts from Red Hat Advanced Cluster Security for Kubernetes to PagerDuty.
  • Integrating with Slack: Learn how to integrate with Slack and forward alerts from Red Hat Advanced Cluster Security for Kubernetes to Slack.
  • Integrating with Sumo Logic: Learn how to integrate with Sumo Logic and forward alerts from Red Hat Advanced Cluster Security for Kubernetes to Sumo Logic.
  • Integrating by using the syslog protocol: Learn how to integrate with a security information and event management (SIEM) system or a syslog collector for data retention and security investigations.
Volver arriba
Red Hat logoGithubredditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar. Explore nuestras recientes actualizaciones.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

Theme

© 2025 Red Hat