Ce contenu n'est pas disponible dans la langue sélectionnée.

Chapter 1. Red Hat Advanced Cluster Security for Kubernetes 4.6 Documentation


Welcome to the official Red Hat Advanced Cluster Security for Kubernetes documentation, where you can learn about Red Hat Advanced Cluster Security for Kubernetes and start exploring its features.

To go to the Red Hat Advanced Cluster Security for Kubernetes documentation, you can use one of the following methods:

  • Use the left navigation bar to browse the documentation.
  • Select the task that interests you from the contents of this Welcome page.

1.1. Installation activities

1.2. Operating Red Hat Advanced Cluster Security for Kubernetes

Explore various activities you can perform by using Red Hat Advanced Cluster Security for Kubernetes:

  • Viewing the dashboard: Find information about the Red Hat Advanced Cluster Security for Kubernetes real-time interactive dashboard. Learn how to use it to view key metrics from all your hosts, containers, and services.
  • Compliance feature overview: Understand how to run automated checks and validate compliance based on industry standards, including CIS, NIST, PCI, and HIPAA.
  • Managing vulnerabilities: Learn how to identify and prioritize vulnerabilities for remediation.
  • Responding to violations: Learn how to view policy violations, drill down to the actual cause of the violation, and take corrective actions.

1.3. Configuring Red Hat Advanced Cluster Security for Kubernetes

Explore the following typical configuration tasks in Red Hat Advanced Cluster Security for Kubernetes:

1.4. Integrating with other products

Learn how to integrate Red Hat Advanced Cluster Security for Kubernetes with the following products:

  • Integrating with PagerDuty: Learn how to integrate with PagerDuty and forward alerts from Red Hat Advanced Cluster Security for Kubernetes to PagerDuty.
  • Integrating with Slack: Learn how to integrate with Slack and forward alerts from Red Hat Advanced Cluster Security for Kubernetes to Slack.
  • Integrating with Sumo Logic: Learn how to integrate with Sumo Logic and forward alerts from Red Hat Advanced Cluster Security for Kubernetes to Sumo Logic.
  • Integrating by using the syslog protocol: Learn how to integrate with a security information and event management (SIEM) system or a syslog collector for data retention and security investigations.
Red Hat logoGithubRedditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez leBlog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

© 2024 Red Hat, Inc.