Red Hat Advanced Cluster Security for Kubernetes (RHACS) provides security services for your self-managed Red Hat OpenShift Kubernetes systems or platforms such as OpenShift Container Platform, Amazon Elastic Kubernetes Service (Amazon EKS), Google Kubernetes Engine (Google GKE), and Microsoft Azure Kubernetes Service (Microsoft AKS).
For information on supported platforms and architecture, see the Red Hat Advanced Cluster Security for Kubernetes Support Matrix. For life cycle support information for RHACS, see the Red Hat Advanced Cluster Security for Kubernetes Support Policy.
To ensure the best installation experience, follow these guidelines:
Understand the installation platforms and methods described in this module.
Understand Red Hat Advanced Cluster Security for Kubernetes architecture.
Check the default resource requirements.
You can perform different types of installations on different platforms.
Not all installation methods are supported for all platforms. See the Red Hat Advanced Cluster Security for Kubernetes Support Matrix for more information. |
Platform type | Platform | Recommended installation methods | Installation steps |
---|---|---|---|
Managed service platform |
Red Hat OpenShift Dedicated (OSD) |
Operator (recommended), Helm charts, or |
|
Azure Red Hat OpenShift (ARO) |
|||
Red Hat OpenShift Service on AWS (ROSA) |
|||
Red Hat OpenShift on IBM Cloud |
|||
Amazon Elastic Kubernetes Service (Amazon EKS) |
Helm charts (recommended), or |
||
Google Kubernetes Engine (Google GKE) |
|||
Microsoft Azure Kubernetes Service (Microsoft AKS) |
|||
Self-managed platform |
Red Hat OpenShift Container Platform (OCP) |
Operator (recommended), Helm charts, or |
|
Red Hat OpenShift Kubernetes Engine (OKE) |
Do not use the roxctl
installation method unless you have specific requirements for following this installation method.
Red Hat Advanced Cluster Security for Kubernetes (RHACS) supports the following architectures. For information on supported platforms and architecture, see the Red Hat Advanced Cluster Security for Kubernetes Support Matrix. Additionally, the following table gives information about installation methods available for each architecture.
Supported architectures | Supported installation methods |
---|---|
AMD64 |
Operator (preferred), Helm charts, or |
ppc64le (IBM Power) |
Operator |
s390x (IBM Z and IBM® LinuxONE) |