Installation Manual - 91 Hub ACM addon metrics Secret-read validation

Read-only validation for hub-dc-v7 ACM addon metrics roles with Secret read verbs.

This chapter records the hub-dc-v7 read-only validation for the ACM addon metrics RBAC exception.

No live cluster state was changed.

Governance

FieldValue
IssueOP-GF-COMPLIANCE-20 / #412
MilestoneWorkspace Governance
Governing ADRADR 0016
PredecessorOP-GF-COMPLIANCE-19 / #411

Access Path

All live checks used the established path:

local workspace -> dl385-2 -> gf-ocp-bootstrap-01 -> hub-dc-v7 kubeconfig

No Secret values, kubeconfigs, tokens, pull secrets, PAT values, MinIO keys, or full Secret manifests were printed.

Hub State

Read-only validation before and after evidence collection confirmed:

CheckResult
ClusterVersionAvailable, not Progressing, not Failing
Nodes3/3 Ready
ClusterOperatorssteady
Non-running podsnone
hub-dc-v7-bootstrapSynced/Healthy at 12c68aee6d6a77dfcc197926d4f36594ea224625
ComplianceScan/ocp4-cisDONE / COMPLIANT
ComplianceScan/ocp4-cis-node-masterDONE / COMPLIANT
Compliance result countsPASS=162, MANUAL=21, FAIL=0

Target Roles

Two ACM addon metrics Roles grant read-only Secret access to platform Prometheus in open-cluster-management-agent-addon.

RoleBound subjectSecret accessOwnership
governance-policy-framework-metricsopenshift-monitoring/prometheus-k8sget,list,watchAppliedManifestWork, manager work-agent
hypershift-addon-agent-metricsopenshift-monitoring/prometheus-k8sget,list,watchAppliedManifestWork, manager work-agent

Neither role grants Secret mutation verbs.

Effective Prometheus permissions:

PermissionResult
secrets get/list/watchallowed
secrets create/update/patch/deletedenied
services,pods,endpoints,nodes get/list/watchallowed

There are four Prometheus metrics RoleBindings in the namespace.

RoleSecret access
cert-policy-controller-metricsno
config-policy-controller-metricsno
governance-policy-framework-metricsyes
hypershift-addon-agent-metricsyes

The cert/config policy metrics roles grant only:

services,pods,endpoints get/list/watch

Metrics Evidence

Current addon workloads are running, including:

governance-policy-framework
hypershift-addon-agent
cert-policy-controller
config-policy-controller
application-manager
cluster-proxy-proxy-agent
klusterlet-addon-workmgr
managed-serviceaccount-addon-agent

The target ServiceMonitors use HTTPS, the service CA file, and serverName. No visible bearerTokenSecret name was present in the endpoint shape captured by the validation.

Decision

Accept RBAC-EX-006 as a current-phase platform exception.

The Secret read access may be inherited from ACM-generated metrics role templates rather than visibly required by the current ServiceMonitor endpoint configuration, but the RBAC is generated and managed by ACM work delivery. Direct live patching would not be a supported durable remediation.

Do not patch or delete these rules in live state or GitOps overlays unless a future gate identifies an upstream/operator-supported reduced manifest and a rollback-tested canary plan.

Next Gate

Recommended next gate:

OP-GF-OPERATORS-01: post-compliance operator readiness and next-operator selection

That gate should revalidate hub/spoke health, installed operator state, and available mirrored packages before choosing the next operator track.

Last reviewed: 2026-05-19