Installation Manual - 84 Hub ACM MCE NetworkPolicy canary

GitOps canary and validation for hub-dc-v7 ACM/MCE namespace NetworkPolicies.

This chapter records the hub-dc-v7 ACM/MCE NetworkPolicy canary gate for the remaining hub compliance namespaces:

  • multicluster-engine
  • open-cluster-management
  • open-cluster-management-hub

The gate applied only ingress policies. It did not add egress default-deny.

Governance

FieldValue
IssueOP-GF-COMPLIANCE-13 / #405
MilestoneWorkspace Governance
Governing ADRADR 0016
PredecessorOP-GF-COMPLIANCE-12 / #404

Access Path

All live checks, Argo reconciliation, and the Compliance rescan used the established path:

local workspace -> dl385-2 -> gf-ocp-bootstrap-01 -> hub-dc-v7 kubeconfig

No Secret values, kubeconfigs, tokens, pull secrets, PAT values, MinIO keys, or full Secret manifests were printed.

Preflight

Preflight at 2026-05-19T12:46:43Z confirmed:

CheckResult
OpenShift4.20.18
ClusterVersionAvailable, not Progressing, not Failing
Nodes3/3 Ready
ClusterOperatorssteady
MachineConfigPoolssteady
Target bad podsnone
hub-dc-v7-bootstrapSynced/Healthy at cbd823129191540acea25807495c5784e6eabd53
Target NetworkPolicies0 in each target namespace

ACM/MCE raw API discovery passed for:

  • /apis/clusterview.open-cluster-management.io/v1
  • /apis/clusterview.open-cluster-management.io/v1alpha1
  • /apis/proxy.open-cluster-management.io/v1beta1

Admission server dry-runs passed for:

  • MulticlusterEngine/multiclusterengine
  • MulticlusterHub/open-cluster-management/multiclusterhub
  • first ManagedCluster
  • first ManifestWork

CRD conversion list checks also passed. Two stale CRD conversion service references were discovered and left as residual product-state risk:

  • multicluster-engine/webhook-service
  • open-cluster-management/multicluster-observability-webhook-service

GitOps Change

Platform GitOps commit:

12c68ae Add ACM MCE hub NetworkPolicy canary

Full final Argo revision:

12c68aee6d6a77dfcc197926d4f36594ea224625

Applied Policies

Each target namespace received:

  • default-deny-ingress
  • allow-same-namespace-ingress
  • allow-service-ports-ingress

The service-port rules are source-wide but destination-port scoped. This was chosen because the ACM/MCE namespaces host admission webhooks, aggregated API backends, CRD conversion paths, route-backed endpoints, console services, managed-cluster agent endpoints, and metrics services.

Port model:

NamespaceAllowed TCP destination ports
multicluster-engine80, 443, 3000, 6443, 8000, 8080, 8090, 8091, 8443, 9091, 9092, 9443
open-cluster-management443, 3000, 8381, 8383, 8389, 8443, 9442, 9443
open-cluster-management-hub9443

Both Service ports and target container ports are included where they differ, following the previous OVNKubernetes canary result.

Validation

Final validation at 2026-05-19T12:51:59Z:

CheckResult
hub-dc-v7-bootstrapSynced/Healthy at 12c68aee6d6a77dfcc197926d4f36594ea224625
ClusterVersionAvailable, not Progressing, not Failing
Nodes3/3 Ready
ClusterOperatorssteady
MachineConfigPoolssteady
Non-running podsnone
Target deploymentsall Ready and Available
Target NetworkPolicies3 per namespace
ACM/MCE raw API discoverypassed
Admission server dry-runspassed

Post-apply NetworkPolicy inventory:

MetricCount
Namespaces99
NetworkPolicies119
Namespaces with NetworkPolicy34
Namespaces without NetworkPolicy65

No user/project namespace remains without NetworkPolicy. The only non-prefixed namespace still without NetworkPolicy is the system namespace openshift.

Compliance Rescan

One-off hub ComplianceScan/ocp4-cis rescan:

FieldValue
Trigger2026-05-19T12:50:52Z
End2026-05-19T12:51:40Z
PhaseDONE
ResultCOMPLIANT

Post-rescan counts:

StatusCount
PASS162
MANUAL21
FAIL0

The namespace NetworkPolicy check is now passing:

ocp4-cis-configure-network-policies-namespaces = PASS

Residual Risk

The ACM/MCE policy set is a conservative compliance canary, not final least-privilege segmentation. Future tightening should be planned in a separate gate and should account for the stale CRD conversion service references found during preflight.

Next Gate

Review the remaining hub compliance MANUAL checks, then select the next OpenShift operator/platform readiness gate.

Last reviewed: 2026-05-19