Installation Manual - 82 Hub lower-risk NetworkPolicy apply

GitOps apply and validation for lower-risk hub-dc-v7 operator and agent NetworkPolicies.

This chapter records the hub-dc-v7 lower-risk operator and agent NetworkPolicy apply gate.

The gate applied only ingress policies. It did not add egress default-deny, and it did not touch webhook/APIService/route-sensitive namespaces.

Governance

FieldValue
IssueOP-GF-COMPLIANCE-11 / #403
MilestoneWorkspace Governance
Governing ADRADR 0016
PredecessorOP-GF-COMPLIANCE-10 / #402

Access Path

All live checks and the Compliance rescan used the established path:

local workspace -> dl385-2 -> gf-ocp-bootstrap-01 -> hub-dc-v7 kubeconfig

No Secret values, kubeconfigs, tokens, pull secrets, PAT values, MinIO keys, or full Secret manifests were printed.

GitOps Change

Platform GitOps commit:

c196470 Add hub lower-risk NetworkPolicies

Full Argo revision:

c196470009afbcbd1724e96b542bb1e72a5b205f

The policies were added under:

clusters/hub-dc-v7/platform/networkpolicy/

Applied Policies

NamespacePoliciesMonitoring allow ports
cert-manager-operatordefault-deny-ingress, allow-monitoring-ingress8443
external-secrets-operatordefault-deny-ingress, allow-monitoring-ingress8443, 8080
rhacs-operatordefault-deny-ingress, allow-monitoring-ingress8443
open-cluster-management-agentdefault-deny-ingressnone
open-cluster-management-agent-addondefault-deny-ingress, allow-monitoring-ingress8443, 8388

Monitoring ingress is allowed from namespaces labeled:

network.openshift.io/policy-group=monitoring

Validation

Post-apply validation at 2026-05-19T12:11:17Z:

CheckResult
OpenShift4.20.18
Network typeOVNKubernetes
ClusterVersionAvailable, not Progressing, not Failing
Nodes3/3 Ready
ClusterOperatorssteady
MachineConfigPoolssteady
Hub Argo CDSynced/Healthy at c196470
Non-running podsnone
Target webhook refsnone
Target APIService refsnone
Target routesnone

All target pods and deployments stayed Ready after apply.

Compliance Rescan

A one-off hub ComplianceScan/ocp4-cis rescan was triggered after Argo CD and hub health were steady.

FieldValue
Trigger2026-05-19T12:11:36Z
Start2026-05-19T12:11:37Z
End2026-05-19T12:12:19Z
PhaseDONE
ResultNON-COMPLIANT

Post-rescan counts:

StatusCount
PASS161
FAIL1
MANUAL21

The remaining failed check is still:

ocp4-cis-configure-network-policies-namespaces

That is expected because the remaining uncovered namespaces are intentionally deferred.

Residual Coverage

Post-apply inventory at 2026-05-19T12:12:43Z:

MetricCount
Namespaces99
NetworkPolicies98
Namespaces with policy28
Namespaces without policy71

Non-system namespaces still without NetworkPolicy:

cert-manager
hive
hypershift
multicluster-engine
open-cluster-management
open-cluster-management-hub

Next Gate

Recommended next gate:

OP-GF-COMPLIANCE-12: canary hub webhook/APIService NetworkPolicies or tailoring for cert-manager, hive, and hypershift

Do not blanket default-deny the remaining namespaces. They expose admission webhooks, APIService backends, routes, or some combination of those and need a canary or tailoring decision.

Last reviewed: 2026-05-19