Installation Manual - 83 Hub webhook NetworkPolicy canary

GitOps canary and validation for hub-dc-v7 webhook and APIService-sensitive NetworkPolicies.

This chapter records the hub-dc-v7 webhook/APIService NetworkPolicy canary gate for cert-manager, hive, and hypershift.

The gate applied only ingress policies. It did not add egress default-deny, and it did not touch the broader ACM/MCE namespaces.

Governance

FieldValue
IssueOP-GF-COMPLIANCE-12 / #404
MilestoneWorkspace Governance
Governing ADRADR 0016
PredecessorOP-GF-COMPLIANCE-11 / #403

Access Path

All live checks and the Compliance rescan used the established path:

local workspace -> dl385-2 -> gf-ocp-bootstrap-01 -> hub-dc-v7 kubeconfig

No Secret values, kubeconfigs, tokens, pull secrets, PAT values, MinIO keys, or full Secret manifests were printed.

GitOps Changes

Initial platform GitOps commit:

bec1755 Add hub webhook NetworkPolicy canary

Corrective platform GitOps commit:

cbd8231 Broaden hub canary webhook port allows

Full final Argo revision:

cbd823129191540acea25807495c5784e6eabd53

Applied Policies

Each canary namespace received:

  • default-deny-ingress
  • allow-same-namespace-ingress
  • allow-kube-apiserver-ingress
  • allow-monitoring-ingress

Final port model:

NamespaceWebhook/APIService portsMonitoring ports
cert-manager443, 102509402
hive443, 94432112, 6060
hypershift443, 94439393, 9000

The webhook/APIService rules are source-wide but port-scoped. The first source-constrained rule set caused webhook/APIService timeouts, so the final GitOps state preserves the relevant destination ports while keeping the rest of ingress denied.

Validation

Final validation at 2026-05-19T12:36:11Z:

CheckResult
OpenShift4.20.18
Network typeOVNKubernetes
ClusterVersionAvailable, not Progressing, not Failing
Nodes3/3 Ready
ClusterOperatorssteady
MachineConfigPoolssteady
hub-dc-v7-bootstrapSynced/Healthy at cbd823129191540acea25807495c5784e6eabd53
Non-running podsnone
Canary workloadsall deployments and StatefulSets Ready
Hive APIServiceAvailable=True, reason Passed
Hive raw discoveryAPIResourceList admission.hive.openshift.io/v1
cert-manager webhook dry-runpassed
Hypershift webhook dry-runreached webhook and returned normal spec validation

Compliance Rescan

One-off hub ComplianceScan/ocp4-cis rescan:

FieldValue
Trigger2026-05-19T12:36:30Z
Start2026-05-19T12:36:31Z
End2026-05-19T12:37:16Z
PhaseDONE
ResultNON-COMPLIANT

Post-rescan counts:

StatusCount
PASS161
FAIL1
MANUAL21

The remaining failed check is:

ocp4-cis-configure-network-policies-namespaces

Residual Coverage

Post-apply inventory at 2026-05-19T12:37:37Z:

MetricCount
Namespaces99
NetworkPolicies110
Namespaces with NetworkPolicy31
Namespaces without NetworkPolicy68

Remaining non-system namespaces without NetworkPolicy:

multicluster-engine
open-cluster-management
open-cluster-management-hub

Next Gate

The next gate should handle the broader ACM/MCE hub namespaces:

OP-GF-COMPLIANCE-13: ACM/MCE hub namespace NetworkPolicy design or tailoring

Last reviewed: 2026-05-19