-
Feature
-
Resolution: Unresolved
-
Undefined
-
None
-
None
-
False
-
-
False
-
Not Selected
Currently, FIO (AIDE alerts) on OpenShift are essentially passive records sitting on a ConfigMap.
- Scalability: For a customers with hundreds of clusters, "digging" into individual ConfigMaps via oc get configmap -n openshift-file-integrity is manual, error-prone, and slow. They prefer not to have to access to each cluster.
- Lack of Push Mechanism: ConfigMaps don't "scream" when they change. Without a proactive alert, a security breach could go unnoticed until the next manual audit.
- Operational Friction: Security Operations Centers (SOC) don't want to log into OpenShift consoles; they want alerts in PagerDuty, Slack, or ServiceNow—tools already connected to AlertManager.
The Proposed Solution: Prometheus Integration
By converting AIDE events into Prometheus metrics, you transform a static log into a dynamic signal.
FIO should generate a prometheus metric every time there is an alert.
The Hub: ACM (Advanced Cluster Management) picks up these alerts via the Observability service having the customer a holistic view of alerts.
Why this is a "Win"
- Native Stack: It uses the built-in OpenShift Monitoring stack (Prometheus/AlertManager), so customers don't have to install third-party agents.
- Fleet Visibility: Since ACM aggregates metrics into a single Thanos instance, a global admin can see every AIDE violation across the entire global fleet in one Grafana dashboard.
- Automated Response: Alerts can trigger automated playbooks (e.g., isolating a node if a core binary is tampered with).
- relates to
-
RFE-8249 Centralized File Integrity Failure Reporting via Red Hat Advanced Cluster Management (RHACM) Governance
-
- Waiting
-