이 페이지에서는 정책 컨트롤러 대시보드를 사용하여 정책 범위와 클러스터 위반을 확인하는 방법을 설명합니다.
이 페이지는 감사 또는 시행 자동화를 제공하고 유지하여 클라우드 플랫폼 내에서 실행되는 모든 리소스가 조직의 규정 준수 요구사항을 충족하도록 보장하고 알림을 설정하며 IT 시스템의 성능 및 취약점을 모니터링하려는 IT 관리자와 운영자를 위해 작성되었습니다. Google Cloud 콘텐츠에서 참조하는 일반적인 역할 및 예시 태스크에 대해 자세히 알아보려면 일반 GKE Enterprise 사용자 역할 및 태스크를 참조하세요.
Google Cloud 콘솔을 사용하여 정책 범위에 대한 정보가 포함된 대시보드를 확인합니다. 대시보드에는 다음과 같은 정보가 표시됩니다.
정책 컨트롤러가 설치된 Fleet의 클러스터 수(미등록 클러스터 포함)
정책 컨트롤러가 설치되어 있고 정책 위반이 포함된 클러스터 수
시행 작업당 클러스터에 적용되는 제약조건 수
정책 컨트롤러 번들을 사용하는 경우 하나 이상의 번들에 있는 표준에 따라 규정 준수 개요를 볼 수 있습니다. 이 개요는 Fleet 수준에서 집계되며 미등록 클러스터도 포함합니다(미리보기).
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-07-22(UTC)"],[],[],null,["This page explains how to use Policy Controller dashboards to view your policy\ncoverage and cluster violations.\n\nThis page is for IT administrators and Operators who want to ensure\nthat all resources running within the cloud platform meet organizational\ncompliance requirements by providing and maintaining automation to audit or\nenforce, and who set up alerting and monitor IT systems for performance and\nvulnerabilities. To learn more about common roles and example tasks that we\nreference in Google Cloud content, see\n[Common GKE user roles and tasks](/kubernetes-engine/enterprise/docs/concepts/roles-tasks).\n| **Caution:** For Google Distributed Cloud (VMware or bare metal), GKE on AWS, GKE on Azure, and GKE attached clusters, the Policy Controller dashboard requires Kubernetes cluster versions 1.26 or later and the following product versions:\n|\n| - **GKE on AWS**: 1.26.2-gke.1001 or later\n| - **GKE on Azure**: 1.26.2-gke.1001 or later\n| - **GKE attached clusters**: 1.25.0-gke.3 or later\n\nUse the Google Cloud console to view a dashboard that contains information about\nyour policy coverage. The dashboard shows information such as the following:\n\n- The number of clusters in a fleet (including unregistered clusters) that have Policy Controller installed.\n- The number of clusters with Policy Controller installed that contain policy violations.\n- The number of constraints applied to your clusters per enforcement action.\n\nIf you are using [Policy Controller bundles](/kubernetes-engine/enterprise/policy-controller/docs/concepts/policy-controller-bundles),\nyou can see an overview of your compliance based on the standards in one or\nmore bundles. This overview is aggregated at a fleet level and also includes\nyour unregistered clusters ([Preview](/products#product-launch-stages)).\n\nBefore you begin\n\n1. Make sure that your clusters are registered to a [fleet](/anthos/multicluster-management/fleets)\n and that your clusters have Policy Controller installed.\n\n2. To get the permissions that you need to use the Policy Controller dashboard, ask your administrator to grant you the following IAM roles:\n\n - GKE Hub Viewer (`roles/gkehub.viewer`) on the project containing your fleet\n - Monitoring Viewer (`roles/monitoring.viewer`) on each project with a cluster in your fleet\n\n For more information about granting roles, see [Manage access](/iam/docs/granting-changing-revoking-access).\n\nView Policy Controller status\n\nYou can view information about your policy coverage in the Google Cloud console.\n\n1. In the Google Cloud console, go to the **Policy** page under the **Posture Management** section.\n\n \u003cbr /\u003e\n\n [Go to Policy](https://console.cloud.google.com/kubernetes/policy_controller)\n\n On the **Dashboard** tab, see an overview of your Policy Controller\n coverage with the following information:\n - **Policy Controller coverage** shows the number of clusters with and without Policy Controller installed.\n - **Clusters in violation** shows the number of clusters without any violations and the number of clusters with violations. The violations are based on which [constraints](/kubernetes-engine/enterprise/policy-controller/docs/how-to/creating-policy-controller-constraints) are applied to the cluster.\n - **Enforcement** action shows the type of action specified in each constraint. For more information about enforcement actions, see [Auditing using constraints](/kubernetes-engine/enterprise/policy-controller/docs/how-to/auditing-constraints).\n - **Compliance by standards** an overview of your compliance based on the standards in one or more Policy Controller bundles. If you are not using any bundles, the status in this section shows as \"100% not applied\".\n2. To view more detailed information about policy violations in your cluster,\n go to the **Violations** tab:\n\n 1. In the **View by** section, select one of the following options:\n\n - **Constraint**: view a flat list of all constraints with violations in your cluster.\n - **Namespace**: view constraints with violations, organized by the namespace that contains the resource with a violation.\n - **Resource kind**: view constraints with violations, organized by the resource with a violation.\n 2. From any view, select the constraint name that you want to view.\n\n The **Details** tab shows information about the violation, including the\n recommended action to resolve it.\n\n The **Affected Resources** tab shows information about which resources\n are being evaluated by the constraint and have policy violations.\n\nView policy findings in Security Command Center\n\nAfter Policy Controller is installed, you can view policy violations in Security Command Center.\nThis lets you view your security posture for your Google Cloud resources and your\nKubernetes resources in the same place. You must have the\n[Security Command Center activated in your organization](/security-command-center/docs/activate-scc-overview)\n[at the Standard or Premium tier](/security-command-center/docs/service-tiers).\n| **Note:** Security Command Center shows only violations related to the following Policy Controller bundles: [`pci-dss-v3.2.1`](/kubernetes-engine/enterprise/policy-controller/docs/how-to/using-pci-dss-v3) and [`cis-k8s-v1.5.1`](/kubernetes-engine/enterprise/policy-controller/docs/how-to/using-cis-k8s-benchmark).\n\nIn Security Command Center, policy violations show as `Misconfiguration` findings. The\ncategory and next steps for each finding are the same as the constraint description\nand remediation steps.\n\nFor more information about using Policy Controller in Security Command Center, see\n[Policy Controller vulnerability findings](/security-command-center/docs/concepts-security-sources#policy-controller)."]]