Skip to content

Golden Blueprint

"Golden Cluster Blueprints" capability is an extension of Default (System) Blueprints and can be used to create/enforce a baseline set of add-ons/policies. Users can use it as a base blueprint for any new custom blueprint/versions or deploy Golden Blueprints to clusters.

Golden Blueprints offers the following benefits:

  • Makes it easier to create and manage Custom BPs (Ex: Removes the need for Org/Infra Admins to create a net new custom BP from the scratch with a default BP as the base in cases where a specific add-on or two need to be included additionally for certain projects)
  • Ensure that certain baseline applications are deployed and policies applied at all times for clusters to stay in compliance


Custom Blueprints cannot override configurations specified in the Golden blueprint. This includes policies across different services, installation profiles across different services, and other key settings.


Other than the default cluster blueprints, which is common across all projects, all golden blueprints are scoped to a Project. If required, blueprints can be shared with selected or all projects.

Default Blueprint

The Default Blueprints available out of the box are the following:

  • default-aks (specific to AKS)
  • default-gke (specific to GKE)
  • default
  • default-openshift (specific to OpenShift)
  • default-upstream (specific to upstream)
  • minimal.

The default blueprint carries core services such as Prometheus, log aggregation and more needed to run enterprise Kubernetes workloads while the minimal blueprint contains the bare-bones necessary components to get a cluster up and running and is better for either dev/test situations, or if you want to completely use your own custom services and add-ons.

Each Default Blueprint has different group of system add-ons with multiple versions. Users can pick any of these Default Blueprint and customize to create a new Blueprint version

Golden Blueprint

A custom blueprint can also inherit from a golden blueprint. This is extremely useful when an admin wants to set a specific set of rules that need to be enforced across a fleet of clusters i.e. a golden path but then for certain cluster types or a smaller group of clusters, needs to potentially enable other services, add more policies, etc. This is also useful to enforce compliance and security as configurations in a golden blueprint cannot be overridden or deleted by the custom blueprint.


Any installation profile, service, and policies specified in a golden blueprint cannot be overridden or deleted in the custom blueprint.

Step 1: Create or Update Golden Blueprint

As an Admin in the Web Console,

Creating a Golden Blueprint

  • Navigate to the Project and click on Blueprints under Infrastructure
  • Click on New blueprint
  • Provide a name and description
  • Select the Type Golden Blueprint and click Save

New Blueprint

Updating a Golden Blueprint

  • Navigate to the Project and click on Blueprints under Infrastructure
  • Click on your blueprint
  • Click on New Version and use the wizard to provide details
  • Provide a version number/name

Step 2: New Version and Enabling Key Services, Add-Ons, and Configurations

  • Click on New Version and use the wizard to provide details
  • Provide a version number/name
  • Select the required Base Blueprint (System Blueprints) and its version from the drop-down

New Blueprint

  • Next, let's see the optional functionality that can be enabled in terms of add-ons and services. If you do not want to enable any of this, you can click save changes.

Enabling Drift Detection (Optional)

  • Select a drift detection policy

Drift Detection


In alignment with the end of support for PSPs in Kubernetes, turnkey support for PSPs has been deprecated. New Blueprints will no longer support the use of PSP. Existing PSP configurations configured through Blueprints will be maintained but cannot be updated. PSP addons are therefore marked as ready instantly on any Blueprint updates

Enabling Namespace Syncing (Optional)

  • Enable Namespace sync under Namespace configuration

Namespace sync

Enabling Managed Services (Optional)

Rafay managed services can be enabled including:

  • Policy Management powered by OPA Gatekeeper: This enables OPA Gatekeeper on any cluster the blueprint is deployed to. Select policies from the list to enforce on the required cluster.
  • Network Policy powered by Cilium: Toggling the enable network visibility and policy installs Cilium on the cluster and allows admins to create and enforce Cilium network policies for namespace isolation and L3/L4 segmentation. Optionally, you can select cluster-wide policies to enforce by default as well as specifying a custom installation profile in case you want to change certain Cilium installation parameters.
  • Service Mesh powered by Istio: Toggling the enable button for Service Mesh installs Istio on the cluster the blueprint is deployed to. Optionally, you can select cluster-wide policies to enforce by default as well as specifying a custom installation profile in case you want to change certain Istio installation parameters.
  • Cost Management: Toggling the enable button here enables cost management to enforce chargeback rules and get visibility into overall cost metrics and usage on a given cluster.


Adding customized add-ons (Optional)

  • Select custom addons and version of the addons

Create Blueprint

Enabling Managed System Add-Ons and Fleet Configuration (Optional)

  • Enable/disable managed system addons from the default blueprint (i.e. Ingress Controller).
  • Select the required Kube API Proxy Network from the Private KubeAPI Proxy drop-down.
  • Add the required Fleet Values.
  • Enable Auto Update Clusters if any changes to the blueprint should automatically be applied to the selected fleet(s) of cluster(s).
  • Click Save Changes.

Below is an example of a golden blueprint called "demo-golden-blueprint"

New Version

Step 3: Saving Changes

  • Click save changes to save the configuration.

View Versions

The entire history of blueprint versions is maintained on the Controller. Admins can view details about the versions of cluster blueprints using the eye icon

Use the enable/disable icon to turn on the required golden blueprint version(s) to list out during the cluster provisioning. This option helps to disallow the users from using blueprint versions that might contain vulnerable/deprecated Add-On versions

View All Versions

Disabling affects the clusters using this specific blueprint version. Click Yes to proceed

View All Versions

Once a version is disabled, the cluster deployed with that specific BP version is highlighted in red with an Update button. Use this button to update with the required blueprint and version

View All Versions

View All Cluster Blueprints

Admins can view all custom cluster blueprints.

  • Navigate to the Project
  • Click on Blueprints under Infrastructure

This will display both the "default blueprints" and any custom/golden cluster blueprints that have been created.

Below is an illustrative example of custom and golden blueprint(s). The Type column shows the type of the custom BP, either custom (or) golden

View Cluster Blueprints

Apply Custom/Golden Blueprint

Once a golden cluster blueprint has been created and published, it can either be used as the base blueprint for Custom BPs or applied directly during the initial provisioning of clusters or to existing clusters.

New Clusters

While creating a new cluster, select the golden blueprint from the dropdown. An illustrative example is shown below.

Blueprint for New Cluster

Existing Clusters

  • Click on options (gear icon on the far right) for an existing cluster
  • Select "Update Blueprint" from the options
  • Select the "blueprint" and "version" from the dropdown
  • Click Save and Publish

Blueprint for Existing Cluster

This will update the cluster blueprint on the target cluster. Once all the required resources are operational on the cluster, the blueprint update/sync will be complete.

Nodes Architecture

To use the golden blueprint on ARM64 based clusters, the below criteria must be met:

  1. Uncheck the managed addons that are selected by default on creating a golden blueprint with a minimal blueprint as base
  2. When creating a custom blueprint with a golden blueprint as base, create a golden blueprint as mentioned in point 1 and uncheck the managed addons selected by default for custom blueprint

Customizations are not allowed. Provisioning fails if you enable any customizations or deploy other blueprints (other than minimal) on ARM64 based clusters

Below is an illustrative example of a failed scenario

Blueprint for Existing Cluster