Configure security context constraints (OpenShift)
As part of getting started with Kubernetes monitoring, you might want configure security context constraints (SCC) for OpenShift.
Configuring SCC is required for OpenShift for cloudNativeFullStack
and applicationMonitoring
with CSI driver deployments.
Dynatrace Operator needs permission to access the csi
volumes, which are used to provide the necessary binaries to different pods. You must modify existing Security Context Constraints for your applications and make sure to add the csi
volume entry. You can configure other entries according to your environment needs.
Example adding the csi
volume:
apiVersion: security.openshift.io/v1
kind: SecurityContextConstraints
metadata:
name: <custom>
...
volumes:
...
- csi
For more configuration options, see Example security context constraints.