• Home
  • Deploy
  • Kubernetes
  • Guides
  • Networking, security and compliance
  • Configure security context constraints (OpenShift)

Configure security context constraints (OpenShift)

As part of getting started with Kubernetes monitoring, you might want configure security context constraints (SCC) for OpenShift.

Configuring SCC is required for OpenShift for cloudNativeFullStack and applicationMonitoring with CSI driver deployments.

Dynatrace Operator needs permission to access the csi volumes, which are used to provide the necessary binaries to different pods. You must modify existing Security Context Constraints for your applications and make sure to add the csi volume entry. You can configure other entries according to your environment needs.

Example adding the csi volume:

yaml
apiVersion: security.openshift.io/v1 kind: SecurityContextConstraints metadata: name: <custom> ... volumes: ... - csi

For more configuration options, see Example security context constraints.