Use the oneagentctl
command-line interface to perform some post-installation OneAgent configuration at the individual host level.
The tool location depends on whether you customized the OneAgent installation using the <INSTALL_PATH>
parameter:
<INSTALL_PATH>/agent/tools
, by default /opt/dynatrace/oneagent/agent/tools
<INSTALL_PATH>/agent/tools
, by default /opt/dynatrace/oneagent/agent/tools
<INSTALL_PATH>\agent\tools
, by default %PROGRAMFILES%\dynatrace\oneagent\agent\tools
oneagentctl
in a non-admin Windows console, Windows will display a User Account Control pop-up and fail.The oneagentctl
command accepts the get
parameter to check the state or value of a setting, and the set
parameter to change a setting. Note that you can use multiple set
parameters in a single command.
When you use the set
parameters, you need to restart OneAgent service to apply changes. You can use the --restart-service
parameter with the command that triggers the restart automatically. In some cases you'll also need to restart monitored applications. You can also use the restart parameter on its own, without other parameters. See an example command below.
./oneagentctl --set-proxy=my-proxy.com --restart-service
.\oneagentctl.exe --set-proxy=my-proxy.com --restart-service
Use the --help
parameter to display all supported parameters.
./oneagentctl --help
.\oneagentctl.exe --help
Use the --version
parameter to display the OneAgent version.
./oneagentctl --version
.\oneagentctl.exe --version
Use the --set-server
parameter to set a OneAgent communication endpoint. Use the IP address or name, combined with the /communication
suffix. Depending on your deployment, it can be a Dynatrace Server, Dynatrace Managed Cluster, or ActiveGate.
Run the following command to adjust OneAgent connection settings:
./oneagentctl --set-server=https://my-server.com:9999/communication --set-tenant=abc123456 --set-tenant-token=abcdefg123456790 --set-proxy=my-proxy.com
.\oneagentctl.exe --set-server=https://my-server.com:9999/communication --set-tenant=abc123456 --set-tenant-token=abcdefg123456790 --set-proxy=my-proxy.com
To define multiple endpoints, separate them by semicolon and add the quotes. For example, --set-server="https://server1;https://server2"
.
These parameters require restart of OneAgent, as well as restart of all the applications monitored with deep code modules. Add --restart-service
to the command to restart OneAgent automatically (version 1.189+) or stop and start OneAgent process manually. For OS-specific instructions, see Linux, Windows, or AIX.
This command will immediately change the OS module connection endpoint, but the code modules won't be able to read the new setting until the next restart.
OneAgent and Dynatrace Cluster automatically maintain a working connection. If an endpoint detail changes, the cluster notifies OneAgent of the change and OneAgent automatically updates the endpoint you set using the --set-server
to the new working value.
Routing OneAgent traffic through an ActiveGate can enhance the security of your data by ensuring it remains within controlled network paths and is encrypted during transmission.
Determine the IP address or hostname of the ActiveGate that will handle traffic.
Set the Communication Endpoint.
Configure OneAgent by specifying the ActiveGate as its new endpoint. For example:
.\oneagentctl.exe --set-server=https://<activegate-endpoint>:9999 --restart-service
Use the --get-server
parameter to display the endpoints that OneAgent is to send the data to. These can be Dynatrace Server, Dynatrace Managed Cluster or ActiveGate.
./oneagentctl --get-server
.\oneagentctl.exe --get-server
Starting with OneAgent version 1.207, endpoints are reported using a format in which endpoints of equal priority are grouped using braces ({...}
) and sorted according to connection priority. An asterisk (*
) indicates the endpoint to which OneAgent currently sends the data. Endpoints are separated by a semicolon (;
).
For example:
{https://endpoint1.com/communication;https:/10.0.0.0/communication;*https://endpoint3.com/communication}{https://endpoint4.com:9999/communication}
Use the --set-tenant
parameter to set an environment ID. By default, this is already set to the correct value. If you're selling Dynatrace-based services, use this option to set your customers' IDs from the pool of IDs you purchased from Dynatrace.
./oneagentctl --set-tenant=abc123456
.\oneagentctl.exe --set-tenant=abc123456
Always use in combination with --set-tenant-token
, which defines the tenant token for internal authentication.
The Dynatrace environment ID you received with your activation email.
Use the --get-tenant
parameter to display the environment ID:
./oneagentctl --get-tenant
.\oneagentctl.exe --get-tenant
Use the --set-tenant-token
parameter to set the tenant token, which is used to authenticate communication with the defined endpoint. Always use in combination with --set-tenant
.
./oneagentctl --set-tenant-token=abcdefg123456790
.\oneagentctl.exe --set-tenant-token=abcdefg123456790
Use the --get-tenant-token
parameter to display the currently defined token:
./oneagentctl --get-tenant-token
.\oneagentctl.exe --get-tenant-token
Use the --set-proxy
parameter to set a proxy server:
./oneagentctl --set-proxy=my-proxy.com
.\oneagentctl.exe --set-proxy=my-proxy.com
Use the --set-proxy
parameter set to an empty value to clear proxy configuration:
./oneagentctl --set-proxy=
.\oneagentctl.exe --set-proxy=
Restart OneAgent service to apply changes.
Use the --get-proxy
parameter to display the currently defined proxy OneAgent connects through:
./oneagentctl --get-proxy
.\oneagentctl.exe --get-proxy
Use the --set-no-proxy
parameter to exclude certain domains or IP addresses from using the proxy:
./oneagentctl --set-no-proxy=my-proxy.com
.\oneagentctl.exe --set-no-proxy=my-proxy.com
Use the --get-no-proxy
parameter to view the currently configured settings for domains and IP ranges excluded from using the proxy:
./oneagentctl --get-no-proxy
.\oneagentctl.exe --get-no-proxy
OneAgent consists of different processes that communicate via a TCP port with a watchdog. At startup, OneAgent watchdog attempts to open the first available port between port 50000 and 50100. In some cases you may need this port for your own applications that are started after OneAgent.
Use the --get-watchdog-portrange
parameter to check the current port range defined for the watchdog.
./oneagentctl --get-watchdog-portrange
.\oneagentctl.exe --get-watchdog-portrange
deprecated
Starting with OneAgent version 1.301, OneAgent doesn't use the TCP ports for its own inter-process communication. In case OneAgent occupies your applications' ports, upgrade OneAgent to version 1.301+.
Watchdog is a binary used for starting and monitoring OneAgent monitoring processes:
oneagentos
—operating system monitoringoneagentplugin
—monitoring using OneAgent extensionsoneagentextensions
—monitoring using local Extensions 2.0oneagentloganalytics
—Log Monitoringoneagentnetwork
—network monitoring Use the --set-watchdog-portrange=arg
parameter to change the watchdog listening port range to <arg>
. The <arg>
must contain two port numbers separated by a colon (:
). For example 50000:50100
. The maximum supported port range is from 1024 to 65535. The port range must cover at least 4 ports. The port number starting the range must be lower.
./oneagentctl --set-watchdog-portrange=50000:50100
.\oneagentctl.exe --set-watchdog-portrange=50000:50100
For more information, see update OneAgent topics for Linux, Windows, and AIX.
Use the get-auto-update-enabled
parameter to check whether OneAgent auto-update is enabled:
./oneagentctl --get-auto-update-enabled
.\oneagentctl.exe --get-auto-update-enabled
Set the --set-auto-update-enabled
parameter to true
or false
to disable or enable OneAgent auto-update:
./oneagentctl --set-auto-update-enabled=true
.\oneagentctl.exe --set-auto-update-enabled=true
After you use this command to disable auto-updates, you won't be able to control OneAgent automatic updates using Dynatrace at Settings > Updates > OneAgent updates.
For more information, see Log Monitoring.
Use the --get-app-log-content-access
parameter to check whether Log Monitoring is enabled:
./oneagentctl --get-app-log-content-access
.\oneagentctl.exe --get-app-log-content-access
Set the --set-app-log-content-access
parameter to true
or false
to disable or enable Log Monitoring:
./oneagentctl --set-app-log-content-access=true
.\oneagentctl.exe --set-app-log-content-access=true
OneAgent version 1.225+
If you don't have access to Dynatrace or you would like to script diagnostic data collection, you can use the oneagentctl
command to collect a subset of the full OneAgent diagnostics data right on the host where OneAgent is installed. With the diagnostic data collected for OneAgent, you can:
The command requires the OneAgent service to be running.
To create a support archive with diagnostic data, run oneagentctl
with the --create-support-archive
parameter. By default, the support archive contains the data for a 7-day time frame and is created in the current working directory. Optionally, you can set a custom directory and timeframe with the directory
and days
parameters. Note that onegentctl
won't create a directory; you must point it to an existing directory with a relative or absolute path. For example:
./oneagentctl --create-support-archive directory=/data/support-archive days=30
.\oneagentctl.exe --create-support-archive directory=C:\data\support-archive days=30
The command saves the archive as the support_archive_agent_YYYY-MM-DD_hhmmss.zip
file. For example:
Creating support archive from last 30 days in C:\data\support-archiveWaiting 30s for archive request to be processedProcessing archive, waiting up to 15m 0sArchive saved as C:\data\support-archive\support_archive_agent_2021-09-07_121619.zip
All the collected diagnostic data is compressed into a support_archive_agent_YYYY-MM-DD_hhmmss.zip
archive that includes the following subset of the full OneAgent diagnostics data:
Folder or file
Description
support_archive
(ZIP)
Contains the local configuration of the OneAgent installed on the host or process where you’ve run the troubleshooting, as well as the OneAgent-related log files.
diagnostic_files
(ZIP)
Contains information about process group detection, auto-injection problems, and OneAgent extension configuration.
OneAgent downloads specific system logs so that Dynatrace can diagnose issues that may be caused by conditions in your environment. The logs are also saved in the support archive. Most often such issues are related to deep monitoring or auto-update installations.
Use the --get-system-logs-access-enabled
parameter to check whether access to system logs is enabled:
./oneagentctl --get-system-logs-access-enabled
.\oneagentctl.exe --get-system-logs-access-enabled
Set the --set-system-logs-access-enabled
parameter to true
or false
to disable or enable access to system logs:
./oneagentctl --set-system-logs-access-enabled=true
.\oneagentctl.exe --set-system-logs-access-enabled=true
Restart OneAgent service to apply changes.Note that the --set-system-logs-access-enabled
and --get-system-logs-access-enabled
parameters refer to a self-diagnostics setting and are not related to Log Monitoring.
Disabling system log access limits our ability to diagnose and solve issues proactively. With access to system logs revoked, you may need to manually provide Dynatrace with the contents of your system logs to help us diagnose issues within your environment.
Dynatrace assigns a unique ID to each host monitored in your environment. Host IDs can be used as parameters in Dynatrace API requests, for example Topology and Smartscape API - Hosts API. The host ID also constitutes the URL of the Host overview page, for example, https://environment.org/#newhosts/hostdetails;id=HOST-6E56EE455C84E232
.
To find a host ID, use the --get-host-id
parameter. For example:
./oneagentctl --get-host-id
.\oneagentctl.exe --get-host-id
Available on all supported platforms for OneAgent version 1.223+. For OneAgent version 1.221 and earlier, this feature is supported only for Citrix Virtual Apps and Desktops.
It's particularly important to keep your host ID static in dynamic virtual environments where hosts are recreated on a daily basis.
To define the source for host ID generation, use --set-host-id-source
and set it to one of the predefined values:
auto
— Let Dynatrace generate the host ID automaticallyip-addresses
— Generate host ID based on the host IP addressmac-addresses
— Generate host ID based on the host's NIC MAC addressfqdn
— Generate host ID based on the host fully qualified domain name (FQDN) in the host.domain
format. If the FQDN doesn't contain a dot character, the NIC MAC address is used instead.ip-addresses;namespace=<namespace>
mac-addresses;namespace=<namespace>
fqdn;namespace=<namespace>
For example, to set the host ID source to ip-addresses
and assign it to a namespace called test
, run oneagentctl
with the following parameter:
./oneagentctl --set-host-id-source="ip-addresses;namespace=test"
.\oneagentctl.exe --set-host-id-source="ip-addresses;namespace=test"
After you change the host ID source, you must restart all your monitored applications and then restart the OneAgent service to create the new host entity in your environment. You can use the --restart-service
parameter with oneagentctl
to restart OneAgent automatically or stop and start OneAgent process manually. For OS-specific instructions, see Linux, Windows, or AIX.
To check the host ID source, use the --get-host-id-source
parameter:
./oneagentctl --get-host-id-source
.\oneagentctl.exe --get-host-id-source
For host ID source set to ip-addresses
and the test
namespace, the command will return the following result:
ip-addresses;namespace=test
For an overview of how to use host groups, see Organize your environment using host groups.
Alternatively, to modify host group assignment centrally from the Dynatrace Cluster, you can use Remote configuration management (select the modify host group action).
Use the --set-host-group
parameter to change the host group assignment.
To assign the host to MyHostGroup
:
./oneagentctl --set-host-group=MyHostGroup
.\oneagentctl.exe --set-host-group=MyHostGroup
Host group string requirements:
dt.
Using --set-host-group
requires restart of OneAgent, as well as restart of all the monitored services. Add --restart-service
to the command to restart OneAgent automatically (version 1.189+) or stop and start OneAgent process manually. For OS-specific instructions, see Linux, Windows, or AIX.
Changing the host group assignments results in recalculation of process group IDs, which impacts data aggregation. To read more about the impact of host group changes on process group detection, see Organize your environment using host groups.
Use the --set-host-group
parameter with an empty value to clear the host group assignment:
./oneagentctl --set-host-group=
.\oneagentctl.exe --set-host-group=
Use the --get-host-group
parameter to display the current host group assignment:
./oneagentctl --get-host-group
.\oneagentctl.exe --get-host-group
Within dynamic or large environments, manual host tagging can be impractical. For dynamic deployments that include frequently changing host instances and names (for example, AWS or MS Azure), you can use dedicated oneagentctl
parameters to apply custom tags, names, and metadata to your hosts.
The oneagentctl
methods listed below allow only for editing the metadata added using oneagentctl
itself or previously using the configuration files. Tags and metadata added using Dynatrace, as well as retrieved from a monitored environment (for example the AWS tags) are not editable with oneagentctl
and won't be displayed using --get-host-tags
and --get-host-properties
parameters.
By default, the oneagentos
process automatically detects cloud environments such as AWS, Azure, and Google Compute Engine. It sends requests to the dedicated Metadata API located at the internal IP address 169.254.169.254
. The OneAgent uses the retrieved metadata to provide additional context about the monitored resources within these environments.
Use the oneagentctl
command-line tool with the --set-host-name
parameter to override an automatically detected host name. A host name must not contain the <
, >
, &
, CR
(carriage return), or LF
(line feed) characters. The maximum length is 256 characters.
This command adds a custom host name to display in the UI, but the detected host name is not changed. For details, see Set custom host names.
To change the host name:
./oneagentctl --set-host-name=myhostname
.\oneagentctl.exe --set-host-name=myhostname
To revert to the auto-detected host name, set the --set-host-name
parameter to an empty value, as in --set-host-name=""
. For example:
./oneagentctl --set-host-name=""
.\oneagentctl.exe --set-host-name=""
The change might not be reflected in the Dynatrace web UI for up to 6 minutes.
Using --set-host-name
requires restart of OneAgent. Add --restart-service
to the command to restart OneAgent automatically (version 1.189+) or stop and start the OneAgent process manually. For OS-specific instructions, see Linux, Windows, or AIX.
To show the host name:
./oneagentctl --get-host-name
.\oneagentctl.exe --get-host-name
Once configured, custom metadata is displayed as a set of properties at the bottom of the Properties and tags section of the host overview page. The property values must not contain an =
character (unless used as a key-value delimiter) or whitespace characters. The maximum length is 256 characters, including the key-value delimiter. The key name must not start with a #
character.
Alternatively, to modify host metadata centrally from the Dynatrace Cluster, you can use Remote configuration management (select the modify host properties action).
For versions earlier than 1.189, use a host metadata configuration file.
To add or change host properties, run the following command:
./oneagentctl --set-host-property=AppName --set-host-property=Environment=Dev
.\oneagentctl.exe --set-host-property=AppName --set-host-property Environment=Dev
You can add or change more than one property in the same command.
To set a security context for your host, use the following command:
./oneagentctl --set-host-property=dt.security_context=easytrade_sec
.\oneagentctl.exe --set-host-property=dt.security_context=easytrade_sec
The dt.security_context
is utilized by multiple features within Dynatrace, such as Log security context and Business events security context.
Additionally, if you're an account administrator looking to grant access to monitored entities based on their security context, see Grant access to entities with security context.
To remove host properties, run the following command:
./oneagentctl --remove-host-property=AppName --remove-host-property=Environment=Dev
.\oneagentctl.exe --remove-host-property=AppName --remove-host-property=Environment=Dev
You can remove more than one property with a single command. If a property key that's passed in the command doesn't exist, a non-zero exit code will be returned, but all the existing properties passed in the command will be removed. After you remove host properties, they remain visible in Dynatrace for up to 7 hours.
To show all properties configured for the host, run the following command:
./oneagentctl --get-host-properties
.\oneagentctl.exe --get-host-properties
After you configure custom host tags, they are displayed at the top of the Properties and tags section of the host overview page. A property value must not contain =
(unless used as a key-value delimiter) or whitespace characters. The maximum length is 256 characters, including the key-value delimiter. A key name must not start with #
.
Alternatively, to modify host tags centrally from the Dynatrace Cluster, you can use Remote configuration management (select the modify host tags action).
To add or change host tags, run the following command:
./oneagentctl --set-host-tag=TestHost --set-host-tag=role=fallback --set-host-tag=Gdansk
.\oneagentctl.exe --set-host-tag=TestHost --set-host-tag=role=fallback --set-host-tag=Gdansk
You can add or change more than one tag in the same command. It is allowed to define tags with the same key but different values.
To remove tags, run the following command:
./oneagentctl --remove-host-tag=role=fallback --remove-host-tag=Gdansk
.\oneagentctl.exe --remove-host-tag=role=fallback --remove-host-tag=Gdansk
You can remove more than one tag with the same command. If a tag passed in the command doesn't exist, a non-zero exit code is returned, but all the existing tags passed in the command are removed. After you remove tags, they remain visible in Dynatrace for up to 6 hours.
To show all tags configured for the host, run the following command:
./oneagentctl --get-host-tags
.\oneagentctl.exe --get-host-tags
Activates one of the OneAgent monitoring modes:
fullstack
: Full-Stack Monitoringinfra-only
: Infrastructure Monitoringdiscovery
: DiscoveryOneAgent version 1.273+ The --set-infra-only
command is now deprecated. Use the --set-monitoring-mode
command instead.
To enable a specific monitoring mode, set the --set-monitoring-mode
parameter to one of the values:
fullstack
infra-only
discovery
For example:
--set-monitoring-mode=infra-only
Use Infrastructure Monitoring mode or Discovery mode in place of Full-Stack Monitoring mode. With this approach, you receive infrastructure health data, with no application or user performance data. For details, see Monitoring modes.
Use the --get-monitoring-mode
parameter to check which monitoring mode is enabled:
./oneagentctl --get-monitoring-mode
.\oneagentctl.exe --get-monitoring-mode
The command returns one of the following:
fullstack
: Full-Stack Monitoring modeinfra-only
: Infrastructure Monitoring modediscovery
: Discovery modeChanging the Infrastructure Monitoring mode requires restart of OneAgent, as well as restart of all monitored services. Add --restart-service
to the command to restart OneAgent automatically (version 1.189+) or stop and start the OneAgent process manually. For OS-specific instructions, see Linux, Windows, or AIX.
OneAgent version 1.213
Automatic OneAgent injection is enabled by default in Infrastructure Monitoring mode. It's required to collect JMX/PMI metrics and to handle Application Security in Infrastructure Monitoring mode.
For more information, see Infrastructure and Discovery monitoring modes.
Use the get-auto-injection-enabled
parameter to check whether OneAgent auto-injection is enabled:
./oneagentctl --get-auto-injection-enabled
.\oneagentctl.exe --get-auto-injection-enabled
Set the --set-auto-injection-enabled
parameter to true
or false
to enable or disable OneAgent auto-injection:
To enable auto-injections:
./oneagentctl --set-auto-injection-enabled=true
.\oneagentctl.exe --set-auto-injection-enabled=true
To disable auto-injections:
./oneagentctl --set-auto-injection-enabled=false
.\oneagentctl.exe --set-auto-injection-enabled=false
For more information, see Disable auto-injection.
Local metric ingestion is currently supported only on Windows and Linux.
You can use the oneagentctl
command to check or change communication ports used for local metric ingestion using the OneAgent metric API, Scripting integration, Telegraf, or DynatraceStatsd. Changing the metric ingestion port requires restart of OneAgent. Add --restart-service
to the command to restart OneAgent automatically.
See Metrics ingestion to learn more.
The default metric ingestion port is 14499
. If necessary, you can use the oneagentctl command to check or change the port. Changing the metric ingestion port requires restart of OneAgent. Add --restart-service
to the command to restart OneAgent automatically.
Use the --get-extensions-ingest-port
parameter to show the current local ingestion port, 14499
by default.
./oneagentctl --get-extensions-ingest-port
.\oneagentctl.exe --get-extensions-ingest-port
Use the --set-extensions-ingest-port=<arg>
parameter to set a custom local ingestion port.
./oneagentctl --set-extensions-ingest-port=14499 --restart-service
.\oneagentctl.exe --set-extensions-ingest-port=14499 --restart-service
Configure your host proxy to allow localhost traffic going to the metric ingestion port, 14499
by default.
The default DynatraceStatsD UDP listening port for the OneAgent listener is 18125
. If necessary, you can use the oneagentctl command to check or change the metric ingestion port. Changing the port requires restart of OneAgent. Add --restart-service
to the command to restart OneAgent automatically.
Use the --get-extensions-statsd-port
parameter to show the current DynatraceStatsd UDP listening port (default = 18125
).
./oneagentctl --get-extensions-statsd-port
.\oneagentctl.exe --get-extensions-statsd-port
Use the --set-extensions-statsd-port=<arg>
parameter to set a custom DynatraceStatsd UDP listening port.
./oneagentctl --set-extensions-statsd-port=18125 --restart-service
.\oneagentctl.exe --set-extensions-statsd-port=18125 --restart-service
The default DynatraceStatsD UDP listening port for a remote listener is 18126
.
To change the default 18126
listening port, modify the StatsdPort
parameter in the ActiveGate extensionsuser.conf
file:
/var/lib/dynatrace/remotepluginmodule/agent/conf/extensionsuser.conf
C:\ProgramData\dynatrace\remotepluginmodule\agent\conf\extensionsuser.conf
:StatsdPort=18126
To learn about network zone naming rules and other reference information, see Network zones.
Alternatively, to modify network zone assignment centrally from the Dynatrace Cluster, you can use Remote configuration management (select the modify network zone action).
Use the --set-network-zone
parameter to instruct OneAgent to communicate via the specified network zone. The name of a network zone is a string of alphanumeric characters. You can also use hyphens (-
), underscores (_
), and a dot (.
) as a seperator. The network zone name must not start with a dot. The length of the string is limited to 256 characters. Network zone names are not case-sensitive. Dynatrace stores these names in lowercase. For more information, see the section on network zone naming
./oneagentctl --set-network-zone=<your.network.zone>
.\oneagentctl.exe --set-network-zone=<your.network.zone>
You can reset the network zone setting by passing an empty network zone name:
./oneagentctl --set-network-zone=""
.\oneagentctl.exe --set-network-zone=""
Use the --get-network-zone
parameter to display the current network zone configuration:
./oneagentctl --get-network-zone
.\oneagentctl.exe --get-network-zone
You can pass the --set-*
parameters at installation time. The configuration parameters are applied right before OneAgent service starts and there's no need to restart it to apply your configuration.
OneAgent version 1.245+
OneAgent uses the FIPS mode to be compliant with the FIPS 140-3 computer security standard.
Use the --get-fips-enabled
to check if OneAgent uses FIPS 140 validated cryptographic algorithms.
On Linux or AIX
./oneagentctl --get-fips-enabled
On Windows
./oneagentctl.exe --get-fips-enabled
Set the --set-fips-enabled
parameter to true
or false
to enable or disable the FIPS 140 validated cryptographic algorithms on OneAgent.
To enable FIPS mode:
./oneagentctl --set-fips-enabled=true
./oneagentctl.exe --set-fips-enabled=true
To disable FIPS mode:
/oneagentctl --set-fips-enabled=false
./oneagentctl.exe --set-fips-enabled=false
If you want to enable FIPS mode for application-only deployment, go to /paas/package/agent
and delete dt_fips_disabled.flag
.
OneAgent version 1.293+
Enabling cap_setuid
for OS Agent is required for GPFS monitoring.
Following parameters are only available in OneAgent non-privileged mode on Linux.
get-osagent-cap-setuid-enabled
set-osagent-cap-setuid-enabled
Use the get-osagent-cap-setuid-enabled
parameter to check whether cap_setuid for OS Agent is enabled:
./oneagentctl --get-osagent-cap-setuid-enabled
Set the --set-osagent-cap-setuid-enabled
parameter to true
or false
to disable or enable cap_setuid for OS Agent:
./oneagentctl --set-osagent-cap-setuid-enabled=true