Kubernetes observability relies on components with different purposes, default configurations, and permissions. These different components need permissions to perform and maintain operational function of Dynatrace within your cluster.
While Dynatrace permissions adhere to the principle of least privilege, make sure to secure the dynatrace namespace and limit access to a closed group of administrators and operators.
Purpose: Maintains the lifecycle of Dynatrace components. Replaces OneAgent Operator.
Default configuration: 1-replica-per-cluster
RBAC objects:
dynatrace-operatordynatrace-operatordynatrace-operator| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
nodes | "" | Get/List/Watch | |
namespaces | "" | Get/List/Watch/Update | |
secrets | "" | Create | |
secrets | "" | Get/Update/Delete/List | dynatrace-dynakube-configdynatrace-bootstrapper-configdynatrace-bootstrapper-certsdynatrace-metadata-enrichment-endpointdynatrace-otlp-exporter-configdynatrace-otlp-exporter-certs |
mutatingwebhookconfigurations | admissionregistration.k8s.io | Get/Update | dynatrace-webhook |
validatingwebhookconfigurations | admissionregistration.k8s.io | Get/Update | dynatrace-webhook |
customresourcedefinitions | apiextensions.k8s.io | Get/Update | dynakubes.dynatrace.comedgeconnects.dynatrace.com |
customresourcedefinitions/status | apiextensions.k8s.io | Get/Update | dynakubes.dynatrace.comedgeconnects.dynatrace.com |
securitycontextconstraints | security.openshift.io | Use | privilegednonroot-v2 |
dynatrace permissions| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
dynakubes | dynatrace.com | Get/List/Watch/Update | |
edgeconnects | dynatrace.com | Get/List/Watch/Update | |
dynakubes/finalizers | dynatrace.com | Update | |
edgeconnects/finalizers | dynatrace.com | Update | |
dynakubes/status | dynatrace.com | Update | |
edgeconnects/status | dynatrace.com | Update | |
statefulsets | apps | Get/List/Watch/Create/Update/Delete | |
daemonsets | apps | Get/List/Watch/Create/Update/Delete | |
replicasets | apps | Get/List/Watch/Create/Update/Delete | |
deployments | apps | Get/List/Watch/Create/Update/Delete | |
deployments/finalizers | apps | Update | |
configmaps | "" | Get/List/Watch/Create/Update/Delete | |
pods | "" | Get/List/Watch | |
secrets | "" | Get/List/Watch/Create/Update/Delete | |
events | "" | Create/Get/List/Patch | |
services | "" | Create/Update/Delete/Get/List/Watch | |
serviceentries | networking.istio.io | Get/List/Create/Update/Delete | |
virtualservices | networking.istio.io | Get/List/Create/Update/Delete | |
leases | coordination.k8s.io | Get/Update/Create |
Purposes:
Default configuration: 1-replica-per-cluster, can be scaled
RBAC objects:
dynatrace-webhookdynatrace-webhookdynatrace-webhook| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
namespaces | "" | Get/List/Watch/Update | |
secrets | "" | Create | |
secrets | "" | Get/List/Watch/Update | dynatrace-dynakube-configdynatrace-bootstrapper-configdynatrace-bootstrapper-certsdynatrace-metadata-enrichment-endpointdynatrace-otlp-exporter-configdynatrace-otlp-exporter-certs |
replicationcontrollers | "" | Get | |
replicasets | apps | Get | |
statefulsets | apps | Get | |
daemonsets | apps | Get | |
deployments | apps | Get | |
jobs | batch | Get | |
cronjobs | batch | Get | |
deploymentconfigs | apps.openshift.io | Get | |
securitycontextconstraints | security.openshift.io | Use | privilegednonroot-v2 |
dynatrace permissions| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
events | "" | Create/Patch | |
secrets | "" | Get/List/Watch | |
pods | "" | Get/List/Watch | |
configmaps | "" | Get/List/Watch | |
dynakubes | dynatrace.com | Get/List/Watch |
Purpose:
applicationMonitoring configurations, it provides the necessary OneAgent binary for application monitoring to the pods on each node.hostMonitoring configurations, it provides a writable folder for the OneAgent configurations when a read-only host file system is used.cloudNativeFullStack, it provides both of the above.Default configuration: 1-replica-per-node (deployed via a DaemonSet)
RBAC objects:
dynatrace-oneagent-csi-driverdynatrace-oneagent-csi-driverdynatrace-oneagent-csi-driver| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
securitycontextconstraints | security.openshift.io | Use | privileged |
dynatrace permissions| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
dynakubes | dynatrace.com | Get/List/Watch | |
secrets | "" | Get/List/Watch | |
configmaps | "" | Get/List/Watch | |
dynakubes/finalizers | dynatrace.com | Update | |
jobs | batch | Get/List/Create/Delete/Watch | |
events | "" | Create/Patch |
Purpose: collects cluster and workload metrics, events, and status from the Kubernetes API.
Default configuration: 1-replica-per-cluster, can be scaled
RBAC objects:
dynatrace-kubernetesdynatrace-kubernetes-monitoring
rbac.dynatrace.com/aggregate-to-monitoring: "true"dynatrace-kubernetes-monitoring-default
dynatrace-kubernetes-monitoring, more details can be found in the ClusterRole aggregation documentation| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
nodes | "" | List/Watch/Get | |
pods | "" | List/Watch/Get | |
namespaces | "" | List/Watch/Get | |
replicationcontrollers | "" | List/Watch/Get | |
events | "" | List/Watch/Get | |
resourcequotas | "" | List/Watch/Get | |
pods/proxy | "" | List/Watch/Get | |
nodes/proxy | "" | List/Watch/Get | |
nodes/metrics | "" | List/Watch/Get | |
services | "" | List/Watch/Get | |
persistentvolumeclaims | "" | List/Watch/Get | |
persistentvolumes | "" | List/Watch/Get | |
jobs | batch | List/Watch/Get | |
cronjobs | batch | List/Watch/Get | |
deployments | apps | List/Watch/Get | |
replicasets | apps | List/Watch/Get | |
statefulsets | apps | List/Watch/Get | |
daemonsets | apps | List/Watch/Get | |
deploymentconfigs | apps.openshift.io | List/Watch/Get | |
clusterversions | config.openshift.io | List/Watch/Get | |
dynakubes | dynatrace.com | List/Watch/Get | |
edgeconnects | dynatrace.com | List/Watch/Get | |
customresourcedefinitions | apiextensions.k8s.io | List/Watch/Get | |
ingresses | networking.k8s.io | List/Watch/Get | |
networkpolicies | networking.k8s.io | List/Watch/Get | |
securitycontextconstraints | security.openshift.io | Use | privilegednonroot-v2 |
Purposes: Kubernetes Security Posture Management detects, analyzes, and continuously watches for misconfigurations, security hardening guidelines, and potential compliance violations in Kubernetes.
Default configuration: 1-replica-per-node (deployed via a DaemonSet)
RBAC objects:
dynatrace-node-config-collectordynatrace-kubernetes-monitoring-kspm
dynatrace-kubernetes-monitoring ClusterRole, more details can be found in the ClusterRole aggregation documentation| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
namespaces | "" | Get/List/Watch | |
nodes | "" | Get/List/Watch | |
pods | "" | Get/List/Watch | |
replicationcontrollers | "" | Get/List/Watch | |
serviceaccounts | "" | Get/List/Watch | |
services | "" | Get/List/Watch | |
cronjobs | batch | Get/List/Watch | |
jobs | batch | Get/List/Watch | |
daemonsets | apps | Get/List/Watch | |
deployments | apps | Get/List/Watch | |
replicasets | apps | Get/List/Watch | |
statefulsets | apps | Get/List/Watch | |
networkpolicies | networking.k8s.io | Get/List/Watch | |
clusterrolebindings | rbac.authorization.k8s.io | Get/List/Watch | |
clusterroles | rbac.authorization.k8s.io | Get/List/Watch | |
rolebindings | rbac.authorization.k8s.io | Get/List/Watch | |
roles | rbac.authorization.k8s.io | Get/List/Watch |
Purposes:
Default configuration: 1-replica-per-node (deployed via a DaemonSet)
RBAC objects:
dynatrace-dynakube-oneagentdynatrace-dynakube-oneagentdynatrace-logmonitoringPolicy settings: Allows HostNetwork, HostPID, to use any volume types.
Necessary capabilities: CHOWN, DAC_OVERRIDE, DAC_READ_SEARCH, FOWNER, FSETID, KILL, NET_ADMIN, NET_RAW, SETFCAP, SETGID, SETUID, SYS_ADMIN, SYS_CHROOT, SYS_PTRACE, SYS_RESOURCE
| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
nodes/proxy | "" | Get | |
securitycontextconstraints | security.openshift.io | Use | privileged |
Purposes:
Default configuration: 1-replica-per-node (deployed via a DaemonSet)
RBAC objects:
dynatrace-logmonitoringdynatrace-logmonitoringLog monitoring requires the same cluster-wide permissions as OneAgent.
Purposes:
RBAC objects:
dynatrace-otel-collectordynatrace-telemetry-ingest| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
pods | "" | Get/Watch/List | |
namespaces | "" | Get/Watch/List | |
nodes | "" | Get/Watch/List | |
replicasets | apps | Get/List/Watch | |
securitycontextconstraints | security.openshift.io | Use | privileged |
Purposes:
Default configuration:
The following components are required, regardless of which extensions are used:
1-replica-per-clusterRBAC objects:
Depending on the used extension, the following RBAC objects are required.
dynatrace-extension-controller-prometheusdynatrace-extension-controller-databasedynatrace-extension-controller-prometheusdynatrace-extension-controller-databasedynatrace permissionsPrometheus extension
| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
securitycontextconstraints | security.openshift.io | Use | privileged |
Database extension
| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
pods | "" | List | |
securitycontextconstraints | security.openshift.io | Use | nonroot-v2 |
Purpose:
Default configuration:
replicas-set-in-dynakube (no default, replicas set in the DynaKube)RBAC objects:
dynatrace-otel-collectordynatrace-extensions-prometheus| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
pods | "" | Get/List/Watch | |
namespaces | "" | Get/List/Watch | |
endpoints | "" | Get/List/Watch | |
services | "" | Get/List/Watch | |
nodes | "" | Get/List/Watch | |
nodes/metrics | "" | Get/List/Watch | |
deployments | apps | Get/List/Watch | |
daemonsets | apps | Get/List/Watch | |
replicasets | apps | Get/List/Watch | |
statefulsets | apps | Get/List/Watch | |
securitycontextconstraints | security.openshift.io | Use | privileged |
Purpose:
Default configuration:
replicas-set-in-dynakube (no default, replicas set in the DynaKube)RBAC objects:
dynatrace-sql-ext-execdynatrace-sql-ext-execdynatrace permissions| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
pods | "" | List |
Purposes:
RBAC objects:
dynatrace-operator-supportabilityOpt-out:
rbac.supportability to false.Disabling this feature will make it harder to provide the necessary information when opening support cases regarding Dynatrace Operator.
dynatrace permissions| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
pods/log | "" | Get | |
pods/exec | "" | Create | |
jobs | batch | Get/List |
Purposes:
dynatrace-operator-crd-storage-migration Job for automatic cleanup of removed Dynakube API versions in pre-upgrade Helm hook.RBAC objects:
dynatrace-crd-storage-migrationdynatrace-crd-storage-migrationdynatrace-crd-storage-migrationOpt-in:
crdStorageMigrationJob to false.| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
customresourcedefinitions | apiextensions.k8s.io | Get/Update | dynakubes.dynatrace.comedgeconnects.dynatrace.com |
customresourcedefinitions/status | apiextensions.k8s.io | Get/Update | dynakubes.dynatrace.comedgeconnects.dynatrace.com |
securitycontextconstraints | security.openshift.io | Use | nonroot-v2 |
dynatrace permissions| Resources accessed | API group | APIs used | Resource names |
|---|---|---|---|
dynakubes | dynatrace.com | Get/List/Watch/Update | |
edgeconnects | dynatrace.com | Get/List/Watch/Update |
The following table presents a detailed analysis of the security controls for Kubernetes components: Dynatrace Operator, Dynatrace Operator webhook, and Dynatrace Operator CSI driver. This report is based on:
Standards and abbreviations:
The Standard column references these abbreviations.
Satisfied
Exception (see expand below)
Planned improvement (see expand below)
| Security control | Standard | Operator | Webhook | CSI driver |
|---|---|---|---|---|
| Disallow privileged containers1 | CIS 5.2.2 / PSS Baseline | ![]() | ![]() | ![]() |
| Disallow privilege escalation2 | CIS 5.2.6 / PSS Restricted | ![]() | ![]() | ![]() |
| Disallow containers running as root3 | CIS 5.2.7 / PSS Restricted | ![]() | ![]() | ![]() |
| Limit access to secrets (RBAC) | CIS 5.1.4 | |||
| Disallow use of HostPath volumes4 | CIS 5.2.12 / PSS Baseline | ![]() | ![]() | ![]() |
| Restrict automounting of service account token5 | CIS 5.1.6 | ![]() | ![]() | ![]() |
| Disallow use of too many or insecure capabilities | CIS 5.2.8 / 5.2.9 / 5.2.10 / PSS Restricted | ![]() | ![]() | ![]() |
| Disallow use of HostPorts | CIS 5.2.13 / PSS Baseline | ![]() | ![]() | ![]() |
| Disallow access to host network | CIS 5.2.5 / PSS Baseline | ![]() | ![]() | ![]() |
| Disallow use of host PID | CIS 5.2.3 / PSS Baseline | ![]() | ![]() | ![]() |
| Disallow use of host IPC | CIS 5.2.4 / PSS Baseline | ![]() | ![]() | ![]() |
| Require readOnlyRootFilesystem | Best practice | ![]() | ![]() | ![]() |
| Require resource limits6 | Best practice | ![]() | ![]() | ![]() |
| Demand seccomp (at least default/runtime) | CIS 5.7.2 / PSS Restricted | ![]() | ![]() | ![]() |
| Disallow secrets mounted as env variable | CIS 5.4.1 | ![]() | ![]() | ![]() |
| Restrict sysctls | PSS Baseline | ![]() | ![]() | ![]() |
| Restrict AppArmor | PSS Baseline | ![]() | ![]() | ![]() |
| Disallow SELinux7 | PSS Baseline | ![]() | ![]() | ![]() |
| /proc mount type | PSS Baseline | ![]() | ![]() | ![]() |
CSI driver requires elevated permissions to create and manage mounts on the host system. For more details, see CSI driver privileges.
CSI driver requires elevated permissions to create and manage mounts on the host system. For more details, see CSI driver privileges.
CSI driver communicates with kubelet using a socket on the host, to access this socket the CSI driver needs to run as root.
CSI driver stores/caches the OneAgent binaries on the host's filesystem, in order to do that it needs a hostVolume mount.
Dynatrace Operator, Webhook, and CSI driver components need to communicate with the Kubernetes API.
CSI driver provisioner has no resources limits by default in order to provide the best performance during provisioning; limits can be set via Helm chart values.
CSI driver needs seLinux level s0 for the application pods to see files from the volume created by the CSI driver.
Planned improvement:
Namespace-scoped Roles for the Operator, Webhook, and CSI driver currently allow access to all secrets within their namespace. Improvement planned to restrict these Roles to specific secret names, consistent with ClusterRole configuration.
Satisfied
Exception (see expand below)
Planned improvement (see expand below)
| Security control | Standard | OneAgent | Extensions controller | Dynatrace Collector | ActiveGate | EdgeConnect | KSPM | OneAgent Log Module |
|---|---|---|---|---|---|---|---|---|
| Disallow privileged containers1 | CIS 5.2.2 / PSSB | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Disallow privilege escalation2 | CIS 5.2.6 / PSSR | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Disallow containers running as root3 | CIS 5.2.7 / PSSR | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Disallow use of too many or insecure capabilities4 | CIS 5.2.8 / 5.2.9 / 5.2.10 / PSSR | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Limit access to secrets (RBAC) | CIS 5.1.4 | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Disallow use of HostPath volumes5 | CIS 5.2.12 / PSSB | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Disallow use of HostPorts | CIS 5.2.13 / PSSB | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Disallow access to host network6 | CIS 5.2.5 / PSSB | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Disallow use of host PID7 | CIS 5.2.3 / PSSB | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Disallow use of host IPC | CIS 5.2.4 / PSSB | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Require readOnlyRootFilesystem | Best practice | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Require Resource limits10 | Best practice | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | |
| Demand seccomp to be used (at least default/runtime)8 | CIS 5.7.2 / PSSR | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Disallow Secrets mounted as env variable | CIS 5.4.1 | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | |
| Restrict sysctls | PSSB | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Restrict AppArmor | PSSB | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Disallow SELinux | PSSB | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| Restrict automounting of service account token9 | CIS 5.1.6 | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
| /proc Mount Type | PSSB | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
OneAgent: OneAgent DaemonSet runs with host-level privileges for full-stack visibility (network, processes, file system).
OneAgent Log Module: LogAgent needs to run as privileged container on OCP cluster to access its persistent storage. OCP persistent storage using hostPath.
OneAgent: Required for init containers that instrument processes before startup.
OneAgent Log Module: AllowPrivilegeEscalation is always true when the container is run as privileged. Configure a Security Context for a Pod or Container.
OneAgent: OneAgent DaemonSet runs with host-level privileges for full-stack visibility (network, processes, file system).
KSPM: KSPM mounts the host root filesystem / to perform configuration and security scans; hostPath restriction evaluation is planned.
OneAgent: Requires limited Linux capabilities (for example, NET_RAW) for network observability.
KSPM: KSPM requires specific Linux capabilities to scan and collect system configuration and security data; this is by design and cannot be removed.
OneAgent Log Module: LogAgent needs additional capability to get access to all monitored log files.
OneAgent: OneAgent DaemonSet runs with host-level privileges for full-stack visibility (network, processes, file system).
KSPM: KSPM mounts the host root filesystem / for node-level scanning; improvement under review to restrict mounted paths.
OneAgent Log Module: Needs access to log files on the host's filesystem.
OneAgent: Uses host network namespace to monitor network traffic.
OneAgent: Uses host PID namespace to correlate process metrics.
KSPM: KSPM requires host PID namespace access for the node collector to gather process-level data. This requirement will be documented.
OneAgent: Uses default runtime seccomp profile; explicit setting planned.
ActiveGate: ActiveGate runs with minimal elevated privileges to manage inbound connections.
EdgeConnect: EdgeConnect currently lacks an explicit seccomp profile; addition is planned in future releases. This control is being addressed in upcoming releases.
KSPM: KSPM mounts the host root filesystem / to perform configuration and security scans; hostPath restriction evaluation is planned.
OneAgent Log Module: The seccomp profile can be set via DynaKube in order to run in secure computing mode.
OneAgent, Extensions Controller, Dynatrace Collector, ActiveGate, EdgeConnect, and KSPM components need to communicate with the Kubernetes API.
OneAgent Log Module: The limits are highly dependent on the amount of data processed. Can be set via DynaKube.
Planned improvement:
Disallow Secrets mounted as env variable: Dynatrace Collector currently uses environment variables for tokens; migrating to secret files is planned.
These permissions used to be managed using a PodSecurityPolicy (PSP), but in Kubernetes version 1.25 PSPs will be removed from the following components:
Dynatrace Operator version 0.2.1 is the last version in which PSPs are applied by default, so it's up to you to enforce these rules. As PSP alternatives, you can use other policy enforcement tools such as:
If you choose to use a PSP alternative, be sure to provide the necessary permissions to the Dynatrace components.
Dynatrace Operator version 0.12.0+
Starting with Dynatrace Operator version 0.12.0, the built-in creation of custom security context constraints (SCCs) has been removed for Dynatrace Operator and Dynatrace Operator–managed components. This change was made to reduce complications caused by custom SCCs in unique OpenShift setups.
Despite this update, the components maintain the same permissions and security requirements as before.
The following tables show the SCCs used in different versions of Dynatrace Operator and OpenShift.
| Resources accessed | Custom SCC used in Dynatrace Operator versions earlier than 0.12.0 | SCC in Dynatrace Operator version 0.12.0+ and OpenShift earlier than 4.11 |
|---|---|---|
| Dynatrace Operator | dynatrace-operator | privileged1 |
| Dynatrace Operator Webhook Server | dynatrace-webhook | privileged1 |
| Dynatrace Operator CSI driver | dynatrace-oneagent-csi-driver | privileged1 |
| ActiveGate | dynatrace-activegate | privileged1 |
| OneAgent | dynatrace-dynakube-oneagent-privilegeddynatrace-dynakube-oneagent-unprivileged | privileged1 |
| Resources accessed | Custom SCC used in Dynatrace Operator versions earlier than 0.12.0 | SCC in Dynatrace Operator version 0.12.0+ and OpenShift 4.11+ |
|---|---|---|
| Dynatrace Operator | dynatrace-operator | nonroot-v2 |
| Dynatrace Operator Webhook Server | dynatrace-webhook | nonroot-v2 |
| Dynatrace Operator CSI driver | dynatrace-oneagent-csi-driver | privileged1 |
| ActiveGate | dynatrace-activegate | nonroot-v2 |
| OneAgent | dynatrace-dynakube-oneagent-privilegeddynatrace-dynakube-oneagent-unprivileged | privileged1 |
This SCC is the only built-in OpenShift SCC that allows usage of seccomp, which our components have set by default, and also the usage of CSI volumes.
It is still possible to create your own more permissive or restrictive SCCs that take your specific setup into consideration. You can safely remove the old SCCs that were created by a previous Dynatrace Operator version.
To remove the old SCCs, use the following command:
oc delete scc <scc-name>