Configure security context constraints (OpenShift)
As part of getting started with Kubernetes monitoring, you might want configure security context constraints (SCC) for OpenShift.
Configuring SCC is required for OpenShift for
applicationMonitoring with CSI driver deployments.
Dynatrace Operator needs permission to access the
csi volumes, which are used to provide the necessary binaries to different pods. You must modify existing Security Context Constraints for your applications and make sure to add the
csi volume entry. You can configure other entries according to your environment needs.
Example adding the
1apiVersion: security.openshift.io/v12kind: SecurityContextConstraints3metadata:4 name: <custom>5...6volumes:7...8- csi
For more configuration options, see Example security context constraints.