<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to handle SCCs with Openshift &amp;lt;4.12 when monitoring using Cloud Native? in Dynatrace tips</title>
    <link>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-handle-SCCs-with-Openshift-lt-4-12-when-monitoring-using/m-p/248281#M1681</link>
    <description>&lt;P&gt;Many customers, interested in &lt;STRONG&gt;&lt;A href="https://docs.dynatrace.com/docs/shortlink/how-it-works-k8s#cloud-native" target="_self"&gt;Cloud Native&lt;/A&gt;&lt;/STRONG&gt; mode, have come down on the hurdle of &lt;EM&gt;SCCs&lt;/EM&gt; in case they had an &lt;STRONG&gt;Openshift&lt;/STRONG&gt; version less than or equal to 4.12.&lt;/P&gt;&lt;P&gt;For those who don't know, but the Dynatrace &lt;A href="https://docs.dynatrace.com/docs/shortlink/openshift-configuration#security-context-constraints-sccs" target="_self"&gt;doc explains it&lt;/A&gt;, in the case of OpenShift it is important to manage &lt;EM&gt;SCCs&lt;/EM&gt;, in particular the coexistence between our &lt;EM&gt;CSI&lt;/EM&gt; module (typical for Cloud Native mode deployment) and the default &lt;EM&gt;SCCs&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cloud Native&lt;/STRONG&gt; mode involves the use of &lt;EM&gt;CSI&lt;/EM&gt; volumes to enable the injection of agents into application pods.&lt;/P&gt;&lt;P&gt;This requires that the &lt;EM&gt;CSI&lt;/EM&gt; module be allowed from an &lt;EM&gt;SCC&lt;/EM&gt; perspective used by the application pods themselves.&lt;/P&gt;&lt;P&gt;If the application pods are using a dedicated service account, this is not a particular problem, it would be sufficient to modify/add a custom &lt;EM&gt;SCC&lt;/EM&gt; to allow the &lt;EM&gt;CSI&lt;/EM&gt; volume to be mounted, &lt;A href="https://docs.dynatrace.com/docs/shortlink/openshift-configuration#code-module-injection-for-application-monitoring" target="_self"&gt;as indicated by our doc&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;The problem emerges when the application pods use a default service account, which in turn use the base SCCs.&lt;BR /&gt;With &lt;STRONG&gt;Openshift&lt;/STRONG&gt; 4.12 or lower, these base &lt;EM&gt;SCCs&lt;/EM&gt; however did not include &lt;EM&gt;CSI &lt;/EM&gt;volume mount among the allowed ("fixed" by &lt;STRONG&gt;OpenShift&lt;/STRONG&gt; 4.13) and RedHat advises against, in order not to lose support, modifying base &lt;EM&gt;SCCs&lt;/EM&gt; (usually the &lt;SPAN&gt;&lt;EM&gt;restricted-v2&lt;/EM&gt;)&lt;/SPAN&gt;&amp;nbsp;to include this permission.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;What then are the possible solutions?&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;I here try to list a few, &lt;U&gt;kindly ask for integration/correction:&lt;/U&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Upgrade &lt;STRONG&gt;OpenShift&lt;/STRONG&gt; to version 4.13 or higher&lt;/LI&gt;&lt;LI&gt;Create a dedicated service account with a custom &lt;EM&gt;SCC&lt;/EM&gt; with the &lt;EM&gt;CSI&lt;/EM&gt; permission. Then add this service account to the application workload (pod, deployment ...) - &lt;A href="https://github.com/Azure/secrets-store-csi-driver-provider-azure/discussions/1062#discussioncomment-7267143" target="_self"&gt;here&lt;/A&gt; is explained.&lt;BR /&gt;Is not suggested to edit the default service account.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;If the application is using a dedicated service account, just bind a custom &lt;EM&gt;SCC&lt;/EM&gt; with &lt;EM&gt;CSI&lt;/EM&gt; enabled or edit an existing used&amp;nbsp;&lt;EM&gt;SCC&lt;/EM&gt;.&lt;/LI&gt;&lt;LI&gt;Use &lt;STRONG&gt;Classic FullStack&lt;/STRONG&gt;.&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Thu, 13 Jun 2024 16:30:34 GMT</pubDate>
    <dc:creator>yanezza</dc:creator>
    <dc:date>2024-06-13T16:30:34Z</dc:date>
    <item>
      <title>How to handle SCCs with Openshift &lt;4.12 when monitoring using Cloud Native?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-handle-SCCs-with-Openshift-lt-4-12-when-monitoring-using/m-p/248281#M1681</link>
      <description>&lt;P&gt;Many customers, interested in &lt;STRONG&gt;&lt;A href="https://docs.dynatrace.com/docs/shortlink/how-it-works-k8s#cloud-native" target="_self"&gt;Cloud Native&lt;/A&gt;&lt;/STRONG&gt; mode, have come down on the hurdle of &lt;EM&gt;SCCs&lt;/EM&gt; in case they had an &lt;STRONG&gt;Openshift&lt;/STRONG&gt; version less than or equal to 4.12.&lt;/P&gt;&lt;P&gt;For those who don't know, but the Dynatrace &lt;A href="https://docs.dynatrace.com/docs/shortlink/openshift-configuration#security-context-constraints-sccs" target="_self"&gt;doc explains it&lt;/A&gt;, in the case of OpenShift it is important to manage &lt;EM&gt;SCCs&lt;/EM&gt;, in particular the coexistence between our &lt;EM&gt;CSI&lt;/EM&gt; module (typical for Cloud Native mode deployment) and the default &lt;EM&gt;SCCs&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cloud Native&lt;/STRONG&gt; mode involves the use of &lt;EM&gt;CSI&lt;/EM&gt; volumes to enable the injection of agents into application pods.&lt;/P&gt;&lt;P&gt;This requires that the &lt;EM&gt;CSI&lt;/EM&gt; module be allowed from an &lt;EM&gt;SCC&lt;/EM&gt; perspective used by the application pods themselves.&lt;/P&gt;&lt;P&gt;If the application pods are using a dedicated service account, this is not a particular problem, it would be sufficient to modify/add a custom &lt;EM&gt;SCC&lt;/EM&gt; to allow the &lt;EM&gt;CSI&lt;/EM&gt; volume to be mounted, &lt;A href="https://docs.dynatrace.com/docs/shortlink/openshift-configuration#code-module-injection-for-application-monitoring" target="_self"&gt;as indicated by our doc&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;The problem emerges when the application pods use a default service account, which in turn use the base SCCs.&lt;BR /&gt;With &lt;STRONG&gt;Openshift&lt;/STRONG&gt; 4.12 or lower, these base &lt;EM&gt;SCCs&lt;/EM&gt; however did not include &lt;EM&gt;CSI &lt;/EM&gt;volume mount among the allowed ("fixed" by &lt;STRONG&gt;OpenShift&lt;/STRONG&gt; 4.13) and RedHat advises against, in order not to lose support, modifying base &lt;EM&gt;SCCs&lt;/EM&gt; (usually the &lt;SPAN&gt;&lt;EM&gt;restricted-v2&lt;/EM&gt;)&lt;/SPAN&gt;&amp;nbsp;to include this permission.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;What then are the possible solutions?&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;I here try to list a few, &lt;U&gt;kindly ask for integration/correction:&lt;/U&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Upgrade &lt;STRONG&gt;OpenShift&lt;/STRONG&gt; to version 4.13 or higher&lt;/LI&gt;&lt;LI&gt;Create a dedicated service account with a custom &lt;EM&gt;SCC&lt;/EM&gt; with the &lt;EM&gt;CSI&lt;/EM&gt; permission. Then add this service account to the application workload (pod, deployment ...) - &lt;A href="https://github.com/Azure/secrets-store-csi-driver-provider-azure/discussions/1062#discussioncomment-7267143" target="_self"&gt;here&lt;/A&gt; is explained.&lt;BR /&gt;Is not suggested to edit the default service account.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;If the application is using a dedicated service account, just bind a custom &lt;EM&gt;SCC&lt;/EM&gt; with &lt;EM&gt;CSI&lt;/EM&gt; enabled or edit an existing used&amp;nbsp;&lt;EM&gt;SCC&lt;/EM&gt;.&lt;/LI&gt;&lt;LI&gt;Use &lt;STRONG&gt;Classic FullStack&lt;/STRONG&gt;.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Thu, 13 Jun 2024 16:30:34 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-handle-SCCs-with-Openshift-lt-4-12-when-monitoring-using/m-p/248281#M1681</guid>
      <dc:creator>yanezza</dc:creator>
      <dc:date>2024-06-13T16:30:34Z</dc:date>
    </item>
  </channel>
</rss>

