<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Resolving common Kubernetes security concerns in Troubleshooting</title>
    <link>https://community.dynatrace.com/t5/Troubleshooting/Resolving-common-Kubernetes-security-concerns/ta-p/263927</link>
    <description>&lt;H1 id="toc-hId-1846732846"&gt;&lt;STRONG&gt;Self Service Summary&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;This article of type Full-Self-Service gives an overview about Kubernetes monitoring modes and helps with known false positive scan results for Dynatrace on Kubernetes.&lt;/P&gt;
&lt;TABLE class=" lia-align-center" style="width: 100%;"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Issues&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Solution&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Alternatives&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="381.354px"&gt;
&lt;P&gt;&lt;SPAN&gt;You'd like to understand the architecture of supported Kubernetes monitoring options.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Your security team or scanner is reporting Kubernetes security control violations.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="261.632px"&gt;
&lt;P&gt;Check below [1] deployment methods including architecture diagrams and [2] security requirements.&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="158.889px"&gt;
&lt;P&gt;&lt;A href="https://community.dynatrace.com/t5/Troubleshooting/Report-a-security-vulnerability/ta-p/195675" target="_blank" rel="noopener"&gt;Report a security vulnerability&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Start a chat with Dynatrace Customer Success for&amp;nbsp;installation questions&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 id="toc-hId--705424115"&gt;[1] Monitoring modes&lt;/H1&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Full Kubernetes Observability (recommended)&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Features:&lt;/STRONG&gt; Immediate insights into Kubernetes health (see Kubernetes Observability below) and out-of-the-box distributed tracing and analytics for workloads (see Application Observability below).&lt;/P&gt;
&lt;H3&gt;Deployment options&lt;/H3&gt;
&lt;UL class="rup8ap0 _16276mt0 list"&gt;
&lt;LI class="_16276mt1"&gt;&lt;SPAN class="sc-e3fdf106-0 hJpmNl artemis-tag" data-testid="tag"&gt;&lt;STRONG&gt;Recommended:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Deploy Dynatrace Operator in cloud native full stack mode to Kubernetes" href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/cloud-native-fullstack" target="_blank" rel="noopener"&gt;Deploy Dynatrace Operator in cloud native full stack mode&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Architecture:&lt;/STRONG&gt;&amp;nbsp;&lt;A href="https://dt-cdn.net/images/screenshot-2024-01-31-at-2-40-02-pm-2352-4cba84df51.png" target="_self"&gt;Cloud native full-stack injection&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI class="_16276mt1"&gt;Other:&amp;nbsp;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Deploy Dynatrace Operator in classic full stack mode to Kubernetes" href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/classic-full-stack" target="_blank" rel="noopener"&gt;Deploy Dynatrace Operator in classic full stack mode&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Limitation&lt;/STRONG&gt;: There’s a startup dependency between the container in which OneAgent is deployed and application containers to be instrumented (for example, containers that have deep process monitoring enabled). The OneAgent container must be started and the oneagenthelper process must be running before the application container is launched so that the application can be properly instrumented.&lt;/LI&gt;
&lt;LI class="_16276mt1"&gt;&lt;STRONG&gt;&lt;SPAN class="sc-e3fdf106-0 chYRfl artemis-tag" data-testid="tag"&gt;Deprecated:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Deploy, update, and uninstall OneAgent DaemonSet on Kubernetes." href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/other/oneagent-daemonset" target="_blank" rel="noopener"&gt;Manual OneAgent rollout via Daemonset&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(not based on Dynatrace Operator)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Kubernetes Observability&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Features:&lt;/STRONG&gt; Understand and troubleshoot the health of your cluster including dashboards, root-causes analysis with DAVIS Causal AI, alerting, resource optimization, and log analytics.&lt;/P&gt;
&lt;H3&gt;Deployment&lt;/H3&gt;
&lt;P&gt;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Deploy Dynatrace Operator for Kubernetes Platform Monitoring." href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/platform-observability" target="_blank" rel="noopener"&gt;Deploy Dynatrace Operator for Kubernetes observability&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Architecture:&lt;/STRONG&gt;&amp;nbsp;&lt;A href="https://dt-cdn.net/images/screenshot-2024-01-31-at-3-22-25-pm-2348-59be4489a6.png" target="_self"&gt;Kubernetes Platform Monitoring&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Application Observability&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Features:&lt;/STRONG&gt; Automated distributed tracing and code-level visibility including memory, thread and process metrics, application logs, user sessions for web and mobile, vulnerability detection.&lt;/P&gt;
&lt;H3&gt;Deployment options&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;&lt;STRONG&gt;Recommended:&amp;nbsp;&lt;/STRONG&gt;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Deploy Dynatrace Operator in application monitoring mode to Kubernetes" href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/app-observability-automated" target="_blank" rel="noopener"&gt;Deploy Dynatrace Operator in application monitoring mode&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Architecture:&lt;/STRONG&gt;&amp;nbsp;&lt;A href="https://dt-cdn.net/images/screenshot-2024-01-31-at-3-23-56-pm-2358-6db693bc75.png" target="_self"&gt;Automatic injection&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;Other
&lt;UL&gt;
&lt;LI class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;Deployment:&amp;nbsp;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Inject OneAgent code modules into a container during its deployment." href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/other/pod-runtime" target="_blank" rel="noopener"&gt;Pod-runtime injection&lt;/A&gt;&lt;BR /&gt;Architecture:&amp;nbsp;&lt;A href="https://dt-cdn.net/images/podruntime-891-f7ca7624de.png" target="_self"&gt;Pod-runtime injection&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;Deployment:&amp;nbsp;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Inject OneAgent code modules into a container during the build process for every new pod deployment." href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/other/container-buildtime" target="_blank" rel="noopener"&gt;Build-time injection&lt;/A&gt;&lt;BR /&gt;Architecture:&amp;nbsp;&lt;A href="https://dt-cdn.net/images/buildtimeinjection-891-1c5525cb55.png" target="_self"&gt;Container build-time injection&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="oneagent-on-docker-host" class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;Alternative&lt;/H2&gt;
&lt;H3 class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;Deploy OneAgent on Docker host&lt;/H3&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;Alternatively, you can also deploy OneAgent on the Docker host on Linux. In this scenario, OneAgent does not run in a container but directly on the host, so there is no Linux namespace isolation. For more information, see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Learn how to install OneAgent on Linux, how to customize installation, and more." href="https://docs.dynatrace.com/docs/ingest-from/dynatrace-oneagent/installation-and-operation/linux" target="_blank" rel="noopener"&gt;OneAgent on Linux&lt;/A&gt;.&lt;/P&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;&lt;STRONG&gt;Architecture&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://dt-cdn.net/images/image-20240612-113305-1637-c57403b85c.png" target="_self"&gt;Host monitoring&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;[2] Security controls&lt;/H1&gt;
&lt;H3&gt;Issue&lt;/H3&gt;
&lt;P&gt;Customer reported Kubernetes security control &lt;STRONG&gt;violations&lt;/STRONG&gt; and vulnerabilities include:&lt;/P&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;Running containers as root user should be avoided&lt;/LI&gt;
&lt;LI&gt;Least privileged Linux capabilities should be enforced for containers&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Immutable (read-only) root filesystem should be enforced for containers&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Kubernetes clusters should not grant CAPSYSADMIN security capabilities&lt;/LI&gt;
&lt;LI&gt;Containers should only use allowed AppArmor profiles&lt;/LI&gt;
&lt;LI&gt;Kubernetes clusters should disable automounting API credentials&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Solution&lt;/H3&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;Dynatrace Full-Stack Monitoring for container platforms from the application down to the infrastructure layer requires elevated privileges to get container-level metrics and perform deep-code host monitoring, including OneAgent injection into processes. The above scan results can be considered as &lt;STRONG&gt;false positives&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;Security requirements:&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;Security controls implications to understand false positives:&amp;nbsp;&lt;A href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/reference/security#cis-benchmark" target="_blank" rel="noopener"&gt;https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/reference/security#cis-benchmark&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Required permissions:&amp;nbsp;&lt;A href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/reference/security#permission-list" target="_blank" rel="noopener"&gt;https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/reference/security#permission-list&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;However, if you don't want to grant elevated privileges to OneAgent, or you don't have access to the infrastructure layer, you can go with application-only monitoring.&lt;/P&gt;</description>
    <pubDate>Tue, 21 Oct 2025 16:18:17 GMT</pubDate>
    <dc:creator>stefanie_pachne</dc:creator>
    <dc:date>2025-10-21T16:18:17Z</dc:date>
    <item>
      <title>Resolving common Kubernetes security concerns</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/Resolving-common-Kubernetes-security-concerns/ta-p/263927</link>
      <description>&lt;H1 id="toc-hId-1846732846"&gt;&lt;STRONG&gt;Self Service Summary&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;This article of type Full-Self-Service gives an overview about Kubernetes monitoring modes and helps with known false positive scan results for Dynatrace on Kubernetes.&lt;/P&gt;
&lt;TABLE class=" lia-align-center" style="width: 100%;"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Issues&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Solution&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Alternatives&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="381.354px"&gt;
&lt;P&gt;&lt;SPAN&gt;You'd like to understand the architecture of supported Kubernetes monitoring options.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Your security team or scanner is reporting Kubernetes security control violations.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="261.632px"&gt;
&lt;P&gt;Check below [1] deployment methods including architecture diagrams and [2] security requirements.&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="158.889px"&gt;
&lt;P&gt;&lt;A href="https://community.dynatrace.com/t5/Troubleshooting/Report-a-security-vulnerability/ta-p/195675" target="_blank" rel="noopener"&gt;Report a security vulnerability&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Start a chat with Dynatrace Customer Success for&amp;nbsp;installation questions&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 id="toc-hId--705424115"&gt;[1] Monitoring modes&lt;/H1&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Full Kubernetes Observability (recommended)&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Features:&lt;/STRONG&gt; Immediate insights into Kubernetes health (see Kubernetes Observability below) and out-of-the-box distributed tracing and analytics for workloads (see Application Observability below).&lt;/P&gt;
&lt;H3&gt;Deployment options&lt;/H3&gt;
&lt;UL class="rup8ap0 _16276mt0 list"&gt;
&lt;LI class="_16276mt1"&gt;&lt;SPAN class="sc-e3fdf106-0 hJpmNl artemis-tag" data-testid="tag"&gt;&lt;STRONG&gt;Recommended:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Deploy Dynatrace Operator in cloud native full stack mode to Kubernetes" href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/cloud-native-fullstack" target="_blank" rel="noopener"&gt;Deploy Dynatrace Operator in cloud native full stack mode&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Architecture:&lt;/STRONG&gt;&amp;nbsp;&lt;A href="https://dt-cdn.net/images/screenshot-2024-01-31-at-2-40-02-pm-2352-4cba84df51.png" target="_self"&gt;Cloud native full-stack injection&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI class="_16276mt1"&gt;Other:&amp;nbsp;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Deploy Dynatrace Operator in classic full stack mode to Kubernetes" href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/classic-full-stack" target="_blank" rel="noopener"&gt;Deploy Dynatrace Operator in classic full stack mode&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Limitation&lt;/STRONG&gt;: There’s a startup dependency between the container in which OneAgent is deployed and application containers to be instrumented (for example, containers that have deep process monitoring enabled). The OneAgent container must be started and the oneagenthelper process must be running before the application container is launched so that the application can be properly instrumented.&lt;/LI&gt;
&lt;LI class="_16276mt1"&gt;&lt;STRONG&gt;&lt;SPAN class="sc-e3fdf106-0 chYRfl artemis-tag" data-testid="tag"&gt;Deprecated:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Deploy, update, and uninstall OneAgent DaemonSet on Kubernetes." href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/other/oneagent-daemonset" target="_blank" rel="noopener"&gt;Manual OneAgent rollout via Daemonset&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(not based on Dynatrace Operator)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Kubernetes Observability&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Features:&lt;/STRONG&gt; Understand and troubleshoot the health of your cluster including dashboards, root-causes analysis with DAVIS Causal AI, alerting, resource optimization, and log analytics.&lt;/P&gt;
&lt;H3&gt;Deployment&lt;/H3&gt;
&lt;P&gt;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Deploy Dynatrace Operator for Kubernetes Platform Monitoring." href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/platform-observability" target="_blank" rel="noopener"&gt;Deploy Dynatrace Operator for Kubernetes observability&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Architecture:&lt;/STRONG&gt;&amp;nbsp;&lt;A href="https://dt-cdn.net/images/screenshot-2024-01-31-at-3-22-25-pm-2348-59be4489a6.png" target="_self"&gt;Kubernetes Platform Monitoring&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Application Observability&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Features:&lt;/STRONG&gt; Automated distributed tracing and code-level visibility including memory, thread and process metrics, application logs, user sessions for web and mobile, vulnerability detection.&lt;/P&gt;
&lt;H3&gt;Deployment options&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;&lt;STRONG&gt;Recommended:&amp;nbsp;&lt;/STRONG&gt;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Deploy Dynatrace Operator in application monitoring mode to Kubernetes" href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/app-observability-automated" target="_blank" rel="noopener"&gt;Deploy Dynatrace Operator in application monitoring mode&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Architecture:&lt;/STRONG&gt;&amp;nbsp;&lt;A href="https://dt-cdn.net/images/screenshot-2024-01-31-at-3-23-56-pm-2358-6db693bc75.png" target="_self"&gt;Automatic injection&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;Other
&lt;UL&gt;
&lt;LI class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;Deployment:&amp;nbsp;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Inject OneAgent code modules into a container during its deployment." href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/other/pod-runtime" target="_blank" rel="noopener"&gt;Pod-runtime injection&lt;/A&gt;&lt;BR /&gt;Architecture:&amp;nbsp;&lt;A href="https://dt-cdn.net/images/podruntime-891-f7ca7624de.png" target="_self"&gt;Pod-runtime injection&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;Deployment:&amp;nbsp;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Inject OneAgent code modules into a container during the build process for every new pod deployment." href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/installation/other/container-buildtime" target="_blank" rel="noopener"&gt;Build-time injection&lt;/A&gt;&lt;BR /&gt;Architecture:&amp;nbsp;&lt;A href="https://dt-cdn.net/images/buildtimeinjection-891-1c5525cb55.png" target="_self"&gt;Container build-time injection&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="oneagent-on-docker-host" class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;Alternative&lt;/H2&gt;
&lt;H3 class="sc-a5c20416-0 ckIJNp" data-testid="heading"&gt;Deploy OneAgent on Docker host&lt;/H3&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;Alternatively, you can also deploy OneAgent on the Docker host on Linux. In this scenario, OneAgent does not run in a container but directly on the host, so there is no Linux namespace isolation. For more information, see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="z2r50s3 _1iksxp40 sc-5a42a2a6-1 jhIrvr" title="Learn how to install OneAgent on Linux, how to customize installation, and more." href="https://docs.dynatrace.com/docs/ingest-from/dynatrace-oneagent/installation-and-operation/linux" target="_blank" rel="noopener"&gt;OneAgent on Linux&lt;/A&gt;.&lt;/P&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;&lt;STRONG&gt;Architecture&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://dt-cdn.net/images/image-20240612-113305-1637-c57403b85c.png" target="_self"&gt;Host monitoring&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;[2] Security controls&lt;/H1&gt;
&lt;H3&gt;Issue&lt;/H3&gt;
&lt;P&gt;Customer reported Kubernetes security control &lt;STRONG&gt;violations&lt;/STRONG&gt; and vulnerabilities include:&lt;/P&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;Running containers as root user should be avoided&lt;/LI&gt;
&lt;LI&gt;Least privileged Linux capabilities should be enforced for containers&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Immutable (read-only) root filesystem should be enforced for containers&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Kubernetes clusters should not grant CAPSYSADMIN security capabilities&lt;/LI&gt;
&lt;LI&gt;Containers should only use allowed AppArmor profiles&lt;/LI&gt;
&lt;LI&gt;Kubernetes clusters should disable automounting API credentials&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Solution&lt;/H3&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;Dynatrace Full-Stack Monitoring for container platforms from the application down to the infrastructure layer requires elevated privileges to get container-level metrics and perform deep-code host monitoring, including OneAgent injection into processes. The above scan results can be considered as &lt;STRONG&gt;false positives&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;Security requirements:&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;Security controls implications to understand false positives:&amp;nbsp;&lt;A href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/reference/security#cis-benchmark" target="_blank" rel="noopener"&gt;https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/reference/security#cis-benchmark&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Required permissions:&amp;nbsp;&lt;A href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/reference/security#permission-list" target="_blank" rel="noopener"&gt;https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/reference/security#permission-list&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="_487p2n0 da9a8v0 da9a8v2 da9a8v3 da9a8vb sc-4d342da2-0 gywAQE"&gt;However, if you don't want to grant elevated privileges to OneAgent, or you don't have access to the infrastructure layer, you can go with application-only monitoring.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 16:18:17 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/Resolving-common-Kubernetes-security-concerns/ta-p/263927</guid>
      <dc:creator>stefanie_pachne</dc:creator>
      <dc:date>2025-10-21T16:18:17Z</dc:date>
    </item>
  </channel>
</rss>

