19 Nov 2025 02:34 PM
don't see any subject regarding CrowdStrike falcon. did anyone figure out how to allow Dynatrace agent to get proc id after install or updates on Linux agents without creating exclusion to trust agent folder /opt/dynatrace/oneagent/agent/*
For some reason the new installs detect process and then disappear. Official Dynatrace documentation just points to allow agent to read /proc file.
Blocking mutex in the Linux kernel can cause CrowdStrike Falcon to block OneAgent when reading the process data from /proc, which contains one subdirectory per process running on the system.
20 Nov 2025 10:47 AM
Hi @ca6iya
I haven’t encountered this situation myself, but what you describe matches the known behavior where CrowdStrike Falcon interferes with OneAgent’s access to /proc/<pid>.
Instead of excluding the entire OneAgent directory, you could try a more targeted approach:
identify the specific OneAgent binary responsible for process detection (under /opt/dynatrace/oneagent/agent/bin/...) and configure CrowdStrike so that this process is allowed to read /proc without being blocked at the kernel level. This helps limit the scope of the exception.
@ca6iya you might want to try the following procedure:
When processes disappear, trace the OneAgent process (strace -p <oneagent_pid>) to pinpoint which syscall to /proc is being blocked.
In CrowdStrike, create a rule that allows this OneAgent process/module to perform reads on /proc/<pid> rather than opening access to the entire agent directory.
Restart the host and check if process detection remains stable in Dynatrace.
It’s a more fine-grained alternative to a full path exception, and it may help narrow down the source of the issue. Let us know if you manage to test it.
Regards,