Professional Documents
Culture Documents
https://university.dynatrace.com/environments
Welcome to Dynatrace
*If you have trouble accessing your environment, please inform the
instructor and email dtu.help@dynatrace.com.
Please include the class name you are attending.
Connecting to your Application Server
Option 1: Native SSH, Putty, MobaXTerm
• Please see download links in slide notes.
• ssh ubuntu@[IP_address]
• You will be prompted for a password. Password = dyn@trac3
confidential
Mobile Browser Optimize customer
Application Synthetic experience
Code Server
Modernize
Database Mainframe operations
Network Log & Events Accelerate
Container API innovation
Micro-service Cloud
SaaS
SaaS Managed
On Premises
We provide
We provide theservice,
the service, you
youjust useuse
just it. it. You provideWe provide
the the software,
platform, you run it.
we manage the service.
• No local installation
Benefits Benefits
• Full
• No local installation control of data
• Full control of data
• No worries about hardware
• No worries about hardware • Self monitoring built-in
provisioning backups
provisioning backups and
and data data
storage
• No monitoring/operator needed • No worries about
Concerns
storage • System administrators
patching, upgrading, need to
• No monitoring/operator needed
Concerns support it: troubleshooting, patching,
• Compliance
troubleshooting,
upgrading, backup, monitoring,
Concerns
• Bandwidth consumption
• Compliance
monitoring
failover or failover
• Bandwidth consumption
Dynatrace SaaS
confidential
optional
SaaS Cluster
Availability Zone
Availability Zone
Availability Zone
Storage and Retention - SaaS
confidential
Dynatrace Mission Control
• Outbound Only
• Encrypted and Secured
optional • Specific Endpoint
• Fully automated, no human intervention
Dynatrace node 1
Dynatrace OneAgents
Dynatrace node 2
Dynatrace node n
Easy Touch UI Management Console
Dynatrace
Mission
Control
Dynatrace Update
Dynatrace cluster
Dynatrace Mission Control Team
v+1 t be at
a r
He
Target Applications
443 https
443 https
Mission Control
(possible via proxy)
Clusters should have equally sized nodes, recommended cluster sizes are 1, 3 or more, up to 10
Examples:
To monitor 8k hosts with a peak load of 3k user actions per second:
You need 3 XLarge nodes with a combined storage of 4TB for direct storage and 30TB for long term metrics
To monitor 200 hosts with a peak load of 500 user actions per second:
You need 1 Medium node with a combined storage of 1TB for direct storage and 2.5TB for long term metrics
or to have failover you can also use 3 Small nodes
confidential
Overview
SaaS Private
Security Gateways
Public
Managed
Private
443
DC Customer 2
Server Cluster
On Prem Agents
Server Cluster
Tenant 1
Server Cluster
9999
Security Security
Gateway Gateway
Server Nodes
443 https (German Datacenter)
Scale
Web UI
Private
SaaS
9999
confidential
One Agent to monitor them all
Capabilities of the Dynatrace OneAgent
• Host monitoring
• Process monitoring
• Network monitoring
• Log file monitoring*
• Application monitoring for Java, .NET, PHP on Linux and Node.js*
• Web Server monitoring for Apache, IIS and Nginx*
• Plugin execution*
confidential
Why network monitoring?
Host
Network
Processes
Plugins
Logs
These are necessary for horizontal topology, correlating network agent data with processes and process type recognition.
• Agent for Network needs root rights for
• Initially opening raw socket to capture network traffic. After initialization the root rights can be dropped.
Summary – Dynatrace Architecture
• SaaS vs Managed
• Secure Gateways
• What they do
• Where they go
• OneAgent
• Capabilities
• Network monitoring
• SmartScape
• “Agentless”
• Customer adds JS tag on his own – no Dynatrace
agent needed
• Correlation of server side web requests is not possible
• JS tag (code) defines the application
• Three JS tag modes:
• Bootstrap (easy monitoring)
• Normal (easy monitoring turned off)
• Inline
• “Full Stack”
• HTML is delivered via a Dynatrace agent monitored
server
• JS tag is auto injected by the Dynatrace agent
(manual injection still possible)
• Correlation of server side web requests
• Application rules and injection rules can be applied
htmlhtml
+ injected js tag
data:
getpurePath,
config
// metrics,
and inject
user
js
manual cdn.dynatrace.com/ actions
tag
added JS tag jstag/ JS library
n
atio
unic
Beacon
mm
t co
Beacon CORS
agen
Beacon CORS
web server Beacon Forwarder
*.live.dynatrace.com/bf
*.live.dynatrace.com
Agentless Agent based
Dynatrace infrastructure
• JS-Tag options
• Application:
• Default application:
• “catches all application” for start and for all user actions not matching to an existing application rule
• the default application can’t be deleted
• turning off RUM for the default application deactivates the injection for all html pages not belonging to other applications
confidential
Starter Settings (1/4)
• Naming rules
• Custom names for certain
patterns (also Regex)
• Extraction rules
• Naming by extracting parts
of URL, Page title, Action
name, Page path, Content of
meta tag
• Architecture
• Live-Demo
• Settings
• Key-Differentiators
• Outlook
• Summary
confidential
Synthetic Control System
Location: Paris BF BF
Chrome
Chrome
VUC Chrome
Chrome
Chrome Send beacon signals
VUC Chrome
Prepare Chrome
Execute Script,
adjust JS-Tag if found
Confidential, Dynatrace, LLC
Webcheck– Good-to-knows
• VU Controller
• 13 production locations
• Script caching
• Node monitored by Dynatrace
• KPI - 20 or more concurrent browser executions
• VU Player
• Chrome based
• JS agent management – replace RUM tag, inject more in-depth synthetic tag
• “Login-Sense” like capability to traverse the login by locating form fields and auto-filling
• Screen Capture
• Managed
• Cluster is using the Domain/IP of the configured Public SG
• https://mypublicsecurity.gateway.org.com:9999/bf
SaaS
Cluster Synthetic
Control
confidential
Webcheck - Setup
• Device Profile
• Type
• Size
• Bandwidth
• LoginSense setup
• Number of executions
confidential
Simple Availability & Complex Clickpath Checks