Welcome to Dynatrace Documentation

Learn about Dynatrace and explore resources to enhance your observability and security.

Get to know the new documentation experience.

Dynatrace Documentation

Start by:

  1. Deploying Dynatrace OneAgent, Dynatrace Collector, and ActiveGate on multiple supported platforms to meet your unified observability and security needs.
  2. Migrating to Latest Dynatrace if you are still on Dynatrace Managed.
Deploy Dynatrace

All topics

Select an option
Select an option

Backstage integration

Learn how to integrate Dynatrace into Backstage

  • Tutorial
  • Operate
Open this tutorial

Predict and autoscale Kubernetes workloads

Learn how to scale your Kubernetes workloads proactively before the load increases using Davis AI predictions.

  • Tutorial
  • Operate
Open this tutorial

Test pipeline observability

Utilize Dynatrace to observe and analyze test pipelines effectively

  • Tutorial
  • Develop
Open this tutorial

Analyze AWS CloudTrail logs with Security Investigator

Analyze CloudTrail logs and find potential security issues with Dynatrace.

  • Tutorial
  • Detect
Open this tutorial

Automate and orchestrate security findings

Regularly check for critical container vulnerabilities and get automatic Jira tickets or Slack alerts.

  • Tutorial
  • Protect
Open this tutorial

Detect threats against your AWS Secrets with Security Investigator

Monitor and identify potential threats against your AWS Secrets with Dynatrace.

  • Tutorial
  • Detect
Open this tutorial

Discover coverage gaps in security scans

Unveil blind spots in your Software Development Lifecycle (SDLC).

  • Tutorial
  • Prevent
Open this tutorial

Ingest and process custom security findings

Continuously ingest your container scan findings.

  • Tutorial
  • Prevent
Open this tutorial

Instant Intrusion Response

Triage security incidents in minutes with instant schema-on-read queries.

  • Tutorial
  • Resolve
Open this tutorial

CSPM Notification Automation

Improve cloud security posture by automatically processing, triaging, enriching, and classifying incoming security alerts.

  • Tutorial
  • Protect
Open this tutorial
10
1

Technologies

10
1

Documentation highlights

10
1