ActiveGate version 1.333+
agctl is a command-line interface for ActiveGate configuration management. It enables you to configure various ActiveGate settings directly from the command line without manually editing configuration files.
After modifying ActiveGate configuration with agctl, you need to restart ActiveGate for the changes to take effect. See Start/stop/restart ActiveGate.
agctl. See the Access agctl section that follows.On Linux systems, agctl is automatically added to the PATH for easier access. You can run it from any directory.
To execute agctl, you must belong to the ActiveGate service user group. By default, this is the dtuserag group. For details on user configuration, see:
Example: Run agctl
agctl [command] [operation] [parameters]
agctl [command] [operation] [parameters]
Where:
[command]: The specific ActiveGate feature to manage (for example, group, modules, ssl-port)[operation]: The action to perform (for example, set, get, clear, enable, disable)[parameters]: Command-specific parameters| Command | Description |
|---|---|
| help | Display help message |
| group | Manage ActiveGate group configuration |
| incoming-endpoint | Manage reverse proxy for OneAgent configuration |
| modules | Manage modules configuration |
| network-zone | Manage network zone configuration |
| outgoing-endpoint | Manage reverse proxy for ActiveGate configuration |
| properties | Set properties based on provided configuration file |
| property | Manage individual custom properties |
| ssl-certificate | Manage custom SSL certificate configuration |
| ssl-port | Manage HTTPS port configuration |
| support-archive | Create support archive for troubleshooting |
| trust-store | Manage trust store configuration |
| version | Get ActiveGate version |
Display help information for agctl.
agctl help
To get help for a specific command:
agctl [command] help
# Show general helpagctl help# Show help for the group commandagctl group help
Manage the ActiveGate group configuration. Groups allow you to perform bulk actions on your ActiveGates.
For details on ActiveGate groups, see ActiveGate group.
agctl group set <NAME>agctl group set --value=<NAME>agctl group getagctl group clearagctl group help
| Operation | Description |
|---|---|
set | Assign a group name to the ActiveGate |
get | Display the current group name |
clear | Remove the current group name |
help | Show help for the group command |
Required (one of):
<NAME>: Group name provided as a positional argument--value=<NAME>: Group name provided as a named parameter (takes precedence if both are provided)-), underscores (_), and dots (.)# Set group using positional argumentagctl group set my.group# Set group using named parameteragctl group set --value=production.activegate# Get current groupagctl group get# Clear group configurationagctl group clear
Manage reverse proxy configuration for OneAgent traffic. This configures the endpoint URLs that OneAgents use to connect through a reverse proxy.
For details, see Set up reverse proxy for OneAgent.
See also Outgoing endpoint configuration.
agctl incoming-endpoint set <URLS>agctl incoming-endpoint set --value=<URLS>agctl incoming-endpoint getagctl incoming-endpoint clearagctl incoming-endpoint help
| Operation | Description |
|---|---|
set | Configure incoming endpoint URLs |
get | Display current endpoint URLs |
clear | Remove current endpoint URLs |
help | Show help for the incoming-endpoint command |
Required (one of):
<URLS>: Comma-separated list of URLs provided as a positional argument--value=<URLS>: Comma-separated list of URLs provided as a named parameter (takes precedence if both are provided)https://<DOMAIN>:<PORT><DOMAIN> must be a fully qualified domain name (FQDN), IPv4, or IPv6 address<PORT> is optional and defaults to 443/communication path is optional# Set single endpointagctl incoming-endpoint set https://proxy.example.com:443# Set multiple endpointsagctl incoming-endpoint set https://proxy1.example.com:443,https://proxy2.example.com:8443/communication# Set using named parameteragctl incoming-endpoint set --value=https://proxy.example.com/communication# Get current configurationagctl incoming-endpoint get# Clear configurationagctl incoming-endpoint clear
Manage ActiveGate modules configuration. You can enable or disable specific functional modules based on your requirements.
For details on ActiveGate modules, see Configuration properties and parameters.
agctl modules enable <MODULES>agctl modules enable --value=<MODULES>agctl modules disable <MODULES>agctl modules disable --value=<MODULES>agctl modules getagctl modules help
| Operation | Description |
|---|---|
enable | Enable one or more modules |
disable | Disable one or more modules |
get | Display currently enabled modules |
help | Show help for the modules command |
Required (one of):
<MODULES>: Comma-separated list of module names provided as a positional argument--value=<MODULES>: Comma-separated list of module names provided as a named parameter (takes precedence if both are provided)Multiple module names must be separated by commas without spaces.
# Enable multiple modulesagctl modules enable MSGrouter,metrics_ingest# Disable a module using named parameteragctl modules disable --value=synthetic# Get currently enabled modulesagctl modules get
Manage the network zone configuration. Network zones allow you to define routing boundaries for your monitoring infrastructure.
For details on network zones, see Network zones.
agctl network-zone set <NAME>agctl network-zone set --value=<NAME>agctl network-zone getagctl network-zone clearagctl network-zone help
| Operation | Description |
|---|---|
set | Configure a network zone name |
get | Display the current network zone name |
clear | Remove the current network zone name |
help | Show help for the network-zone command |
Required (one of):
<NAME>: Network zone name provided as a positional argument--value=<NAME>: Network zone name provided as a named parameter (takes precedence if both are provided)-), underscores (_), and dots (.)# Set network zone using positional argumentagctl network-zone set my.zone# Set network zone using named parameteragctl network-zone set --value=production.zone# Get current network zoneagctl network-zone get# Clear network zone configurationagctl network-zone clear
Manage reverse proxy configuration for ActiveGate traffic. This configures the endpoint URLs that ActiveGate uses to connect to Dynatrace through a reverse proxy.
For details, see Set up reverse proxy for ActiveGate.
See also Incoming endpoint configuration.
agctl outgoing-endpoint set <URLS>agctl outgoing-endpoint set --value=<URLS>agctl outgoing-endpoint getagctl outgoing-endpoint clearagctl outgoing-endpoint help
| Operation | Description |
|---|---|
set | Configure outgoing endpoint URLs |
get | Display current endpoint URLs |
clear | Remove current endpoint URLs |
help | Show help for the outgoing-endpoint command |
Required (one of):
<URLS>: Comma-separated list of URLs provided as a positional argument--value=<URLS>: Comma-separated list of URLs provided as a named parameter (takes precedence if both are provided)https://<REVERSE_PROXY>:<REVERSE_PROXY_PORT>/communication<REVERSE_PROXY> must be a fully qualified domain name (FQDN), IPv4, or IPv6 address<REVERSE_PROXY_PORT> is optional and defaults to 443/communication path is optional# Set single outgoing endpointagctl outgoing-endpoint set https://proxy.example.com:443# Set multiple endpointsagctl outgoing-endpoint set https://proxy1.example.com:443,https://proxy2.example.com:8443/communication# Set using named parameteragctl outgoing-endpoint set --value=https://proxy.example.com/communication# Get current configurationagctl outgoing-endpoint get# Clear configurationagctl outgoing-endpoint clear
Set multiple properties based on a provided configuration file. This command allows you to apply a complete configuration from a .properties file.
For details on ActiveGate properties, see Configuration properties and parameters.
agctl properties set <PATH>agctl properties set --value=<PATH>agctl properties help
| Operation | Description |
|---|---|
set | Apply configuration from a properties file |
help | Show help for the properties command |
Required (one of):
<PATH>: Path to a .properties file provided as a positional argument--value=<PATH>: Path to a .properties file provided as a named parameter (takes precedence if both are provided).properties extension# Apply configuration from a properties fileagctl properties set myconfig.properties# Apply configuration using absolute pathagctl properties set --value=/home/user/activegate/myconfig.properties
Manage individual custom properties. This command sets, gets, or clears specific properties in the ActiveGate configuration.
For details on configuration sections and properties, see Configuration properties and parameters.
agctl property set --section=<SECTION> --key=<KEY> --value=<VALUE>agctl property get --section=<SECTION> --key=<KEY>agctl property clear --section=<SECTION> --key=<KEY>agctl property help
| Operation | Description |
|---|---|
set | Configure a specific property |
get | Display a specific property value |
clear | Remove a specific property |
help | Show help for the property command |
Required:
--section=<SECTION>: Configuration section name--key=<KEY>: Property key name--value=<VALUE>: Property value to set (multiple values can be comma-separated)Required:
--section=<SECTION>: Configuration section name--key=<KEY>: Property key name# Set a propertyagctl property set --section=collector --key=group --value=my.group# Get a property valueagctl property get --section=collector --key=group# Clear a propertyagctl property clear --section=collector --key=group
Manage custom SSL certificate configuration for ActiveGate. This allows you to configure ActiveGate to use your own SSL certificate.
For details, see Configure custom SSL certificate on ActiveGate.
agctl ssl-certificate set --certificate=<PATH> --key=<PATH> [--pem-password=<STRING>] [--password=<STRING>] [--alias=<STRING>]agctl ssl-certificate getagctl ssl-certificate clearagctl ssl-certificate help
| Operation | Description |
|---|---|
set | Configure a custom SSL certificate |
get | Display current SSL certificate configuration |
clear | Remove current SSL certificate configuration |
help | Show help for the ssl-certificate command |
Required:
--certificate=<PATH>: Path to the certificate file in PEM format--key=<PATH>: Path to the private key file in PEM formatOptional:
--pem-password=<STRING>: Password for the private key (if encrypted)--password=<STRING>: Password to encrypt the keystore (default: randomly generated)--alias=<STRING>: Certificate alias in the keystore (default: 1)# Set SSL certificate with minimum parametersagctl ssl-certificate set --certificate=cert.crt --key=key.pem# Set SSL certificate with all parametersagctl ssl-certificate set --certificate=cert.crt --key=key.pem --pem-password=secret --password=changeit --alias=mycert# Get current SSL certificate configurationagctl ssl-certificate get# Clear SSL certificate configurationagctl ssl-certificate clear
Manage the HTTPS port configuration for ActiveGate. This allows you to change the port that ActiveGate uses for HTTPS communication.
agctl ssl-port set <PORT>agctl ssl-port set --value=<PORT>agctl ssl-port getagctl ssl-port clearagctl ssl-port help
| Operation | Description |
|---|---|
set | Configure the HTTPS port |
get | Display the current HTTPS port |
clear | Remove custom HTTPS port (revert to default) |
help | Show help for the ssl-port command |
Required (one of):
<PORT>: HTTPS port number provided as a positional argument--value=<PORT>: HTTPS port number provided as a named parameter (takes precedence if both are provided)# Set HTTPS port using positional argumentagctl ssl-port set 9999# Set HTTPS port using named parameteragctl ssl-port set --value=8443# Get current HTTPS portagctl ssl-port get# Clear custom port configurationagctl ssl-port clear
Create a support archive for troubleshooting ActiveGate issues. The support archive contains diagnostic data, logs, and configuration information.
See also: Collect diagnostic data with agctl.
agctl support-archive create [--directory=<PATH>] [--days=<NUMBER>] [--modules=<MODULES>] [--stdout]agctl support-archive help
| Operation | Description |
|---|---|
create | Generate a support archive for troubleshooting |
help | Show help for the support-archive command |
All parameters are optional:
--directory=<PATH>: Output directory for the support archive (default: current working directory)--days=<NUMBER>: Number of days of data to collect (default: 30)--modules=<MODULES>: Comma-separated list of modules to include (default: all modules)--stdout: Stream the support archive ZIP to stdout and console logs to stderr# Create support archive with default settingsagctl support-archive create# Create support archive for specific time period and modulesagctl support-archive create --directory=/home/user --days=3 --modules=MSGrouter,metrics_ingest# Create support archive and output to stdout (useful for containers)agctl support-archive create --stdout 1> sa.zip 2> out.txt
For containerized ActiveGate deployments, you can use the --stdout parameter to extract the support archive:
kubectl exec -n <namespace> <pod-name> -- agctl support-archive create --stdout > ag-support-archive.zip
The contents of the support archive are written to stdout, allowing them to be redirected to a ZIP file. Other output is sent to stderr to maintain the integrity of the archive file.
Make sure to use the command prompt (cmd.exe) on Windows; PowerShell isn't supported.
Manage trust store configuration for ActiveGate. The trust store contains trusted root certificates for SSL/TLS connections.
For details, see Configure trusted root certificates on ActiveGate.
agctl trust-store set --certificates=<PATH> [--truststore=<FILE>] [--password=<STRING>]agctl trust-store getagctl trust-store clearagctl trust-store help
| Operation | Description |
|---|---|
set | Configure the trust store |
get | Display current trust store configuration |
clear | Remove current trust store configuration |
help | Show help for the trust-store command |
Required:
--certificates=<PATH>: Path to the chain of certificates in PEM formatOptional:
--truststore=<FILE>: File name to create in the ActiveGate SSL directory (default: mytruststore.p12)--password=<STRING>: Password used for the trust store (default: changeit)# Set trust store with custom filename and passwordagctl trust-store set --certificates=certs.crt --truststore=superstore.p12 --password=changeit# Set trust store with default settingsagctl trust-store set --certificates=certs.crt# Get current trust store configurationagctl trust-store get# Clear trust store configurationagctl trust-store clear
Get the ActiveGate version information.
agctl version getagctl version help
| Operation | Description |
|---|---|
get | Display the current ActiveGate version |
help | Show help for the version command |
# Get ActiveGate versionagctl version get
Remember to restart ActiveGate after making configuration changes for them to take effect.
After installing ActiveGate, you might want to configure multiple settings at once:
# Set ActiveGate groupagctl group set production.activegate# Configure network zoneagctl network-zone set production.zone
To set up ActiveGate behind a reverse proxy:
# Configure outgoing endpoint for ActiveGate to Dynatrace trafficagctl outgoing-endpoint set https://proxy.example.com:443/communication# Configure incoming endpoint for OneAgent to ActiveGate trafficagctl incoming-endpoint set https://proxy.example.com:443/communication
Enable specific modules based on your monitoring needs:
# Enable required modulesagctl modules enable MSGrouter,metrics_ingest# Verify enabled modulesagctl modules get
Configure a custom SSL certificate for ActiveGate:
# Set custom SSL certificateagctl ssl-certificate set --certificate=/path/to/cert.crt --key=/path/to/key.pem --password=mypassword# Verify configurationagctl ssl-certificate get
Create a support archive when experiencing issues:
# Create support archive for the last 7 days and save it to /tmp directoryagctl support-archive create --days=7 --directory=/tmp