Connecting your Cloud Foundry foundations to Dynatrace enables
To connect your foundation with Dynatrace, follow the instructions below.
Start installation
Download the installer
Run the installer
Certificate management
Connect your foundation to Dynatrace
For more information, see Installation.
How you download your installer depends on your setup and needs. You can choose to download an installer directly to the server where you plan to install an ActiveGate or you can download an installer to a different machine and then transfer the installer to the server.
wget
command.An install parameter (determined by the ActiveGate purpose you selected) is automatically set for the command to run the installer. Make sure you use the command displayed in the Dynatrace web UI that reflects the ActiveGate purpose.
Copy the installation script command from the Run the installer with root rights step and paste it into your terminal.
You can add additional parameters to the installation command to customize your installation. For example, to install ActiveGate in a different directory, use the INSTALL=<path>
parameter:
[root@host]# /bin/bash Dynatrace-ActiveGate-Linux-x86-1.0.0.sh INSTALL=/hosted_app/dynatrace
For installation defaults, including default directories, see ActiveGate default settings for Linux.
If you're using self-signed certificates for communication to external APIs, you can either add the certificate to the truststore or disable certificate validation.
Bring in the certificate from your cloud provider.
In the following example, we extract the certificate from google.com
and save it locally as dt_k8s_api.pem
. The command is the same for Windows and Linux, assuming you have openssl
installed on Windows.
echo Q | openssl s_client -connect google.com:443 | openssl x509 -outform PEM > dt_k8s_api.pem
For Kubernetes, you can use the following command sequence to get the certificate:
[root@host]# API_ENDPOINT_URL=$(kubectl config view --minify -o jsonpath='{.clusters[0].cluster.server}')[root@host]# if [[ $API_ENDPOINT_URL =~ (https?://.*):(\d*) ]]; then API_SERVER_PORT=$API_ENDPOINT_URL; else API_SERVER_PORT="$(echo $API_ENDPOINT_URL | sed -e "s/https:\/\///"):443"; fi[root@host]# echo -e "${YLW} API server:${NC} ${API_SERVER_PORT}"[root@host]# echo Q | openssl s_client -connect $API_SERVER_PORT 2>/dev/null | openssl x509 -outform PEM > dt_k8s_api.pem
Add the certificate to the keystore.
You can provide a full path to the pem
file location (including paths to remote locations) using the -file
parameter, or copy the pem
file to your ActiveGate and provide only the filename as indicated in the example.
[root@host]# sudo /opt/dynatrace/gateway/jre/bin/keytool -import -file dt_k8s_api.pem -alias dt_k8s_api -keystore /var/lib/dynatrace/gateway/ssl/mytrusted.jks
If you import multiple certificates, make sure that you provide a unique alias for each certificate that you import. If you use the same alias for each certificate, all previously used certificates will be overwritten.
You can display the list of aliases and the certificate description using the keytool -list
command.
For example:
# sudo /opt/dynatrace/gateway/jre/bin/keytool -list -keystore /var/lib/dynatrace/gateway/ssl/mytrusted.jksEnter keystore password:Keystore type: JKSKeystore provider: SUNYour keystore contains 1 entrydt_k8s_api, Apr 26, 2020,trustedCertEntry,Certificate fingerprint (SHA-256): 07:28:9A:F2:29:32:0D:64:F0:18:93:A1:CC:2E:49:21:E9:DA:40:82:9B:A8:71:B7:A4:2C:6D:8C:B3:90:31:31
Add the following entries in the /var/lib/dynatrace/gateway/config/custom.properties
file.
The entry in the custom.properties
file may look like this:
[collector]trustedstore = mytrusted.jks# the following entries are optionaltrustedstore-password = changeittrustedstore-type = JKS
The password will be stripped and encrypted when you restart the ActiveGate service.
Alternatively, you can add the truststore file containing the Kubernetes CA certificate as an installation parameter. For details, see Trusted root certificates for ActiveGate.
Disabling certificate validation isn't recommended because it imposes security risks. However, if you still want to disable certificate validation for test environments, you need to do the following:
custom.properties
file.We recommend using a Cloud Foundry admin read-only account that can view almost all Cloud Controller API resources, but can't modify them.
uaac user add ReadOnlyUser -p SecretPassword --emails something@example.comuaac member add cloud_controller.admin_read_only ReadOnlyUseruaac member add scim.read ReadOnlyUser
To connect your Cloud Foundry foundation to Dynatrace
In the Dynatrace web UI, go to Settings > Cloud and virtualization > Cloud Foundry.
Select Connect new foundation.
Enter your Cloud Foundry API target URL, your Authentication endpoint, your Cloud Foundry Username, and your Password.
optional Select the ActiveGate group.
For more information about ActiveGate groups, see ActiveGate group.
optional Test your connection.
Select Save changes.
The schemaID for Cloud Foundry is builtin:cloud.cloudfoundry
.