To take advantage of the new Kubernetes experience, you can either add new Kubernetes clusters or enable existing Kubernetes clusters for the new experience.
Start monitoring Kubernetes clusters with Dynatrace.
Enable existing clusters that are already monitored with Kubernetes Classic for the new Kubernetes experience.
Kubernetes within your Dynatrace environmentYou can’t access the new Kubernetes experience. You can continue to use Kubernetes Classic pages. We continue to support and innovate the existing product, but we encourage you to switch to the new platform to benefit from the latest platform innovations.
If you are already using DPS, reach out to your Dynatrace representative to add pricing for Kubernetes Platform Monitoring to your rate card. Customers who sign their DPS contract after February 2024 will have this capability included by default on their rate card.
Until further notice, the existing Kubernetes pages (Kubernetes Classic) will still be available and show the data for your Kubernetes clusters.
Kubernetes doesn't require mandatory changes to the rollout. The minimum requirement is an ActiveGate version 1.279 or higher configured with Kubernetes Platform Monitoring ActiveGate capability. If you use Dynatrace Operator with default configurations (no specific ActiveGate image/tag), the ActiveGate is automatically upgraded, so that you don't need to take action.
You can use the onboarding screen in
Kubernetes to onboard new clusters. It will always use the latest Dynatrace Operator.
Kubernetes provides valuable insights for all Kubernetes distibutions supported by Dynatrace. There is no difference in supported distributions between
Kubernetes and Kubernetes Classic.
Kubernetes is optimized for customers with Kubernetes environments ranging up to 12000 pods. This will be increased in future versions of the app.
Users need a set of permissions to read and access relevant data from Grail to use
Kubernetes. You can find more details about required permissions in the reference section.
Clusters monitored with Kubernetes Platform Monitoring will consume your DPS commit based on the Kubernetes Platform Monitoring price (cost per pod-hour) specified on your rate card.
Clusters monitored with Kubernetes Platform Monitoring and Application observability will consume your DPS commit based on the Kubernetes Platform Monitoring price (cost per pod-hour) and container-based Full-Stack price (cost per GiB-hour of used container memory) specified on your rate card.
Clusters monitored with Kubernetes Platform Monitoring and Full-Stack observability will consume your DPS commit based on the host-based Full-Stack price (cost per GiB-hour of host memory) specified on your rate card.
If you deactivate the new Kubernetes experience in the settings of your cluster, consumption of DPS Kubernetes Platform Monitoring will stop.
A top-level workload is the topmost controlling owner of a Pod. Possible top-level workload types are: Deployment, ReplicaSet, StatefulSet, DaemonSet, Job, CronJob, ReplicationController, DeploymentConfig. You can find a list of those workloads in the Top-level workloads menu entry.
ActiveGate version 1.327+
When you first open this view you see a reduced version of the original YAML code as available from the Kubernetes API. When you activate the live mode, you get the full YAML code directly streamed from the Kubernetes API. The reduced version of the YAML code is also available in .json format via DQL in the k8s.object field of the respective Smartscape node.
Labels and annotation are not part of this field, but are stored as tags.
The YAML code is limited to a size of 32 kB. Dynatrace automatically strips less important fields, for example, /metadata/managedFields and kubectl.kubernetes.io/last-applied-configuration annotation.

To gain visibility into ConfigMaps and Secrets, you need to grant additional permissions to ActiveGate, allowing it to access these objects. By default, this functionality is disabled because these objects might contain sensitive data. For Secrets, ActiveGate automatically applies data masking.
For new clusters, deployed with Dynatrace Operator version 1.8.0+, these permissions are automatically set when checking Monitor potentially sensitive data on the Add cluster page.
For existing cluster, deployed with Dynatrace Operator version 1.7.0 and earlier, you need to manually grant these permissions by applying the following YAML with kubectl.
Apply the following YAML with kubectl to enable these objects:
apiVersion: rbac.authorization.k8s.io/v1kind: ClusterRoleBindingmetadata:name: dynatrace-kubernetes-monitoring-sensitiveroleRef:apiGroup: rbac.authorization.k8s.iokind: ClusterRolename: dynatrace-kubernetes-monitoring-sensitivesubjects:- kind: ServiceAccountname: dynatrace-kubernetes-monitoringnamespace: dynatrace---apiVersion: rbac.authorization.k8s.io/v1kind: ClusterRolemetadata:name: dynatrace-kubernetes-monitoring-sensitivelabels:rbac.dynatrace.com/aggregate-to-monitoring: "true"name: dynatrace-kubernetes-monitoring-sensitiverules:- apiGroups:- ""resources:- configmaps- secretsverbs:- list- watch- get
Some environments might have two Explorer tabs inside
Kubernetes. This happens for environments which were created before the transition to Dynatrace's new storage layer, Smartscape on Grail. The second Explorer (Classic) is deprecated and will be shown during the transition phase until June, 2026.