If you don't need your OneAgent to run in the full-stack monitoring mode, you can also use one of the two lightweight modes that provide you with the subset of OneAgent metrics, focusing on your host infrastructure:
The table below shows an overview of available monitoring options for each of the monitoring modes.
For more information on Infrastructure Monitoring and Discovery modes for Application Security, see Application Security and monitoring modes.
You can define a default monitoring mode before installing OneAgent. This will change the default Full-Stack monitoring mode on the OneAgent deployment page (for Linux, Windows, and AIX operating systems) and in the Discovery & Coverage app (when deploying OneAgent from the Install OneAgent page).
To define a default monitoring mode
The selected value will be set as a default value for the chosen OneAgent deployment mode.
OneAgent version 1.281+
OneAgent Discovery mode provides basic metrics enabling you to discover your hosts and processes and learn the potential to extend your monitoring.
We recommend that you deploy OneAgent in Full-Stack Monitoring mode to monitor your business-critical applications. Similarly, we recommend that you monitor critical infrastructure, like databases, queues, and messaging systems with Infrastructure Monitoring. OneAgent in Discovery mode can be deployed across the remainder of your infrastructure for full visibility thanks to its relatively low cost.
Discovery mode is available only if you're using the Dynatrace Platform Subscription model. License consumption is via the Foundation & Discovery capability. To learn more, see Host monitoring.
The following built-in metrics are available in Discovery mode:
AIX Entitlement configured
Capacity Entitlement is the number of virtual processors assigned to the AIX partition. It’s measured in fractions of processor equal to 0.1 or 0.01. For more information about entitlement, see [Assigning the appropriate processor entitled capacity](https://dt-url.net/3n234vz) in official IMB documentation.AIX Entitlement used
Percentage of entitlement used. Capacity Entitlement is the number of virtual cores assigned to the AIX partition. See For more information about entitlement, see [Assigning the appropriate processor entitled capacity](https://dt-url.net/3n234vz) in official IMB documentation.CPU idle
Average CPU time, when the CPU didn't have anything to doCPU I/O wait
Percentage of time when CPU was idle during which the system had an outstanding I/O request. It is not available on Windows.System load
The average number of processes that are being executed by CPU or waiting to be executed by CPU over the last minuteSystem load15m
The average number of processes that are being executed by CPU or waiting to be executed by CPU over the last 15 minutesSystem load5m
The average number of processes that are being executed by CPU or waiting to be executed by CPU over the last 5 minutesCPU other
Average CPU time spent on other tasks: servicing interrupt requests (IRQ), running virtual machines under the control of the host's kernel (It means the host is a hypervisor for VMs). It's available only for Linux hostsAIX Physical consumed
Total CPUs consumed by the AIX partitionCPU steal
Average CPU time, when a virtual machine waits to get CPU cycles from the hypervisor. In a virtual environment, CPU cycles are shared across virtual machines on the hypervisor server. If your virtualized host displays a high CPU steal, it means CPU cycles are being taken away from your virtual machine to serve other purposes. It may indicate an overloaded hypervisor. It's available only for Linux hostsCPU system
Average CPU time when CPU was running in kernel modeCPU usage %
Percentage of CPU time when CPU was utilized. A value close to 100% means most host processing resources are in use, and host CPUs can’t handle additional workCPU user
Average CPU time when CPU was running in user modeAIX Kernel threads blocked
Length of the swap queue. The swap queue contains the threads ready to run but swapped out with the currently running threadsAIX Kernel threads I/O event wait
Number of threads that are waiting for file system direct (cio) + Number of processes that are asleep waiting for buffered I/OAIX Kernel threads I/O message wait
Number of threads that are sleeping and waiting for raw I/O operations at a particular time. Raw I/O operation allows applications to direct write to the Logical Volume Manager (LVM) layerAIX Kernel threads runnable
Number of runnable threads (running or waiting for run time) (threads ready). The average number of runnable threads is seen in the first column of the vmstat command outputMemory available
The amount of memory (RAM) available on the host. The memory that is available for allocation to new or existing processes. Available memory is an estimation of how much memory is available for use without swapping.Memory available %
The percentage of memory (RAM) available on the host. The memory that is available for allocation to new or existing processes. Available memory is an estimation of how much memory is available for use without swapping. Shows available memory as percentages.Kernel memory
The memory used by the system kernel. It includes memory used by core components of OS along with any device drivers.Typically, the number will be very small.Memory reclaimable
The memory usage for specific purposes. Reclaimable memory is calculated as available memory (estimation of how much memory is available for use without swapping) minus free memory (amount of memory that is currently not used for anything). For more information on reclaimable memory, see [this blog post](https://dt-url.net/bx024wr).Memory total
The amount of memory (RAM) installed on the system.Memory used %
Shows percentage of memory currently used. Used memory is calculated by OneAgent as follows: used = total – available. So the used memory metric displayed in Dynatrace analysis views is not equal to the used memory metric displayed by system tools. At the same time, it’s important to remember that system tools report used memory the way they do due to historical reasons, and that this particular method of calculating used memory isn’t really representative of how the Linux kernel manages memory in modern systems. The difference in these measurements is in fact quite significant, too. Note: Calculated by taking 100% - "Memory available %".Memory used
Used memory is calculated by OneAgent as follows: used = total – available. So the used memory metric displayed in Dynatrace analysis views is not equal to the used memory metric displayed by system tools. At the same time, it’s important to remember that system tools report used memory the way they do due to historical reasons, and that this particular method of calculating used memory isn’t really representative of how the Linux kernel manages memory in modern systems. The difference in these measurements is in fact quite significant, too.Host availability
Host availability state metric reported in 1 minute intervalsHost uptime
Time since last host boot up. Requires OneAgent 1.259+. The metric is not supported for application-only OneAgent deployments.Disk available
Amount of free space available for user in file system. On Linux and AIX it is free space available for unprivileged user. It doesn't contain part of free space reserved for the root.Disk available %
Percentage of free space available for user in file system. On Linux and AIX it is % of free space available for unprivileged user. It doesn't contain part of free space reserved for the root.Disk used
Amount of used space in file systemNIC bytes received
Network interface bytes received on the hostNIC bytes sent on host
Network interface bytes sent on the hostNIC receive link utilization
Network interface receive link utilization on the hostNIC transmit link utilization
Network interface transmit link utilization on the hostYou turn on Discovery mode at the host level, either during or after OneAgent installation.
To turn on Discovery mode during OneAgent installation, use the --set-monitoring-mode=discovery
parameter.
For more information, see the OneAgent installation documentation that's specific to your environment.
To turn on Discovery mode after OneAgent installation, use one of these options:
--set-monitoring-mode=discovery
parameter.For Application Security to work in Discovery mode, code-module injection is required. Code-module injection is disabled by default.
After turning on Discovery mode, you can turn on the code-module injection for a single host.
For details on how Application Security works in Discovery mode, see Application Security: Discovery mode.
OneAgent in Infrastructure Monitoring mode automatically injects into processes to be able to monitor backing services written in Java and runtime metrics for supported languages. Learn how to turn off auto-injection.
While Full-Stack mode provides complete application performance monitoring, code-level visibility, deep process monitoring, and Infrastructure Monitoring (including PaaS platforms) for use cases where less visibility is required, OneAgent can be configured for Infrastructure Monitoring mode, which provides physical and virtual infrastructure-centric monitoring, along with log monitoring and AIOps.
You turn on Infrastructure Monitoring mode at the host level, either during or after OneAgent installation.
OneAgent version 1.273+ The --set-infra-only
command is now deprecated. Use the --set-monitoring-mode
command instead.
To turn on Infrastructure Monitoring mode during OneAgent installation, use the --set-monitoring-mode=infra-only
parameter.
For more information, see the OneAgent installation documentation that's specific to your environment.
To turn on Infrastructure Monitoring mode after OneAgent installation, use one of these options:
--set-monitoring-mode=infra-only
parameter.builtin:host.monitoring
as the schemaId and create your configuration object using POST an object.Process injection provides you with additional data for Infrastructure Monitoring. Process injection is enabled by default.
If you run your OneAgent as a container with Infrastructure Monitoring mode enabled, process injection will not be performed.
Infrastructure Monitoring mode enables you to monitor any infrastructure component and backing service written in Java. You can monitor backing services supported by default (for example, Kafka or ActiveMQ), and you can also build your own custom JMX and PMI extensions for infrastructure components and use them in Infrastructure Monitoring mode.
Additionally, with process injection, Infrastructure Monitoring mode provides runtime metrics for:
We don't recommend turning off auto-injection, but if you're required to do so due to strict security requirements, you can choose among various options. Turning off auto-injection also prevents Dynatrace from discovering vulnerabilities in your environment, even if you enable Application Security. You can turn off automatic injection at the host or environment level.
Use the OneAgent command line interface to set the --set-auto-injection-enabled=false
parameter.
If you use oneagentctl to turn off automatic injection, you won't be able to control auto-injection in Infrastructure Monitoring mode using the Dynatrace web UI at Settings > Monitoring > Monitored technologies or OneAgent monitoring configuration API.
You can turn off process injection for particular process groups using custom process monitoring rules.
Custom process monitoring rules give you fine-grained control over which processes OneAgent injects into, with an approach that scales easily within large environments. You don’t need to adjust your system configuration, and a few rules can cover thousands of processes.
For more information, see Process deep monitoring.
You can disable the collection on JMX/PMI and runtime metrics, which will result in disabling auto-injection in Infrastructure Monitoring mode.
You can also turn off selected extensions collecting the metrics at the environment level.
Go to Settings > Monitoring > Monitored technologies.
When you turn off auto-injection, you can find such hosts using the Auto-injection filter on the Deployment Status page or OneAgent on a host API.
oneagentctl
.Run the OneAgent on a host API call with the autoInjection
parameter set to DISABLED_MANUAL
. The returned payload contains the list of OneAgents with auto-injection disabled after OneAgent installation via either the Dynatrace web UI or oneagentctl
.
Dynatrace supports virtualization monitoring. To monitor the virtual components in your environment, you need to complete an extra step beyond the initial setup. For full details, see Set up virtualization monitoring.
Along with injection, the injected module becomes dynamically linked to the monitored technology. Consequently, it becomes an integral part of the monitored process and can only be removed with a process restart. Depending on the OS (Windows/Linux/AIX), injection is performed in slightly different ways, but the outcome is quite similar.
The injection rules refer to the point in time when the process of a supported technology is started. After it is started, the deep-code monitoring module of OneAgent remains dynamically linked to the monitored technology and can be unloaded only by restarting the monitored process.
With injection, the injected module becomes dynamically linked to the monitored technology. Consequently, it becomes an integral part of the monitored process and can be removed only by restarting the monitored process.
OneAgent injects into a process each time a new process is started in the system. OneAgent identifies the launched process (by name, location, user space, and so on) and, if it's supported for injection and if the injection rules don't exclude it, OneAgent sets up a dynamic link between the monitored process and one of the OneAgent deep-code monitoring modules.
Disabled OneAgents effectively stop monitoring your environment. However, the core of OneAgent, which is responsible for communication with the Dynatrace cluster, remains active. Because communication between OneAgent and Dynatrace clusters is always invoked on the OneAgent side, OneAgent needs to keep sending its status and asking the cluster if it needs to start monitoring again.