Use a public registry

To accommodate diverse infrastructure requirements and organizational preferences, Dynatrace images are available on selected public registries. These images adhere to best practices, ensuring immutability and signing for enhanced security and resilience against potential supply chain risks.

Explore our supported public registries with multi-arch Dynatrace container images supporting ARM64 (AArch64), x86-64, and s390x CPU architectures on Linux, ensuring compatibility across various platforms.

This page provides instructions for using Dynatrace signed and immutable container images hosted on supported public registries.

Prerequisites

Before you begin, be sure to meet the following prerequisites:

  • required Dynatrace Operator version is v0.11 or later
  • required Target CPU architectures are ARM64 (AArch64), x86-64, and/or s390x
  • required Allow egress traffic to public registry

Limitations

Note that the following configurations are not supported in combination with public registries:

  • Application-Only monitoring without CSI driver
  • Host monitoring without CSI driver
  • Classic Full-Stack monitoring - Alternatively, use a private registry for Classic Full-Stack monitoring

Start using these fortified images today for a safer and more efficient containerized monitoring experience:

Supported public registries

Dynatrace publishes its container images to Amazon ECR and Docker Hub:

Amazon ECR

Docker Hub

public.ecr.aws/dynatrace/dynatrace-activegate

dynatrace/dynatrace-activegate

public.ecr.aws/dynatrace/dynatrace-codemodules

dynatrace/dynatrace-codemodules

public.ecr.aws/dynatrace/dynatrace-oneagent

dynatrace/dynatrace-oneagent

public.ecr.aws/dynatrace/dynatrace-operator1

dynatrace/dynatrace-operator

public.ecr.aws/dynatrace/dynatrace-k8s-node-config-collector

dynatrace/dynatrace-k8s-node-config-collector

1

Available from Dynatrace Operator version 1.0.0

Rate limiting

Be aware that, when accessing public registries, there is a potential risk of encountering rate limiting. To ensure a smoother experience and reduce this risk, we recommend using a private registry or authenticating against the respective registry.

Image tagging

Dynatrace employs version-based image tagging for its container images and does not use mutable image tags like latest. For more information on tags, please visit the respective public registry repository.

Deploy Dynatrace Operator with images from public registry

By default, the Dynatrace Operator image dynatrace/dynatrace-operator is served by the public registry on AWS ECR.

Dynatrace Operator consists of multiple components (operator, webhook, CSI driver), all of which use the same dynatrace-operator image with specific deployment configurations per component.

Configure DynaKube to use images from public registry

Classic Full-Stack monitoring is not supported in combination with a public registry.

The Dynatrace Operator can easily be instructed to use images from a public registry by configuring the respective image fields in the DynaKube custom resource. The configured images will be deployed to your Kubernetes cluster to set up monitoring components.

The following DynaKube snippet demonstrates how to configure Cloud-Native Full-Stack monitoring setup leveraging the public Amazon ECR registry.

apiVersion: dynatrace.com/v1beta2
kind: DynaKube
metadata:
name: dynakube
namespace: dynatrace
spec:
...
oneAgent:
cloudNativeFullstack:
...
image: public.ecr.aws/dynatrace/dynatrace-oneagent:<tag>
codeModulesImage: public.ecr.aws/dynatrace/dynatrace-codemodules:<tag>
# autoUpdate: true # has no effect - see note below
# version: # has no effect - see note below
...
activeGate:
...
image: public.ecr.aws/dynatrace/dynatrace-activegate:<tag>
...

Note that the autoUpdate and version fields have no effect when the image and/or codeModulesImage fields are set.

After configuring the required fields, the DynaKube custom resource must be applied to the Kubernetes cluster.

Application and Kubernetes Observability with Amazon ECR

The following custom resource describes how to configure DynaKube for Application Observability and Kubernetes observability:

apiVersion: dynatrace.com/v1beta2
kind: DynaKube
metadata:
name: dynakube
namespace: dynatrace
spec:
...
oneAgent:
applicationMonitoring:
...
codeModulesImage: public.ecr.aws/dynatrace/dynatrace-codemodules:<tag>
# autoUpdate: true # has no effect
# version: # has no effect
useCSIDriver: true # required; defaults to false
...
activeGate:
...
image: public.ecr.aws/dynatrace/dynatrace-activegate:<tag>
...

Verify image signature

All of our immutable and signed container images adhere to best practices, enhancing security and shielding against supply chain attacks. To learn how to verify signatures and guarantee software integrity, see Verify Dynatrace image signatures.