This page showcases new features, changes, and bug fixes in Dynatrace SaaS version 1.321. It contains:
Infrastructure Observability | Kubernetes
It's now possible to enable telemetry endpoints on Kubernetes for cluster-local data ingest via the protocols OTLP, Jaeger, StatsD, or Zipkins. For newly monitored Kubernetes clusters, this can be enabled via the Kubernetes onboarding page.
For existing Kubernetes clusters and further documentation, see Enable Dynatrace telemetry ingest endpoints.
Platform
You can now process spans through all OpenPipeline default stages, enabling metric and event extraction, permission filtering, and flexible storage at scale.
Highlights:
Platform | Platform Services
Identifier handling of generated identifiers (the id
field) and externally supplied identifiers has been consolidated
id
, but the previously set externalId
(if any was set)externalId
property is now deprecated, and you can provide an id
property when creating a new document.externalId
to resolve a generated id
because you can use your supplied identifier on every endpoint of the document service API to identify a document.Platform | Settings
When defining segments, you can now use wildcards (*
) to cover use cases where you want to filter for fields containing or ending with a specific string.
Example:
k8.cluster.name = *PROD*
k8.namespace.name = *public
All | Kubernetes
All telemetry from Kubernetes clusters and workloads is now automatically enriched with attributes about the originating Kubernetes cluster, Kubernetes namespace, Kubernetes workload, host group, and more.
With this update, you can:
To learn more, see Metadata enrichment of all telemetry originating from Kubernetes.
All | Kubernetes
This release introduces primary Grail tags, which are tags enriched onto any supported telemetry and enable consistent usage of the product.
With this update, you can:
We are initially supporting Kubernetes namespace labels and annotations as source for primary Grail tags. If you already have such labels or annotations that designate your departments, team ownership, application IDs, or cost center, and deployment information like Kubernetes cluster or namespace are not enough, you can now use these to configure and use Dynatrace cohesively. This also means that, instead of setting up tagging in Dynatrace, you can simply leverage your existing Kubernetes labels.
To learn more, see Primary Grail Tags.
Infrastructure Observability | Log Monitoring
There is an option to provide content-type with a query parameter for generic ingest (/logs/ingest
) content-type only. The value provided in the query parameter has priority over the type specified in the content-type header.
Application Security
To trigger workflows, you can now use security.events
generated by Dynatrace Application Security, ingested via the v1/security.events
endpoint, or ingested via custom/security.events/
endpoints.
Software Delivery | Ecosystem
The ServiceNow Connector supports the OAuth client credentials grant type for enhanced security with Dynatrace Workflows.
To configure the ServiceNow OAuth authentication type for Workflow connections, see ServiceNow.
Business Observability
To streamline the triage of potential security incidents, the Compliance Assistant Incidents ICT critical services panel now links directly to
Threats & Exploits from three points.
Application Observability | Services
With this release, only service entry points (server/consumer spans) become endpoints, excluding outbound calls to other services. Endpoint names also change to include the HTTP method.
Results:
Availability:
To preview changes before opting in, use the dashboard attached to our Dynatrace Community post.
For details, see Service Detection v2.
IAM
In Dashboards Classic, in addition to sharing classic dashboards with classic role-based users and groups, you can now share dashboards with IAM policy–based users and groups through the dashboard-specific share settings.
Account Management | Subscriptions and Licensing
To make it easier to find details about how licensing consumption is calculated, we have restructured the licensing documentation to offer a more intuitive content structure that mirrors the rate card.
This is just one step in a larger effort to improve Dynatrace licensing documentation. More content enhancements from our Account Management team are currently in development.
If you have saved shortlinks to any pages (for example, ...docs.dynatrace.com/docs/shortlink/topic_ID
), your links will still work. They are redirected automatically.
If you have saved permalinks (static, non-relative URLs), they will no longer work.
To replace a saved static link with a shortlink
Application Security | Vulnerabilities, Attacks
The Dynatrace platform now provides general availability support for detecting and protecting against code-level vulnerabilities and attacks in Go applications. As part of this update, related settings schemas have been revised:
builtin:appsec.runtime-vulnerability-detection
globalMonitoringModeGo
MONITORING_ON
, MONITORING_OFF
builtin:appsec.attack-protection-settings
blockingStrategyGo
OFF
, MONITOR
, BLOCK
Application Observability
All profiling metrics (dt.profiling.*
) are now consistent with other metrics and report their entity ID context in upper case. This may break your DQL queries if you used the metrics with the entity ID filters, for example in Dashboards.
For example, dt.entity.process_group_instance
is now always reported as PROCESS_GROUP_INSTANCE-123AB45C6DEF7G89
with the dt.profiling.jvm.threads.count
metric.
timeseries { avg(dt.profiling.jvm.threads.count) },by: { dt.entity.process_group_instance, thread.state_category },filter: { matchesValue(thread.state_category, "locking") and matchesValue(dt.entity.process_group_instance, "PROCESS_GROUP_INSTANCE-123AB45C6DEF7G89") }| fieldsAdd name = entityName(dt.entity.process_group_instance), state = thread.state_category
To learn about changes to the Dynatrace API in this release, see Dynatrace API changelog version 1.321.