ActiveGate can be used in a Dynatrace Managed connectivity scheme. The Dynatrace Managed connectivity scheme can be deployed in several different deployment scenarios.
Dynatrace requires certain ports and paths to be opened and accessible through the monitored infrastructure, firewalls and other components. The ports are configurable and the default values are shown here.
All possible connections for the Dynatrace Managed connectivity scheme—in all possible deployment scenarios—are shown below in one diagram.
The solid arrows indicate the preferred paths. For example, OneAgent will connect to an Environment ActiveGate, if one is present. It will, however, connect to a Cluster ActiveGate, if no connection to an Environment ActiveGate is possible, and it can even connect directly to a Dynatrace Managed Cluster. The direction of arrows in the diagrams indicates which component initiates the connection.

Cluster ActiveGate receives connections on port 9999.
Dynatrace Managed Cluster (embedded ActiveGate) receives connections on port 443. For more information see diagrams above.
If you run Browser monitors or HTTP monitors from private Synthetic locations, you need to make sure the Synthetic-enabled ActiveGate has access to the tested resource. If you use ActiveGate extensions, you need to make sure the ActiveGate executing the extensions has access to the monitored technology.
For Dynatrace Managed, ActiveGate must have network access to other services as well on specific ports, based on your deployment scenario.
ActiveGates exist in the following hierarchy:
ActiveGates can only send data to higher hierarchy levels. It is impossible to send data to the same or lower level of the hierarchy.
Environment ActiveGates, by default, connect directly to the Dynatrace Cluster (unless custom network zones are used—see below). This eliminates an intermediate step of connecting to a Cluster ActiveGate. Connecting through the Cluster ActiveGate needs to be arranged, if the Dynatrace Cluster is not directly reachable. For example, if the Environment ActiveGate is in a different network or different data center.
Connectivity can also depend on network zones if such are configured. Network zone configuration means that ActiveGates and OneAgents will prefer to communicate with ActiveGates from the same zone, before connecting to ActiveGates outside of the active zone.
All Dynatrace components (OneAgents, ActiveGates, Dynatrace Cluster) detect their hostnames and distribute them as communication endpoints among each other to achieve the highest possible connection robustness.
This works automatically, unless there are networking devices (proxies, load balancers) in your environment, which should be taken into account, and of which Dynatrace is not aware.
The diagram below shows all possible proxy and load balancer (reverse proxy) placements for an ActiveGate deployment. For simplicity, direct connections—those that are not through proxies or load balancers–are not shown in this diagram. Alternative connections (those that connect through one or more proxies or load balancers), are shown as dashed lines.
dnsEntryPoint property in the ActiveGate configuration.seedServerUrl and ignoreClusterRuntimeInfo
You can configure the ActiveGate headers in your firewall.
Header
Value
User-Agent
Environment ActiveGate:
ruxit/<dynatrace-version> <activegate-instance-id> <environment-id>
Environment and Multi-environment ActiveGate:
ruxit/1.229.163.20211109-103203 0x37badd8e c04442b4-7ea6-4ec4-a5c4-7f94c7cf25fa
Cluster ActiveGate:
ruxit/1.229.163.20211109-103203 0x37badd8e
HTTP monitors:
DynatraceSynthetic/<dynatrace-version>
DynatraceSynthetic/1.258.0.20221207-142354
Browser monitors:
RuxitSynthetic/<dynatrace-version>
Mozilla/5.0 (Windows NT 6.3;WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.124 Safari/537.36 RuxitSynthetic/1.258.0.20221207-142354
dynatrace-gateway-type
PRIVATEPUBLICPUBLIC_MANAGEDMULTI_TENANTAuthorization
Basic <TOKEN>