Can I use a proxy for internet access?

You need to configure an internet connection to:

  • Receive updates from Mission Control
  • Send health checks and license utilization data to Mission Control
  • Receive external problem notification services through such tools such as ServiceNow, Jira, and webhooks

You can configure a proxy connection:

  • During Dynatrace Managed installation
  • Using the Cluster Management Console (CMC)
  • Using the REST API

For more information on each approach, see below.

Configure proxy with Dynatrace Managed installer

You can use command-line parameters during Dynatrace Managed installation. Use the following parameters to set up a proxy connection to Dynatrace Mission Control:

--network-proxy
If your machine uses a network proxy to connect to the Internet, put the address here in the following format: protocol://[user:password@]server-address:port. The default value is none.

--network-proxy-cert-file If your machine uses a network HTTPS proxy with a self-signed certificate, you have to extend the trusted certificates store. The full path to a public SSL certificate file in PEM format should follow that parameter.

Configure proxy with Cluster Management Console

In the Cluster Management Console (CMC):

  1. Go to Settings > Internet proxy and edit Proxy configuration for a particular data center.

  2. Select Connect via proxy and enter proxy server details:

    • Scheme
    • Proxy address and Port
    • Username and Password if anonymous access isn't possible.

Excluding hosts from proxy

You can exclude hosts from using the proxy. This is useful, for example, when you have configured problem integrations via webhooks with software residing in the internal network. Use a wildcard (*) at the beginning or at the end of each host entry to include all URLs within a defined host domain.

Configure proxy with REST API

You can also use the Internet Proxy REST API (Cluster Management Console REST API) in single clusters for regular and premium high-availability deployments to adjust the internet proxy configuration.

For details, see Set or update cluster proxy configuration.

Frequently asked questions

Can I use a transparent proxy?

Yes, Dynatrace supports transparent proxy configuration.

A transparent proxy (also known as an intercepting proxy, in-line proxy, or forced proxy), can route and intercept Dynatrace cluster communication to Mission Control. A transparent proxy is normally located between the Dynatrace Managed cluster and Mission Control (Internet). By using a transparent proxy, you can additionally audit and inspect all communication payloads (see data exchanged with Mission Control).

Dynatrace need not be aware of the existence of the proxy. Dynatrace Managed has to be configured to trust a root certificate whose private key is known to the proxy. In such situations, proxy analysis of the contents of an SSL/TLS transaction becomes possible. The proxy is effectively operating a man-in-the-middle attack, allowed by Dynatrace's trust of a root certificate the proxy owns.

How do I update the SSL certificate?

You can use command-line parameters for the Dynatrace Managed reconfiguration script:

<PRODUCT_PATH>/installer/reconfigure.sh --update-cert --network-proxy-cert-file <proxy_cert_file>

How do I enable NTLMv2?

Dynatrace Managed version 1.288+

Enabling the NTLMv2 authentication protocol can enhance security by:

  • Hardening communication with Mission Control against many spoofing attacks.
  • Enabling Dynatrace Managed to authenticate to a proxy to Mission Control.

To enable NTLMv2 support for your proxy settings, first complete the two-step process below for each cluster node.

  1. Adjust the custom.settings file with the changes below:

    <server/conf/config.properties>
    [settings]
    use-ntlm-auth-scheme = true
    <nodekeeper/conf/config.properties>
    [settings]
    use-ntlm-auth-scheme = true
  2. Restart the Dynatrace Managed cluster node.

After you have completed the procedure above for each cluster node, configure your proxy connection as described on this page. For your username, use NT credentials in the format <Primary domain>\<account> (for example, Microsoft\john.smith).