<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Which network ports does Dynatrace Server use? | Dynatrace help</title>
    <description></description>
    <link>https://www.dynatrace.com/support/help/</link>
    <atom:link href="https://www.dynatrace.com/support/help/setup-and-configuration/dynatrace-managed/configuration/which-network-ports-does-dynatrace-server-use/feed.xml" rel="self" type="application/rss+xml"/>
    <lastBuildDate>Fri, 18 Oct 2019 07:17:18 +0200</lastBuildDate>
    <pubDate>Wed, 08 May 2019 08:26:03 +0200</pubDate>
    <generator>Metalsmith v2.3.0</generator>
    <item>
      <title>Which network ports does Dynatrace Server use? updated on Wed, 08 May 2019 08:26:03 +0200</title>
      <description>&lt;p&gt;Both standalone Dynatrace Servers and Dynatrace Managed clusters require several network ports to operate, serve pages, and accept monitoring data.&lt;/p&gt;
&lt;p&gt;Be sure to configure your network and firewall so that these ports are accessible. Note that ports should be opened for bi-directional communication.&lt;/p&gt;
&lt;div class=&quot;callout&quot;&gt;
&lt;p&gt;Ports &lt;code&gt;443&lt;/code&gt; (and &lt;code&gt;8443&lt;/code&gt; for Managed versions earlier than 1.166) must remain open to allow incoming traffic from your data center.&lt;/p&gt;

&lt;/div&gt;

&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Port&lt;/th&gt;
&lt;th&gt;Used by&lt;/th&gt;
&lt;th&gt;Notes&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;443&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Dynatrace Managed UI, OneAgent and REST API&lt;/td&gt;
&lt;td&gt;Routed to local port &lt;code&gt;8022&lt;/code&gt; using an iptables&amp;apos; prerouting rule. This port must remain open. All Dynatrace communication to Dynatrace Server (including  OneAgent traffic since version 1.166) is handled over secure socket HTTPS communication (port 443) with strong cryptography to guarantee your data privacy.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;8443&lt;/code&gt; &lt;sup&gt;1&lt;/sup&gt;&lt;/td&gt;
&lt;td&gt;Monitoring data from Dynatrace OneAgent&lt;/td&gt;
&lt;td&gt;Dynatrace OneAgent only sends data outbound to Dynatrace Server&amp;#x2014;it doesn&amp;apos;t open a listening port. Each monitored machine with Dynatrace OneAgent installed on it must access this port. This port must remain open.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;8018&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Nodekeeper&lt;/td&gt;
&lt;td&gt;This port can be closed to traffic coming from outside the Dynatrace cluster. If you&amp;apos;re running a Dynatrace Managed cluster, only your cluster nodes need access to this port.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;8019&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Upgrade UI&lt;/td&gt;
&lt;td&gt;This port can be closed to traffic coming from outside the Dynatrace cluster. If you&amp;apos;re running a Dynatrace Managed cluster, only your cluster nodes need access to this port.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;8020&lt;/code&gt;, &lt;code&gt;8021&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Dynatrace Managed UI and REST API&lt;/td&gt;
&lt;td&gt;These ports can be closed to traffic coming from outside the Dynatrace cluster. If you&amp;apos;re running a Dynatrace Managed cluster, only your cluster nodes need access to these ports.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;8022&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Dynatrace Managed UI and REST API (NGINX)&lt;/td&gt;
&lt;td&gt;Port 8022 can be closed to traffic coming from outside the Dynatrace cluster. This port can be used as an equivalent to 443 if usage of a non-privileged port is required.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;5701&lt;/code&gt;-&lt;code&gt;5711&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Dynatrace cluster analytics engine&lt;/td&gt;
&lt;td&gt;These ports can be closed to traffic coming from outside the Dynatrace cluster. If you&amp;apos;re running a Dynatrace Managed cluster, only your cluster nodes need access to these ports.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;9042&lt;/code&gt;, &lt;code&gt;7000&lt;/code&gt;, &lt;code&gt;7001&lt;/code&gt;, &lt;code&gt;7199&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Cassandra-based Hypercube storage&lt;/td&gt;
&lt;td&gt;These ports can be closed to traffic coming from outside the Dynatrace cluster. If you&amp;apos;re running a Dynatrace Managed cluster, only your cluster nodes need access to these ports.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;9200&lt;/code&gt;, &lt;code&gt;9300&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Elasticsearch-based search engine&lt;/td&gt;
&lt;td&gt;These ports can be closed to traffic coming from outside the Dynatrace cluster. If you&amp;apos;re running a Dynatrace Managed cluster, only your cluster nodes need access to these ports.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id=&quot;outbound-communication-to-dynatrace-mission-control&quot;&gt;Outbound communication to Dynatrace Mission Control
      &lt;span class=&quot;shortlink-copy shortlink-copy-js&quot; data-clipboard-text=&quot;https://www.dynatrace.com/support/help/shortlink/managed-network-ports#outbound-communication-to-dynatrace-mission-control&quot;&gt;
      &lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;Within multi-node clusters, each node must be able to communicate with Mission Control for basic health checks (for example, component states, disk, and CPU usage), in addition to the mandatory management connection (URL: &lt;code&gt;https://mcsvc.dynatrace.com&lt;/code&gt;&lt;sup&gt;2&lt;/sup&gt; and IP addresses: &lt;code&gt;52.5.224.56&lt;/code&gt;, &lt;code&gt;52.200.165.10&lt;/code&gt;, &lt;code&gt;52.221.165.63&lt;/code&gt;, and &lt;code&gt;13.228.109.33&lt;/code&gt;) via HTTPS (&lt;code&gt;port 443&lt;/code&gt;) for license validation, health monitoring, and automatic updates. Communication between Dynatrace Managed clusters and Mission Control is based on TLS v1.2.&lt;/p&gt;
&lt;p&gt;Communication between Dynatrace Managed clusters and Mission Control can also be routed via a proxy, but the proxy must allow web sockets and, if the proxy is clustered, it must provide sticky sessions for web socket communication. Also, the proxy must support the SNI TLS extension.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;&lt;sup&gt;1&lt;/sup&gt; Dynatrace environments with a cluster version earlier than 1.166 use port &lt;code&gt;8443&lt;/code&gt;. New Dynatrace environments still use port &lt;code&gt;8443&lt;/code&gt;, but this port doesn&amp;apos;t need to be exposed to the outside of the cluster nodes. Upgraded Dynatrace environments preserve port settings from the previous version. As a result, it is possible to have an upgraded Dynatrace environment that still uses port &lt;code&gt;8443&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;sup&gt;2&lt;/sup&gt; Dynatrace environments older than Dynatrace cluster version 1.138 used the domain &lt;code&gt;https://opcsvc.ruxit.com/&lt;/code&gt;. If &lt;code&gt;mcsvc.dynatrace.com&lt;/code&gt; can&amp;apos;t be reached (for example, if a proxy blocks it), then &lt;code&gt;https://opcsvc.ruxit.com/&lt;/code&gt; is used as a fallback.&lt;/p&gt;
</description>
      <pubDate>Wed, 08 May 2019 08:26:03 +0200</pubDate>
      <link>https://www.dynatrace.com/support/help/setup-and-configuration/dynatrace-managed/configuration/which-network-ports-does-dynatrace-server-use/?updated=wed-08-may-2019-08-26-03-0200</link>
      <guid isPermaLink="true">https://www.dynatrace.com/support/help/setup-and-configuration/dynatrace-managed/configuration/which-network-ports-does-dynatrace-server-use/</guid>
    </item>
  </channel>
</rss>