F5 BIG-IP LTM application delivery controllers help keep applications up and running. BIG-IP Local Traffic Manager (LTM) handles application traffic and secure infrastructure. It offers built-in security, traffic management, and performance application services for applications that live in private data centers or the cloud. F5 doesn't permit the installation of 3rd party monitoring within F5 LTM instances. As a result, F5 monitoring via OneAgent isn't feasible. Dynatrace is pleased to provide remote infrastructure monitoring of F5 LTM devices via the F5 LTM ActiveGate extension.

The extension queries your F5 LTM instances every minute for key metrics, properties, and events. The ingested data provides Dynatrace with near real-time visibility into host performance and enables us to present actionable insights using automatically generated visualization tools, dashboards, info-graphics, and reports.


  • Dynatrace version 1.156 or above
  • ActiveGate version 1.155 or above
  • F5 BIG-IP LTM device(s) with iControl® API support
  • The username and password of either the admin user or any user with a token
  • To create an authentication token with the User authentication API, submit a POST to https://BIG-IP-ADDRESS/mgmt/shared/authn/login including a data parameter that triggers the generation of an authentication token.
    A typical data parameter for this call looks similar to the following example with actual values for the username, password:

{ "username":"USER", "password":"PASSWORD", "loginProviderName": "tmos"}

Interested in monitoring F5 LTM with Dynatrace?

If you're interested in leveraging our industry-leading capabilities to monitor your F5 LTM implementation, the fastest way to get started is to reach out to your Dynatrace sales rep.

If you don't know who your Dynatrace contact is, please complete this form.


ActiveGate Installation (if necessary)

  1. Navigate to Deploy Dynatrace > Set up remote monitoring, select your preferred OS and follow the instructions to install both the ActiveGate and the ActiveGate plugin module

F5 LTM Extension Installation

  1. Obtain the F5 plugin zip file and unzip it to the plugin_deployment directory.
  2. Restart the Dynatrace Remote Plugin Module service.
  3. Return to the ActiveGate installation instructions and click the Upload ActiveGate plugin link at the bottom of the page.
  4. Click Upload plugin button and upload the zipped file through the Dynatrace UI.
  5. Enter the endpoint information requested for connecting to F5 device:
  • Endpoint name: Type a meaningful endpoint name.
  • Username: The username for connecting to the iControl® REST API.
  • Password: The user's password.
  • Hostname/IP of mgmt. interface: The hostname/IP where the mgmt. interface is listening, defaults to port 443 (HTTPS).
  • Use token authentication: Use token authentication instead of direct connection. Required for LDAP integrated users.
  • Require a valid SSL certificate: (Un)checked depending on whether or not a valid SSL certificate is required.
  • Enable debug logging: Leave unchecked by default, can be checked if requested by support for investigating an issue.
  • Comma-separated virtual servers: Allows for filtering which virtual servers should be monitored.
  • Comma-separated pools: Allows for filtering which pools should be monitored.
  • Comma-separated nodes: Allows for filtering which nodes should be monitored.
  • Name of the group: If the device is part of a cluster, type the name here to group the devices in the GUI.



The IP address of all network interfaces and the ports used by the services are automatically captured, as are the following metrics:


  • Availability

Virtual Servers (split by virtual servers)

  • Status
  • Requests
  • (Ephemeral) Connections
  • (Ephemeral) Received bytes
  • (Ephemeral) Transmitted bytes
  • (Ephemeral) Received packets
  • (Ephemeral) Transmitted packets
  • (Ephemeral) Slow killed
  • (Ephemeral) Evicted connections
  • CPU usage
  • Syncookie accepts
  • Syncookie rejects

Pools (split by pools)

  • Status
  • Requests
  • Connections
  • Received bytes
  • Transmitted bytes
  • Received packets
  • Transmitted packets
  • Member count
  • Current sessions

Nodes (split by nodes)

  • Status
  • Requests
  • Connections
  • Received bytes
  • Transmitted bytes
  • Received packets
  • Transmitted packets

Rules (split by rules)

  • Executions
  • Aborts
  • Failures

Network Interfaces (split by interfaces)

  • Status
  • Received bytes
  • Transmitted bytes
  • Received packets
  • Transmitted packets
  • Dropped packages
  • Errors

Client and Server SSL (split by profiles)

  • Common connections
  • Native connections
  • Fatal alerts
  • Secure handshakes
  • Handshake failures
  • Insecure handshake accepts
  • Insecure handshake rejects
  • Insecure renegotiation rejects
  • Requests (split by protocol)

Disks (split by disks)

  • Free
  • Used
  • Reserved

CPU (split by CPUs)

  • Idle
  • IO wait
  • IRQ
  • Soft IRQ
  • Stolen
  • System
  • User


  • Total
  • Used

HTTP stats (split by profiles)

  • GET/POST requests
  • 2xx responses
  • 3xx responses
  • 4xx responses
  • 5xx responses