<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reducing TLS ciphers in Managed? in Dynatrace Managed Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/280005#M4332</link>
    <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/28409"&gt;@stefanie_pachne&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;This didn't go as planned:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;# /var/opt/dynatrace-managed/installer/server/unix/dynatrace-managed-installer.sh --ssl-ciphers "TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384"
Starting Dynatrace 1.316.34.20250608-040133 installer ...              OK
Network proxy used for this upgrade: http://xxx.xxx.xxx.xxx
Testing connection to Dynatrace Mission Control ...                    OK
Verifying system compatibility ...                                     OK
Verifying disk space ...                                               OK
Verifying Dynatrace directories ...                                    OK
Verifying system privileges ...                                        OK
Verifying system connectivity ...                                      OK
Network proxy used for this upgrade: http://xxx.xxx.xxx.xxx
Testing connection to Dynatrace Mission Control ...                    OK
Downloading Dynatrace OneAgent. This may take a few minutes ...        OK
Stopping Dynatrace ...                                                 OK
Preparing system user for Dynatrace ...                                OK
Initializing upgrade ...                                               OK
Checking user permissions ...                                          OK
Fixing selinux rules for binaries if needed ...                        OK
Upgrading Nodekeeper ...                                               OK
Checking file ownership ...                                            OK
Upgrading. This may take a few minutes ...                             failed
failed
Rolling back upgrade ...                                               OK
Starting Dynatrace. This may take up to half an hour ...&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the moment, still waiting to see if it recovers... It took about 15 minutes to get to the failed part. Don't know if I did something wrong, but would not recommend this procedure without further clarification from Dynatrace. Quite frankly, changing ciphers shouldn't need all the above...&lt;/P&gt;</description>
    <pubDate>Mon, 23 Jun 2025 22:47:58 GMT</pubDate>
    <dc:creator>AntonioSousa</dc:creator>
    <dc:date>2025-06-23T22:47:58Z</dc:date>
    <item>
      <title>Reducing TLS ciphers in Dynatrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/269803#M4142</link>
      <description>&lt;P&gt;In Dynatrace Managed clusters, there is the possibility to limit the ciphers being used, as described in:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.dynatrace.com/managed/shortlink/managed-custom-install#ssl-certificates-parameters" target="_blank" rel="noopener"&gt;https://docs.dynatrace.com/managed/shortlink/managed-custom-install#ssl-certificates-parameters&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AntonioSousa_0-1739309216617.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/26339i0A3D40B8248E4032/image-size/large?v=v2&amp;amp;px=999" role="button" title="AntonioSousa_0-1739309216617.png" alt="AntonioSousa_0-1739309216617.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In a current Managed configuration I see in the configuration file:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;SSL_CIPHERS = TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:TLS_AES_128_CCM_SHA256:ECDHE-ECDSA-AES256-CCM8:ECDHE-ECDSA-AES256-CCM:ECDHE-ECDSA-AES128-CCM8:ECDHE-ECDSA-AES128-CCM&lt;/LI-CODE&gt;
&lt;P&gt;I understand that I have to run the command, with the new list of ciphers. But some doubts:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Does this affect both UI access and OneAgent/ActiveGate access?&lt;/LI&gt;
&lt;LI&gt;This command affects only the cluster node where it is executed, or the whole cluster?&lt;/LI&gt;
&lt;LI&gt;Does it restart the web server process automatically, or do we have to restart it so the new list of ciphers aplies?&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 05 Jan 2026 12:52:49 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/269803#M4142</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2026-01-05T12:52:49Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing TLS ciphers in Managed?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/269879#M4143</link>
      <description>&lt;P&gt;Hi Antonio,&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Does this affect both UI access and OneAgent/ActiveGate access?&lt;/LI&gt;&lt;/UL&gt;&lt;P class="lia-indent-padding-left-30px"&gt;I think it affects only to AG.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;This command affects only the cluster node where it is executed, or the whole cluster?&lt;/LI&gt;&lt;/UL&gt;&lt;P class="lia-indent-padding-left-30px"&gt;I think it affects only the cluster node where it is executed&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Does it restart the web server process automatically, or do we have to restart it so the new list of ciphers aplies?&lt;/LI&gt;&lt;/UL&gt;&lt;P class="lia-indent-padding-left-30px"&gt;I think it's only necessary restarting cluster nodes. In case you c&lt;SPAN&gt;onfigure accepted/excluded ciphers via custom.properties on AG it's only necessary restarting AG.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.dynatrace.com/t5/Troubleshooting/ActiveGate-Managed-VA-scan-shows-vulnerable-cipher-or/ta-p/239631" target="_self"&gt;Here&lt;/A&gt; you have more information.&lt;/P&gt;&lt;P&gt;Anyway,&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/28409"&gt;@stefanie_pachne&lt;/a&gt;&amp;nbsp;, could you confirm this information? Thanks in advance.&lt;/P&gt;&lt;P&gt;Hope it helps, Antonio.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Elena.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 11:33:17 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/269879#M4143</guid>
      <dc:creator>erh_inetum</dc:creator>
      <dc:date>2025-02-12T11:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing TLS ciphers in Managed?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/269969#M4144</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;it affects the communication with this cluster node depending on your setup (&lt;A href="https://docs.dynatrace.com/managed/managed-cluster/basic-concepts/managed-deployment-scenarios" target="_blank" rel="noopener"&gt;https://docs.dynatrace.com/managed/managed-cluster/basic-concepts/managed-deployment-scenarios&lt;/A&gt;).&lt;/P&gt;
&lt;P&gt;Follow one of these instructions and feel free to contact Live Chat if the instructions are unclear:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://docs.dynatrace.com/managed/managed-cluster/installation/customize-installation-for-dynatrace-managed#ssl-certificates-parameters" target="_blank" rel="noopener noreferrer"&gt;Managed via SSL certificate parameters&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://docs.dynatrace.com/managed/managed-cluster/installation/install-your-own-ssl-certificate" target="_self" rel="noopener noreferrer"&gt;Managed via deployment status page&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Best,&lt;BR /&gt;Stefanie&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 10:01:56 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/269969#M4144</guid>
      <dc:creator>stefanie_pachne</dc:creator>
      <dc:date>2025-02-13T10:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing TLS ciphers in Managed?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/280005#M4332</link>
      <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/28409"&gt;@stefanie_pachne&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;This didn't go as planned:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;# /var/opt/dynatrace-managed/installer/server/unix/dynatrace-managed-installer.sh --ssl-ciphers "TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384"
Starting Dynatrace 1.316.34.20250608-040133 installer ...              OK
Network proxy used for this upgrade: http://xxx.xxx.xxx.xxx
Testing connection to Dynatrace Mission Control ...                    OK
Verifying system compatibility ...                                     OK
Verifying disk space ...                                               OK
Verifying Dynatrace directories ...                                    OK
Verifying system privileges ...                                        OK
Verifying system connectivity ...                                      OK
Network proxy used for this upgrade: http://xxx.xxx.xxx.xxx
Testing connection to Dynatrace Mission Control ...                    OK
Downloading Dynatrace OneAgent. This may take a few minutes ...        OK
Stopping Dynatrace ...                                                 OK
Preparing system user for Dynatrace ...                                OK
Initializing upgrade ...                                               OK
Checking user permissions ...                                          OK
Fixing selinux rules for binaries if needed ...                        OK
Upgrading Nodekeeper ...                                               OK
Checking file ownership ...                                            OK
Upgrading. This may take a few minutes ...                             failed
failed
Rolling back upgrade ...                                               OK
Starting Dynatrace. This may take up to half an hour ...&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the moment, still waiting to see if it recovers... It took about 15 minutes to get to the failed part. Don't know if I did something wrong, but would not recommend this procedure without further clarification from Dynatrace. Quite frankly, changing ciphers shouldn't need all the above...&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 22:47:58 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/280005#M4332</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2025-06-23T22:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing TLS ciphers in Managed?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/280026#M4333</link>
      <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/17213"&gt;@AntonioSousa&lt;/a&gt;&amp;nbsp;Would you mind following-up with Live Chat?&lt;BR /&gt;My current knowledge of related capabilities are tracked here:&amp;nbsp;&lt;A href="https://community.dynatrace.com/t5/Troubleshooting/ActiveGate-Managed-VA-scan-shows-vulnerable-cipher-or/ta-p/239631" target="_blank"&gt;Troubleshooting/ActiveGate-Managed-VA-scan-shows-vulnerable-cipher-or/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2025 07:42:27 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/280026#M4333</guid>
      <dc:creator>stefanie_pachne</dc:creator>
      <dc:date>2025-06-24T07:42:27Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing TLS ciphers in Managed?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/294787#M4662</link>
      <description>&lt;P&gt;I know this is an older topic but we were reached the following procedure which we did execute succesfully on our managed cluster:&lt;BR /&gt;&lt;BR /&gt;- Edit /etc/dynatrace.conf&lt;/P&gt;&lt;P&gt;- Search for SSL_CIPHERS, adapt accordingly. In the same file change this parameter to off "&lt;SPAN&gt;CIPHERS_AUTOUPDATE = off".&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-Execute reconfigure.sh in the installer dir. The cluster node will execute series of steps as shown above like with the installer.sh --ssl_cipher option.&lt;BR /&gt;&lt;BR /&gt;Note, if you which to use TLS v1.3, then set the parameter as follows: "SSL_PROTOCOLS = &lt;SPAN class=""&gt;TLS&lt;/SPAN&gt;v1.2 &lt;SPAN class=""&gt;TLS&lt;/SPAN&gt;v1.3".&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 07:48:18 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Reducing-TLS-ciphers-in-Dynatrace-Managed/m-p/294787#M4662</guid>
      <dc:creator>Geoffke</dc:creator>
      <dc:date>2026-02-16T07:48:18Z</dc:date>
    </item>
  </channel>
</rss>

