<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can Managed be installed or run without firewalld and nft present? in Dynatrace Managed Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Can-Managed-be-installed-or-run-without-firewalld-and-nft/m-p/297329#M4698</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;A client is insisting they do not use local (operating system) firewalls in their environment and is questioning the need for firewalld and nftables for Managed. We've explained that it is used to make the Managed setup as secure as possible, incl. traffic between nodes, but they are adament that without any firewall blocking ports, we should be able to run Managed without firewalld and nft present.&lt;/P&gt;&lt;P&gt;Can Managed be installed and run without issues without those present?&lt;/P&gt;&lt;P&gt;The installer checks for this and warns that neither are present, but the question is whether the warning can be ignored without any future impact?&lt;BR /&gt;I know Managed has a firewall component, which I assume relies on nft/firewalld to operate correctly...but that really is the question: why is the firewall component critical when these systems are typically placed inside the client network (LAN), behind perimeter firewalls?&lt;/P&gt;</description>
    <pubDate>Tue, 07 Apr 2026 12:07:23 GMT</pubDate>
    <dc:creator>andre_vdveen</dc:creator>
    <dc:date>2026-04-07T12:07:23Z</dc:date>
    <item>
      <title>Can Managed be installed or run without firewalld and nft present?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Can-Managed-be-installed-or-run-without-firewalld-and-nft/m-p/297329#M4698</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;A client is insisting they do not use local (operating system) firewalls in their environment and is questioning the need for firewalld and nftables for Managed. We've explained that it is used to make the Managed setup as secure as possible, incl. traffic between nodes, but they are adament that without any firewall blocking ports, we should be able to run Managed without firewalld and nft present.&lt;/P&gt;&lt;P&gt;Can Managed be installed and run without issues without those present?&lt;/P&gt;&lt;P&gt;The installer checks for this and warns that neither are present, but the question is whether the warning can be ignored without any future impact?&lt;BR /&gt;I know Managed has a firewall component, which I assume relies on nft/firewalld to operate correctly...but that really is the question: why is the firewall component critical when these systems are typically placed inside the client network (LAN), behind perimeter firewalls?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 12:07:23 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Can-Managed-be-installed-or-run-without-firewalld-and-nft/m-p/297329#M4698</guid>
      <dc:creator>andre_vdveen</dc:creator>
      <dc:date>2026-04-07T12:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: Can Managed be installed or run without firewalld and nft present?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Can-Managed-be-installed-or-run-without-firewalld-and-nft/m-p/297330#M4699</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Dynatrace Managed can run without firewalld or nftables, and the installer warning is not blocking.&lt;/P&gt;&lt;P&gt;However, documentation shows that firewall rules are used for traffic routing and access control.&lt;/P&gt;&lt;P&gt;Here you have some related topisc:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/How-to-change-the-port-for-Dynatrace-Managed/m-p/120465" target="_self"&gt;How to change the port for Dynatrace Managed&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Installing-Dynatrace-cluster-on-hardened-CIS-image-Ubuntu-22-04/m-p/200726" target="_self"&gt;Installing Dynatrace cluster on hardened CIS image&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;So It is possible to disable the firewall, but then all network configuration and security must be handled manually.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 12:35:54 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Can-Managed-be-installed-or-run-without-firewalld-and-nft/m-p/297330#M4699</guid>
      <dc:creator>t_pawlak</dc:creator>
      <dc:date>2026-04-07T12:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: Can Managed be installed or run without firewalld and nft present?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Can-Managed-be-installed-or-run-without-firewalld-and-nft/m-p/297455#M4701</link>
      <description>&lt;P&gt;So, we can run Managed without firewalld active - tested that and it seems to be working as expected.&lt;/P&gt;&lt;P&gt;However, when the hosts are rebooted, the nftables ruleset is cleared and the Dynatrace firewall.sh script fails to load the nftables rules back (timeout), as it seemingly relies on firewalld - see output of firewall.sh status below.&lt;/P&gt;&lt;PRE&gt;./dynatrace.sh status&lt;BR /&gt;Redirecting to /bin/systemctl status dynatrace-firewall.service&lt;BR /&gt;× dynatrace-firewall.service - Dynatrace Firewall settings&lt;BR /&gt;Loaded: loaded (/etc/systemd/system/dynatrace-firewall.service; enabled; preset: disabled)&lt;BR /&gt;Active: failed (Result: timeout) since Thu 2026-04-09 15:28:55 SAST; 2min 15s ago&lt;BR /&gt;Main PID: 1617&lt;BR /&gt;CPU: 259ms&lt;BR /&gt;&lt;BR /&gt;Apr 09 15:29:01 redacted.co.za firewall.sh[18570]: Error: Could not process rule: No such file or directory&lt;BR /&gt;Apr 09 15:29:01 redacted.co.za firewall.sh[18570]: insert rule inet &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;firewalld&lt;/STRONG&gt;&lt;/FONT&gt; mangle_PREROUTING jump dt_mangle_PREROUTING&lt;BR /&gt;Apr 09 15:29:01 redacted.co.za firewall.sh[18570]: ^^^^^^^^^&lt;BR /&gt;Apr 09 15:29:01 redacted.co.za firewall.sh[18576]: Error: Could not process rule: No such file or directory&lt;BR /&gt;Apr 09 15:29:01 redacted.co.za firewall.sh[18576]: insert rule inet &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;firewalld&lt;/FONT&gt;&lt;/STRONG&gt; filter_INPUT jump dt_filter_INPUT&lt;BR /&gt;Apr 09 15:29:01 redacted.co.za firewall.sh[18576]: ^^^^^^^^^&lt;BR /&gt;Apr 09 15:29:01 redacted.co.za firewall.sh[18578]: Error: Could not process rule: No such file or directory&lt;BR /&gt;Apr 09 15:29:01 redacted.co.za firewall.sh[18578]: insert rule inet &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;firewalld&lt;/FONT&gt;&lt;/STRONG&gt; filter_FORWARD jump dt_filter_FORWARD&lt;BR /&gt;Apr 09 15:29:01 redacted.co.za firewall.sh[18578]: ^^^^^^^^^&lt;BR /&gt;Apr 09 15:29:01 redacted.co.za firewall.sh[1617]: Adding rules ... failed.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;How do we get around this, and future proof it so that when Managed updates are applied, we do not have to redo all of the work manually again?&lt;/P&gt;&lt;P&gt;The current /etc/dynatrace.conf lists the following re: firewall&lt;/P&gt;&lt;PRE&gt;FIREWALL_ENABLED = true&lt;BR /&gt;FIREWALL_TYPE_DETECTION = on&lt;BR /&gt;FIREWALL_TYPE = nftables&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 13:47:46 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Can-Managed-be-installed-or-run-without-firewalld-and-nft/m-p/297455#M4701</guid>
      <dc:creator>andre_vdveen</dc:creator>
      <dc:date>2026-04-09T13:47:46Z</dc:date>
    </item>
  </channel>
</rss>

