<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Disable javascript injection for a specific process or based on user-agent in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/Disable-javascript-injection-for-a-specific-process-or-based-on/m-p/122560#M14133</link>
    <description>&lt;P&gt;We running at STIME inc a prerender to cache some url when they are requested from the googlebot.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I would like to know if it possible to to disable javascript injection for specific user-agent tag in the https request header (especially for googlebot crawler) or just disable the injection for a selected process group . Additionnaly I would like to know where in the infrastructure the injection take place ?&lt;/P&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 29 Aug 2019 13:12:08 GMT</pubDate>
    <dc:creator>gilles_djimi-ex</dc:creator>
    <dc:date>2019-08-29T13:12:08Z</dc:date>
    <item>
      <title>Disable javascript injection for a specific process or based on user-agent</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Disable-javascript-injection-for-a-specific-process-or-based-on/m-p/122560#M14133</link>
      <description>&lt;P&gt;We running at STIME inc a prerender to cache some url when they are requested from the googlebot.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I would like to know if it possible to to disable javascript injection for specific user-agent tag in the https request header (especially for googlebot crawler) or just disable the injection for a selected process group . Additionnaly I would like to know where in the infrastructure the injection take place ?&lt;/P&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 29 Aug 2019 13:12:08 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Disable-javascript-injection-for-a-specific-process-or-based-on/m-p/122560#M14133</guid>
      <dc:creator>gilles_djimi-ex</dc:creator>
      <dc:date>2019-08-29T13:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: Disable javascript injection for a specific process or based on user-agent</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Disable-javascript-injection-for-a-specific-process-or-based-on/m-p/122561#M14134</link>
      <description>&lt;P&gt;In application settings you can pick user agents that should be monitored&lt;/P&gt;&lt;P&gt; If you know user agent for robots you can exclude monitoring there.&lt;/P&gt;&lt;P&gt;To exclude injection on single process you have to have dedicated process group for it because injection can be disabled on process group level. Go to edit and there you will have proper option. If you have in this process group processes that you still want to monitor you have to split it using proces group detection settings &lt;/P&gt;&lt;P&gt;In general agent should be injected on Webserver that is on frontend. So if you have Apache as reverse proxy for tomcat injection will be there.&lt;/P&gt;&lt;P&gt;Sebastian&lt;/P&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 29 Aug 2019 14:22:27 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Disable-javascript-injection-for-a-specific-process-or-based-on/m-p/122561#M14134</guid>
      <dc:creator>skrystosik</dc:creator>
      <dc:date>2019-08-29T14:22:27Z</dc:date>
    </item>
  </channel>
</rss>

