<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Abnormal traffic in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/Finding-source-of-abnormal-high-low-traffic/m-p/200076#M23546</link>
    <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/51369"&gt;@Peter_Youssef&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If it's HTTP traffic, you can set up a Request Attribute for the the reply size and Client IPs, and from there, I'm normally able to find the biggest "offenders"" through MDA.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Dec 2022 12:40:59 GMT</pubDate>
    <dc:creator>AntonioSousa</dc:creator>
    <dc:date>2022-12-08T12:40:59Z</dc:date>
    <item>
      <title>Finding source of abnormal (high/low) traffic</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Finding-source-of-abnormal-high-low-traffic/m-p/200052#M23539</link>
      <description>&lt;P&gt;Is it possible through Dynatrace to detect the source that originates the high traffic to a host that's monitored within Dynatrace or not?&lt;/P&gt;
&lt;P&gt;If yes, kindly tell me where / how to get the incoming traffic to a monitored host within Dynatrace.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 15:17:58 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Finding-source-of-abnormal-high-low-traffic/m-p/200052#M23539</guid>
      <dc:creator>Peter_Youssef</dc:creator>
      <dc:date>2022-12-08T15:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: Abnormal traffic</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Finding-source-of-abnormal-high-low-traffic/m-p/200055#M23540</link>
      <description>&lt;P&gt;can we get it through Distributed traces.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 08:36:28 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Finding-source-of-abnormal-high-low-traffic/m-p/200055#M23540</guid>
      <dc:creator>Peter_Youssef</dc:creator>
      <dc:date>2022-12-08T08:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: Abnormal traffic</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Finding-source-of-abnormal-high-low-traffic/m-p/200061#M23541</link>
      <description>&lt;P&gt;If you are looking at a specific Host you can check&amp;nbsp;&lt;EM&gt;Analyze Process Connections&amp;nbsp;&lt;/EM&gt;under&amp;nbsp;&lt;EM&gt;Incoming connections:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="incoming-connections.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/8892i41D99F7B38C3C6DC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="incoming-connections.png" alt="incoming-connections.png" /&gt;&lt;/span&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There you can see als processes that are calling processes on your current host and the transfer rates:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="process-connections.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/8893i30A68E7EF673750C/image-size/large?v=v2&amp;amp;px=999" role="button" title="process-connections.png" alt="process-connections.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you already know the service that is getting the higher load you can use the&amp;nbsp;&lt;A href="https://www.dynatrace.com/support/help/how-to-use-dynatrace/services/analysis/service-backtrace" target="_self"&gt;backtrace&lt;/A&gt;&amp;nbsp;to see who is calling that service.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 08:46:34 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Finding-source-of-abnormal-high-low-traffic/m-p/200061#M23541</guid>
      <dc:creator>pahofmann</dc:creator>
      <dc:date>2022-12-08T08:46:34Z</dc:date>
    </item>
    <item>
      <title>Re: Abnormal traffic</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Finding-source-of-abnormal-high-low-traffic/m-p/200068#M23544</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/22796"&gt;@pahofmann&lt;/a&gt;&amp;nbsp;for clarification&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, we have done that and through analyze process connection you will see the requester server and the destination, mean while we have checked the services and the requests we found where organically the high traffic is coming from&amp;nbsp; so we get the full picture and the list of requesters (IP Addresses).&lt;BR /&gt;&lt;BR /&gt;we can do it through distributed traces but it consumes much time to get the full info.&lt;BR /&gt;Thank you so much for support.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 09:22:42 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Finding-source-of-abnormal-high-low-traffic/m-p/200068#M23544</guid>
      <dc:creator>Peter_Youssef</dc:creator>
      <dc:date>2022-12-08T09:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: Abnormal traffic</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Finding-source-of-abnormal-high-low-traffic/m-p/200076#M23546</link>
      <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/51369"&gt;@Peter_Youssef&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If it's HTTP traffic, you can set up a Request Attribute for the the reply size and Client IPs, and from there, I'm normally able to find the biggest "offenders"" through MDA.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 12:40:59 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Finding-source-of-abnormal-high-low-traffic/m-p/200076#M23546</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2022-12-08T12:40:59Z</dc:date>
    </item>
  </channel>
</rss>

