<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Auto-instrumenting an Android app for UEM, Obsfucated apk. in Real User Monitoring</title>
    <link>https://community.dynatrace.com/t5/Real-User-Monitoring/Auto-instrumenting-an-Android-app-for-UEM-obfuscated-apk/m-p/201421#M5198</link>
    <description>&lt;P&gt;update: recent plugin version (8+) performs the instrumentation before obfuscation is done, thus the obfuscation rules no longer need to be adjusted. Details can be found here:&amp;nbsp;&lt;A href="https://www.dynatrace.com/support/help/shortlink/dynatrace-android-gradle-plugin-overview#instrumentation-specific-capabilities" target="_blank"&gt;https://www.dynatrace.com/support/help/shortlink/dynatrace-android-gradle-plugin-overview#instrumentation-specific-capabilities&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jan 2023 09:31:29 GMT</pubDate>
    <dc:creator>Patrick_H</dc:creator>
    <dc:date>2023-01-04T09:31:29Z</dc:date>
    <item>
      <title>Auto-instrumenting an Android app for UEM, obfuscated apk</title>
      <link>https://community.dynatrace.com/t5/Real-User-Monitoring/Auto-instrumenting-an-Android-app-for-UEM-obfuscated-apk/m-p/65301#M5195</link>
      <description>&lt;P&gt;We are trying to use auto-instrumentation to instrument the Android UEM, they use obfuscation when creating the apk file with proguard: &lt;BR /&gt;-proguardFiles getDefaultProguardFile("proguard-android.txt"), "proguard-rules.pro" &lt;BR /&gt;Would this cause any problem with the auto-instrumentation, would it work?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2023 11:27:43 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Real-User-Monitoring/Auto-instrumenting-an-Android-app-for-UEM-obfuscated-apk/m-p/65301#M5195</guid>
      <dc:creator>alejandro_herna</dc:creator>
      <dc:date>2023-06-19T11:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: Auto-instrumenting an Android app for UEM, Obsfucated apk.</title>
      <link>https://community.dynatrace.com/t5/Real-User-Monitoring/Auto-instrumenting-an-Android-app-for-UEM-obfuscated-apk/m-p/65302#M5196</link>
      <description>&lt;P&gt;Hey Alejandro,&lt;/P&gt;&lt;P&gt;Yes, you have to exclude some parts from obfuscation and optimization. Regarding your other &lt;A href="https://answers.dynatrace.com/questions/201123/is-okhttp3-supported-for-mobile-uem-android.html"&gt;question&lt;/A&gt;, you have to exclude the OkHttp3 library from obfuscating. You find the details in the &lt;A href="https://www.dynatrace.com/support/help/user-experience/mobile-apps/how-do-i-use-advanced-settings-for-android-auto-instrumentation/"&gt;documentation&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;When you enrich your mobile user experience data via the OneAgent SDK for Mobile, then you also have to exclude the OneAgent library from obfuscating. This step is not needed, when you use the latest agent (version 7.1).&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2018 05:50:59 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Real-User-Monitoring/Auto-instrumenting-an-Android-app-for-UEM-obfuscated-apk/m-p/65302#M5196</guid>
      <dc:creator>Thomas_Wirth1</dc:creator>
      <dc:date>2018-04-24T05:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: Auto-instrumenting an Android app for UEM, Obsfucated apk.</title>
      <link>https://community.dynatrace.com/t5/Real-User-Monitoring/Auto-instrumenting-an-Android-app-for-UEM-obfuscated-apk/m-p/65303#M5197</link>
      <description>&lt;P&gt;Than you &lt;A rel="user" href="https://answers.dynatrace.com/users/11878/view.html" nodeid="11878"&gt;@Thomas W.&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 14:53:57 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Real-User-Monitoring/Auto-instrumenting-an-Android-app-for-UEM-obfuscated-apk/m-p/65303#M5197</guid>
      <dc:creator>alejandro_herna</dc:creator>
      <dc:date>2018-04-26T14:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: Auto-instrumenting an Android app for UEM, Obsfucated apk.</title>
      <link>https://community.dynatrace.com/t5/Real-User-Monitoring/Auto-instrumenting-an-Android-app-for-UEM-obfuscated-apk/m-p/201421#M5198</link>
      <description>&lt;P&gt;update: recent plugin version (8+) performs the instrumentation before obfuscation is done, thus the obfuscation rules no longer need to be adjusted. Details can be found here:&amp;nbsp;&lt;A href="https://www.dynatrace.com/support/help/shortlink/dynatrace-android-gradle-plugin-overview#instrumentation-specific-capabilities" target="_blank"&gt;https://www.dynatrace.com/support/help/shortlink/dynatrace-android-gradle-plugin-overview#instrumentation-specific-capabilities&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2023 09:31:29 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Real-User-Monitoring/Auto-instrumenting-an-Android-app-for-UEM-obfuscated-apk/m-p/201421#M5198</guid>
      <dc:creator>Patrick_H</dc:creator>
      <dc:date>2023-01-04T09:31:29Z</dc:date>
    </item>
  </channel>
</rss>

