<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS lookup monitoring in Dynatrace tips</title>
    <link>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/185982#M396</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/937"&gt;@ben_wrightson&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you do not need to run any DNS validation plugin outside your company's network to perform a DNS validation "from the outside".&lt;BR /&gt;If I got you right you can use any DNS lookup from the inside and just perform the lookup against an external DNS server?&lt;BR /&gt;Just like with "dig" against different NS servers:&lt;BR /&gt;(I do have a split DNS setup, where FQDNs resolve to different IPs while in the LAN or if queried on the public Internet)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;% dig unifi.dy.natrace.it @8.8.8.8 | grep "ANSWER SECTION" -A 1
;; ANSWER SECTION:
unifi.dy.natrace.it.	285	IN	A	46.244.228.59
% dig unifi.dy.natrace.it @192.168.1.252 | grep "ANSWER SECTION" -A 1
;; ANSWER SECTION:
unifi.dy.natrace.it.	0	IN	A	192.168.1.254&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 05 May 2022 07:22:32 GMT</pubDate>
    <dc:creator>r_weber</dc:creator>
    <dc:date>2022-05-05T07:22:32Z</dc:date>
    <item>
      <title>Monitor DNS Lookups with Dynatrace for Faster Resolution</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/181660#M349</link>
      <description>&lt;P&gt;&lt;EM&gt;Summary: This thread explains how Dynatrace monitors DNS lookups and provides insights into resolution times. It includes configuration tips for detecting DNS-related performance issues.&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Occasionally, customers ask about performing regular DNS lookups for certain domains to check whether they are still reachable.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since the out-of-the-box Synthetic monitors only allow HTTP(S), one way of doing this is with an extension (see&amp;nbsp;&lt;A href="https://www.dynatrace.com/news/blog/monitor-your-whole-infrastructure-using-synthetic-monitors/" target="_blank" rel="noopener"&gt;https://www.dynatrace.com/news/blog/monitor-your-whole-infrastructure-using-synthetic-monitors/&lt;/A&gt;).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, some customers have to overcome organizational challenges with this, because the extensions run on an ActiveGate, and if you want to run an ActiveGate outside of your corporate network (because you want to test the DNS lookup outside of your corporate network), then there may be additional hurdles to jump.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another way of doing this is by using a DNS-over-HTTPS (DoH) service and just sending an HTML request and doing a DNS lookup that way. That can be done with the built-in functionality of HTTP Monitors (be sure to validate the result!) and has the advantage that it will work both inside your corporate network (with Private Locations) and outside (with Public synthetic locations).&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2026 13:47:38 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/181660#M349</guid>
      <dc:creator>ben_wrightson</dc:creator>
      <dc:date>2026-01-21T13:47:38Z</dc:date>
    </item>
    <item>
      <title>Re: DNS lookup monitoring</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/181896#M352</link>
      <description>&lt;P&gt;Hi Ben,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;There is an Active Gate extension that can be used for DNS monitoring if required.&amp;nbsp;&lt;BR /&gt;&lt;A href="https://github.com/Dynatrace/dynatrace-api/tree/master/third-party-synthetic/active-gate-extensions" target="_blank"&gt;dynatrace-api/third-party-synthetic/active-gate-extensions at master · Dynatrace/dynatrace-api · GitHub&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;In Addition, there are also ones for TCP / Port &amp;amp; Ping checks.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Hope this helps.&amp;nbsp;&amp;nbsp;Just deploy it in the same way as a standard extension.&lt;BR /&gt;These then appear under your Synthetics Tab.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Hope it helps.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 06:55:10 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/181896#M352</guid>
      <dc:creator>gopher</dc:creator>
      <dc:date>2022-03-07T06:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: DNS lookup monitoring</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/182411#M360</link>
      <description>&lt;P&gt;Hi Peter,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know. These are the same ones that are linked to in the blog post I linked above.&lt;BR /&gt;&lt;BR /&gt;Problem is, if you want to run a DNS test from outside your company's network, you'll need an ActiveGate outside your company's network to run these extensions.&lt;BR /&gt;Using DoH will work without having to run an external ActiveGate, but can simply run on Public Synthetic locations instead.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 15:19:27 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/182411#M360</guid>
      <dc:creator>ben_wrightson</dc:creator>
      <dc:date>2022-03-14T15:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: DNS lookup monitoring</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/185875#M394</link>
      <description>&lt;P&gt;Hi Ben,&lt;/P&gt;&lt;P&gt;I'm curious about this part:&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/937"&gt;@ben_wrightson&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Occasionally, customers ask about doing regular DNS lookups of certain domains so they know whether these domains are still reachable.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;So the customer is not interested if the DNS server is operating, but if the record has been (or not) propagated? Or is it a case of records being deleted?&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2022 12:11:34 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/185875#M394</guid>
      <dc:creator>DavorinKrivak</dc:creator>
      <dc:date>2022-05-03T12:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: DNS lookup monitoring</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/185982#M396</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/937"&gt;@ben_wrightson&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you do not need to run any DNS validation plugin outside your company's network to perform a DNS validation "from the outside".&lt;BR /&gt;If I got you right you can use any DNS lookup from the inside and just perform the lookup against an external DNS server?&lt;BR /&gt;Just like with "dig" against different NS servers:&lt;BR /&gt;(I do have a split DNS setup, where FQDNs resolve to different IPs while in the LAN or if queried on the public Internet)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;% dig unifi.dy.natrace.it @8.8.8.8 | grep "ANSWER SECTION" -A 1
;; ANSWER SECTION:
unifi.dy.natrace.it.	285	IN	A	46.244.228.59
% dig unifi.dy.natrace.it @192.168.1.252 | grep "ANSWER SECTION" -A 1
;; ANSWER SECTION:
unifi.dy.natrace.it.	0	IN	A	192.168.1.254&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2022 07:22:32 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/185982#M396</guid>
      <dc:creator>r_weber</dc:creator>
      <dc:date>2022-05-05T07:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: DNS lookup monitoring</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/186013#M397</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/35572"&gt;@DavorinKrivak&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;SPAN&gt;So the customer is not interested if the DNS server is operating, but if the record has been (or not) propagated? Or is it a case of records being deleted?&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;HR /&gt;&lt;P&gt;Yes, exactly. They want to make sure their DNS record hasn't expired or been deleted accidentally.&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2022 13:10:37 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/186013#M397</guid>
      <dc:creator>ben_wrightson</dc:creator>
      <dc:date>2022-05-05T13:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: DNS lookup monitoring</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/186014#M398</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;true, and a good point.&lt;BR /&gt;However, there may be restrictions on outside communication sometimes.&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2022 13:13:03 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/186014#M398</guid>
      <dc:creator>ben_wrightson</dc:creator>
      <dc:date>2022-05-05T13:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: DNS lookup monitoring</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/186044#M399</link>
      <description>&lt;P&gt;In my experience DNS queries (via UDP/TCP 53) is almost never blocked in connected infrastructure that is not completely isolated. So it's more likely that you can do DNS queries than DNS over HTTP queries in my opinion.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;(I remember the times where I used DNSTX - tunneling data over DNS TXT queries in expensive public WiFi Hotspots without paying because DNS queries were always allowed &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Another way could be to perform queries to the authoritative DNS server of the (public) DNS entry by determining the AUTH DNS server from whatever DNS server is available on an Activegate (assuming plugin solution) and then using the solution above.&lt;BR /&gt;But this would still require to be able to perform DNS queries to the outside.&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2022 23:18:31 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/186044#M399</guid>
      <dc:creator>r_weber</dc:creator>
      <dc:date>2022-05-05T23:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: DNS lookup monitoring</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/186077#M400</link>
      <description>&lt;P&gt;A shell script can be kept on their network premise server which belongs to a DMZ. The execution script can consist list of domain names which needed to be checked on scheduled basis and output can be generated as required in&amp;nbsp; a log file. We can the try pulling this logs in Dynatarce. Script executing triggers and backup renaming of logs or deleting it will be required to be schedule using some cron jobs. Below is jsut a simple example hope you can do something similar terms to help with the required data.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;{...........&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;while read ADDR&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;do&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nslookup ${ADDR} | tee -a mylookup.log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;done &amp;lt; mylookup&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;...where 'mylookup' is a file with one IP or FQDN per line:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;10.10.11.12&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;host01.xyz.net&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;host02.xyz.net&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;...........}&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2022 10:47:22 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Monitor-DNS-Lookups-with-Dynatrace-for-Faster-Resolution/m-p/186077#M400</guid>
      <dc:creator>techean</dc:creator>
      <dc:date>2022-05-06T10:47:22Z</dc:date>
    </item>
  </channel>
</rss>

