3 - Verify Deployments with Dynatrace

Updated 2 weeks ago by Michael Cretzman

The following procedure describes how to add Dynatrace as a verification step in a Harness workflow. For more information about workflows, see Add a Workflow.

Once you run a deployment and Dynatrace preforms verification, Harness' machine-learning verification analysis will assess the risk level of the deployment.

In order to obtain the names of the host(s), pod(s), or container(s) where your service is deployed, the verification provider should be added to your workflow after you have run at least one successful deployment.

Deployment Verification Setup

To verify your deployment with Dynatrace, do the following:

  1. Ensure that you have added Dynatrace as a verification provider, as described above.
  2. In your workflow, under Verify Service, click Add Verification, and then click Dynatrace. The Dynatrace dialog appears.

The Dynatrace dialog has the following fields.



Dynatrace Server

This dropdown contains the names of the Dynatrace verification providers you added, as described above.Select the name of the Dynatrace verification provider that connects to the Dynatrace environment associated with the microservice/application this workflow deploys.

Service Methods

Enter the SERVICE_METHOD IDs of your key transactions. These are the service methods (key business transactions) you want to verify in addition to a verification time period (the default is 15 minutes).

The transactions must be marked as key transactions in Dynatrace because the Dynatrace API supports fetching of data only if a transaction is marked as a key request.

Harness is working with Dynatrace to update their API so you can just select an application or service name and it will automatically verify all key business transactions associated by default.

To find the SERVICE_METHOD ID of a transaction, do the following:

  1. In Dynatrace, click Transactions & services.
  2. In All monitored services, click the name of the service you are monitoring.
  3. In the service's page, click a hotspot in Hotspots in selected timeframe.
  4. In the Details page, go to the URL in the browser location field, and copy the SERVICE_METHOD-number for the service.
  5. In Harness, paste that number into the Service Methods field of the Dynatrace dialog.
  6. Repeat these steps for all the hotspots you want to use when verifying your deployment.

Analysis Time duration

Set the duration for the verification step. If a verification step exceeds the value, the workflow Failure Strategy is triggered. For example, if the Failure Strategy is Ignore, then the verification state is marked Failed but the workflow execution continues.

See CV Strategies, Tuning, and Best Practices.

Baseline for Risk Analysis

See CV Strategies, Tuning, and Best Practices.

Algorithm Sensitiivty

See CV Strategies, Tuning, and Best Practices.

When you are finished, click SUBMIT. The Dynatrace verification step is added to your workflow.

Verification Results

Once you have deployed your workflow (or pipeline) using the Dynatrace verification step, you can automatically verify cloud application and infrastructure performance across your deployment. For more information, see Add a Workflow and Add a Pipeline.

Workflow Verification

To see the results of Harness machine-learning evaluation of your Dynatrace verification, in your workflow or pipeline deployment you can expand the Verify Service step and then click the Dynatrace step.

Continuous Verification

You can also see the evaluation in the Continuous Verification dashboard. The workflow verification view is for the DevOps user who developed the workflow. The Continuous Verification dashboard is where all future deployments are displayed for developers and others interested in deployment analysis.

To learn about the verification analysis features, see the following sections.

Transaction Analysis

Execution details: See the details of verification execution. Total is the total time the verification step took, and Analysis duration is how long the analysis took.

Risk level analysis: Get an overall risk level and view the cluster chart to see events.

Transaction-level summary: See a summary of each transaction with the query string, error values comparison, and a risk analysis summary.

Execution Analysis

Event type: Filter cluster chart events by Unknown Event, Unexpected Frequency, Anticipated Event, Baseline Event, and Ignore Event.

Cluster chart: View the chart to see how the selected event contrast. Click each event to see its log details.

Event Management

Event-level analysis: See the threat level for each event captured.

Tune event capture: Remove events from analysis at the service, workflow, execution, or overall level.

Event distribution: Click the chart icon to see an event distribution including the measured data, baseline data, and event frequency.

Next Steps

How did we do?