Disabling SOAP/HTTP header injection for Java and .NET Agents.

Document ID : KB000006603
Last Modified Date : 18/02/2018
Show Technical Document Details
Issue:

 An unwanted SOAP or HTTP header is added to the webservice call for a newly deployed application managed by the APM Java/.Net agent.

Environment:
Introscope Agent from 9.6 onwards
Resolution:

Per the 9.x and 10x CA APM for SOA Implementation Guide, if the CA APM SOA Extension is installed, then the SOAP header insertion is enabled by default in Java and .NET Agents.

To disable the SOAP header insertion, follow these instructions:

JAVA AGENT:
Add below properties under your Agent profile and set to false:
com.wily.introscope.agent.soapheaderinsertion.enabled=false
com.wily.introscope.agent.soapheaderread.enabled=false
com.wily.introscope.agent.httpheaderinsertion.enabled=false
com.wily.introscope.agent.httpheaderread.enabled=false

If using Browser Agent (BRTM) ensure that automatic snippet injection is disabled in the agent profile i.e.
introscope.agent.browseragent.autoInjectionEnabled=false


.NET AGENT:
Under your Webservices.pbd please comment the below lines:
#TurnOn: WebServicesCorrelationTracing
#TurnOn: WCFRuntimeTracing


If using MVC applications in default-typical.pbl comment this line:
#MVC.pbd 

If using Browser Agent (BRTM) ensure that automatic snippet injection is disabled in the agent profile i.e.
introscope.agent.browseragent.autoInjectionEnabled=false

Additional Information:

 There are additional http header insertion/read settings which may or may not be disabled by default, depending on the SOA platform. See the CA APM for SOA Implementation Guide (available on docops.ca.com).