The CNAME feature allows you to create hostnames under your own application’s domain which will be used in place of Pendo hostnames for both sending events and downloading guide content. This helps ensure that events are collected and guides are served to end users who are subject to ad-blocking software, firewalls, web filters, etc.
What does CNAME stand for?
A Canonical Name record (abbreviated as CNAME record) is a type of resource record in the Domain Name System (DNS) used to specify that a domain name is an alias for another domain, which is the "canonical" domain.
Note: Reach out to your Customer Success Manager or firstname.lastname@example.org to begin setting up CNAME for your Pendo subscription.
Provide a subdomain of your corporate domain, such as
product.example.com (where ‘example’ is your corporate domain).
Pendo provides a set of required DNS entries which must be created. They look something like:
|product.example.com||1234567812345678-txt.example.pendo.io||This record is used to validate to Google that Pendo can serve data.product.example.com via Google App Engine.|
|data.product.example.com||1234567812345678-data.example.pendo.io||This record is an alias to app.pendo.io.|
|content.product. example.com||1234567812345678-content.example.pendo.io||This record is an alias to a custom CDN configuration for your Pendo subscription.|
|_0123456789abcdef. content.product. example.com||_fedcab987654321.acm-validations.aws||This record is used to validate subdomain ownership to Amazon so that SSL certificates can be autogenerated.|
The above examples are placeholders, Pendo will provide the actual set of DNS entries to be created.
Once the DNS entries are configured, Pendo completes the infrastructure configuration which includes autogeneration of SSL certificates for the new hostnames.
Pendo updates the "data host" and "content host" in Subscription Settings to point to
Update your Pendo Snippet
The Pendo application triggers a rewrite of the Subscription’s Pendo Agent using the new settings. From this point on, all communication with Pendo happens via the aliases provided.
Next, you will need to update your Pendo snippet anywhere it’s installed with your new "content host."
Resave Your Guides
You will need to re-save each of your existing Guides so their content will be pulled from the new aliases.
Repeat these steps for every active Guide.
- In Guide Details, click Manage In-App.
- In the Visual Design Studio, Click Save in the Guide Management bar.
- Click Exit to leave the Visual Design Studio.
- Repeat for each Guide that will be published after activating CNAME.
- Once a Guide is resaved, its content is pulled from the alias domain.
CNAME for Pendo Mobile
Requirements: Mobile CNAME requires Android and iOS SDK version 2.5.1 or higher
Note: The Hash values required below are provided by Pendo after the certificates are installed.
Enabling CNAME in Android
Add the following entries to the app’s Manifest.xml, inside the <application> tag:
<meta-data android:name="pnd_device_url" android:value="https://device_url.acme.com/" />
<meta-data android:name="pnd_app_url" android:value="https://app_url.acme.com/" />
<meta-data android:name="pnd_data_url" android:value="https://data_url.acme.com/" />
<meta-data android:name="pnd_device_hash" android:value="sha256/035gh43/1Df3aP/dh3j7iHFk23gs7Upuf8R4gd=" />
<meta-data android:name="pnd_data_hash" android:value="sha256/03gp63/3Da143/k64vr5df526d7=" />
Enabling CNAME in iOS
Add the following mapping to your info.plist
Frequently Asked Questions
Can I provide my own SSL certificates?
You can provide a single SSL certificate suitable for both the data and content hostnames, or provide two separate certificates. There are two ways to handle certificate generation.
- Generate a key and CSR, obtain a certificate from your CA, and send us an encrypted archive containing the certificate chain and private key. Our default is to send PGP-encrypted files via keybase.io to a member of our OPS team, such as https://keybase.io/a13m. If you prefer your own approved secure file transfer mechanism, we can use that instead.
- Provide us a text file suitable for generating a CSR. Pendo generates a key and CSR, sends you the CSR, which you use to obtain a certificate from your CA. This eliminates the need to pass a private key between parties; the certificate chain is safe to send via plaintext email. The CSR input file looks like the following:
[ req ] default_bits = 2048 prompt = no encrypt_key = no default_md = sha256 distinguished_name = dn req_extensions = req_ext [ dn ] commonName = Common Name (server FQDN; data.product.example.com) organizationName = Organization Name (eg, company) localityName = Locality Name (eg, city) stateOrProvinceName = State or Province Name (full name) countryName = Country Name (2 letter code) organizationName = Organizational Unit Name (eg, section) [ req_ext ] subjectAltName = @alt_names [ alt_names ] DNS.1 = data.product.example.com DNS.2 = content.product.example.com