<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: [Dynatrace Managed] OneAgent and ActiveGate download fails - cannot verify certificate (expired) in Dynatrace Managed Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Dynatrace-Managed-OneAgent-and-ActiveGate-download-fails-cannot/m-p/174976#M1813</link>
    <description>&lt;DIV class="page-content"&gt;
&lt;DIV class="wrapper"&gt;
&lt;H1&gt;&lt;FONT face="verdana,geneva"&gt;What should you do?&lt;/FONT&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;For most of you, nothing at all! We’ve set up our certificate issuance so your environments will do the right thing in most cases, favoring broad compatibility. However, if you are running legacy operating systems, you’ll need to make sure of two things: &lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;(1) your host or a container must trust ISRG Root X1 (not just DST Root CA X3), and&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt; (2) &lt;A href="https://community.letsencrypt.org/t/openssl-client-compatibility-changes-for-let-s-encrypt-certificates/143816" target="_blank" rel="noopener"&gt;you must use OpenSSL version 1.1.0 or later&lt;/A&gt;. In OpenSSL 1.0.x, a quirk in certificate verification means that even clients that trust ISRG Root X1 will fail when presented with the Android-compatible certificate chain we are recommending by default.&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT face="verdana,geneva"&gt;How to trust and update certificates?&lt;/FONT&gt;&lt;/H1&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;SPAN&gt;How to do this depends on the&amp;nbsp;&lt;/SPAN&gt;&lt;I data-stringify-type="italic"&gt;operating system of the TLS client&lt;/I&gt;&lt;SPAN&gt;. For example:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lb-txt-normal lb-rtxt"&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Ubuntu 16.04:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;Update OpenSSL to version&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989" target="_blank" rel="noopener"&gt;1.0.2g-1ubuntu4.20&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or newer.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Amazon Linux and Amazon Linux 2:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;Amazon Linux instances can be relaunched to apply the updated ca-certificates package automatically. Should existing instances need to be updated, customers can update ca-certificates by running the following:&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lb-code lb-ctxt-p lb-no-highlighting" data-lb-comp="code" data-lb-comp-registered="true"&gt;&lt;LI-CODE lang="plainText"&gt;sudo yum update ca-certificates&lt;/LI-CODE&gt;&lt;/DIV&gt;
&lt;DIV class="lb-txt-normal lb-rtxt"&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;For customers using an AMI with a locked repository GUID, like Elastic Beanstalk, you can install updated ca-certificates package using following commands:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Amazon Linux 1&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lb-code lb-ctxt-p lb-no-highlighting" data-lb-comp="code" data-lb-comp-registered="true"&gt;&lt;LI-CODE lang="plainText"&gt;sudo yum install https://cdn.amazonlinux.com/patch/ca-certificates-update-2021-09-30/ca-certificates-2018.2.22-65.1.24.amzn1.noarch.rpm&lt;/LI-CODE&gt;&lt;/DIV&gt;
&lt;DIV class="lb-txt-normal lb-rtxt"&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Amazon Linux 2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lb-code lb-ctxt-p lb-no-highlighting" data-lb-comp="code" data-lb-comp-registered="true"&gt;&lt;LI-CODE lang="plainText"&gt;sudo yum install https://cdn.amazonlinux.com/patch/ca-certificates-update-2021-09-30/ca-certificates-2021.2.50-72.amzn2.0.1.noarch.rpm&lt;/LI-CODE&gt;&lt;/DIV&gt;
&lt;DIV class="lb-txt-normal lb-rtxt"&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Red Hat and CentOS 7:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Update ca-certificates package to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://access.redhat.com/errata/RHBA-2021:3649" target="_blank" rel="noopener"&gt;2021.2.50-72.el7_9&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or later.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or follow a quick fix as in here:&amp;nbsp;&lt;A href="https://mender.io/blog/quick-fix-for-lets-encrypt-root-certificate-expiry" target="_blank" rel="noopener"&gt;https://mender.io/blog/quick-fix-for-lets-encrypt-root-certificate-expiry&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;Public news:&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT face="verdana,geneva"&gt;&lt;A href="https://portswigger.net/daily-swig/lets-encrypt-root-cert-update-catches-out-many-big-name-tech-firms" target="_self"&gt;Let’s Encrypt root cert update catches out many big-name tech firms&lt;/A&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Thu, 28 Oct 2021 11:41:32 GMT</pubDate>
    <dc:creator>Radoslaw_Szulgo</dc:creator>
    <dc:date>2021-10-28T11:41:32Z</dc:date>
    <item>
      <title>[Dynatrace Managed] OneAgent and ActiveGate download fails - cannot verify certificate (expired)</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Dynatrace-Managed-OneAgent-and-ActiveGate-download-fails-cannot/m-p/173678#M1811</link>
      <description>&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;Hey Community!&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;I've recently been in touch with our users having problems to download OneAgent and ActiveGate from their Dynatrace Managed cluster. The `wget` command fails as following:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="c-mrkdwn__pre" data-stringify-type="pre"&gt;&lt;FONT face="verdana,geneva"&gt;wget  -O Dynatrace-OneAgent-Linux-1.217.187.sh https://xxx123.dynatrace-managed.com/e/xxx/api/v1/deployment/installer/agent/unix/default/latest?arch=x86&amp;amp;flavor=default --header="Authorization: Api-Token &amp;lt;token&amp;gt;"
--2021-10-07 19:56:58--  https://xxx123.dynatrace-managed.com/e/xxx/api/v1/deployment/installer/agent/unix/default/latest?arch=x86&amp;amp;flavor=default
Resolving xxx123.dynatrace-&lt;SPAN class="c-mrkdwn__highlight"&gt;managed&lt;/SPAN&gt;.com (xxx123.dynatrace-&lt;SPAN class="c-mrkdwn__highlight"&gt;managed&lt;/SPAN&gt;.com)... 135.xxx.xxx.xxx, 135.xxx.xxx.xxx, 135.xxx.xxx.xxx
Connecting to xxx123.dynatrace-&lt;SPAN class="c-mrkdwn__highlight"&gt;managed&lt;/SPAN&gt;.com (xxx123.dynatrace-&lt;SPAN class="c-mrkdwn__highlight"&gt;managed&lt;/SPAN&gt;.com)|135.xxx.xxx.xxx|:443... connected.
ERROR: cannot verify xxx123.dynatrace-&lt;SPAN class="c-mrkdwn__highlight"&gt;managed&lt;/SPAN&gt;.com's certificate, issued by '/C=US/O=Let's Encrypt/CN=R3':
  Issued certificate has expired.&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;"Issues arose not so much because of clients running obsolete versions of operating systems, but because the servers of several&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://portswigger.net/daily-swig/organizations" target="_blank" rel="noopener"&gt;organizations&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;failed to serve updated certificate chains to clients due to configuration problems." says&amp;nbsp;portswigger.net.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;The reason is expired Let's Encrypt Root certificate on the host where you want to monitor OneAgent. Here's an official Let's Encrypt statement:&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="verdana,geneva"&gt;&lt;EM&gt;As planned, the DST Root CA X3 has&amp;nbsp;&lt;A href="https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/" target="_blank" rel="noopener"&gt;expired&lt;/A&gt;&amp;nbsp;and we’re now using our own ISRG Root X1 for trust. We used a cross-sign with DST Root CA X3 to gain broad trust for our certificates when we were just starting out. Now our own root is widely trusted.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;(source:&amp;nbsp;&lt;A href="https://letsencrypt.org/2021/10/01/cert-chaining-help.html" target="_blank" rel="noopener"&gt;https://letsencrypt.org/2021/10/01/cert-chaining-help.html&lt;/A&gt;)&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;Read more to find out details.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="hero slim"&gt;
&lt;DIV class="container"&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;H1&gt;&lt;FONT face="verdana,geneva"&gt;Am I affected?&lt;/FONT&gt;&lt;/H1&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;Instances and containers running the following operating systems might not be able to connect to Dynatrace Managed clusters using Dynatrace-provided certificates:&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT face="verdana,geneva"&gt;CentOS and RHEL 7 or lower&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT face="verdana,geneva"&gt;Amazon Linux and Amazon Linux 2&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT face="verdana,geneva"&gt;Ubuntu 16.04 or lower&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT face="verdana,geneva"&gt;Debian 8 or lower&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;With OpenSSL 1.0.2, the untrusted chain is always preferred. This means that the expired certificate is seen and the entire chain is distrusted as expired. Servers with the affected version of OpenSSL and the DST Root CA X3 certificate in their root store can't connect to Dynatrace Managed clusters.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 30 Nov 2021 12:01:16 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Dynatrace-Managed-OneAgent-and-ActiveGate-download-fails-cannot/m-p/173678#M1811</guid>
      <dc:creator>Radoslaw_Szulgo</dc:creator>
      <dc:date>2021-11-30T12:01:16Z</dc:date>
    </item>
    <item>
      <title>Re: [Dynatrace Managed] OneAgent and ActiveGate download fails - cannot verify certificate (expired)</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Dynatrace-Managed-OneAgent-and-ActiveGate-download-fails-cannot/m-p/174974#M1812</link>
      <description>&lt;P&gt;Very interesting post-mortem analysis of the issue:&amp;nbsp;&lt;A href="https://scotthelme.co.uk/lets-encrypt-root-expiration-post-mortem/" target="_blank"&gt;https://scotthelme.co.uk/lets-encrypt-root-expiration-post-mortem/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Oct 2021 11:40:29 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Dynatrace-Managed-OneAgent-and-ActiveGate-download-fails-cannot/m-p/174974#M1812</guid>
      <dc:creator>Radoslaw_Szulgo</dc:creator>
      <dc:date>2021-10-28T11:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: [Dynatrace Managed] OneAgent and ActiveGate download fails - cannot verify certificate (expired)</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Dynatrace-Managed-OneAgent-and-ActiveGate-download-fails-cannot/m-p/174976#M1813</link>
      <description>&lt;DIV class="page-content"&gt;
&lt;DIV class="wrapper"&gt;
&lt;H1&gt;&lt;FONT face="verdana,geneva"&gt;What should you do?&lt;/FONT&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;For most of you, nothing at all! We’ve set up our certificate issuance so your environments will do the right thing in most cases, favoring broad compatibility. However, if you are running legacy operating systems, you’ll need to make sure of two things: &lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;(1) your host or a container must trust ISRG Root X1 (not just DST Root CA X3), and&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt; (2) &lt;A href="https://community.letsencrypt.org/t/openssl-client-compatibility-changes-for-let-s-encrypt-certificates/143816" target="_blank" rel="noopener"&gt;you must use OpenSSL version 1.1.0 or later&lt;/A&gt;. In OpenSSL 1.0.x, a quirk in certificate verification means that even clients that trust ISRG Root X1 will fail when presented with the Android-compatible certificate chain we are recommending by default.&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT face="verdana,geneva"&gt;How to trust and update certificates?&lt;/FONT&gt;&lt;/H1&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;SPAN&gt;How to do this depends on the&amp;nbsp;&lt;/SPAN&gt;&lt;I data-stringify-type="italic"&gt;operating system of the TLS client&lt;/I&gt;&lt;SPAN&gt;. For example:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lb-txt-normal lb-rtxt"&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Ubuntu 16.04:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;Update OpenSSL to version&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989" target="_blank" rel="noopener"&gt;1.0.2g-1ubuntu4.20&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or newer.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Amazon Linux and Amazon Linux 2:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;Amazon Linux instances can be relaunched to apply the updated ca-certificates package automatically. Should existing instances need to be updated, customers can update ca-certificates by running the following:&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lb-code lb-ctxt-p lb-no-highlighting" data-lb-comp="code" data-lb-comp-registered="true"&gt;&lt;LI-CODE lang="plainText"&gt;sudo yum update ca-certificates&lt;/LI-CODE&gt;&lt;/DIV&gt;
&lt;DIV class="lb-txt-normal lb-rtxt"&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;For customers using an AMI with a locked repository GUID, like Elastic Beanstalk, you can install updated ca-certificates package using following commands:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Amazon Linux 1&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lb-code lb-ctxt-p lb-no-highlighting" data-lb-comp="code" data-lb-comp-registered="true"&gt;&lt;LI-CODE lang="plainText"&gt;sudo yum install https://cdn.amazonlinux.com/patch/ca-certificates-update-2021-09-30/ca-certificates-2018.2.22-65.1.24.amzn1.noarch.rpm&lt;/LI-CODE&gt;&lt;/DIV&gt;
&lt;DIV class="lb-txt-normal lb-rtxt"&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Amazon Linux 2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lb-code lb-ctxt-p lb-no-highlighting" data-lb-comp="code" data-lb-comp-registered="true"&gt;&lt;LI-CODE lang="plainText"&gt;sudo yum install https://cdn.amazonlinux.com/patch/ca-certificates-update-2021-09-30/ca-certificates-2021.2.50-72.amzn2.0.1.noarch.rpm&lt;/LI-CODE&gt;&lt;/DIV&gt;
&lt;DIV class="lb-txt-normal lb-rtxt"&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;&lt;STRONG&gt;Red Hat and CentOS 7:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Update ca-certificates package to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://access.redhat.com/errata/RHBA-2021:3649" target="_blank" rel="noopener"&gt;2021.2.50-72.el7_9&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or later.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or follow a quick fix as in here:&amp;nbsp;&lt;A href="https://mender.io/blog/quick-fix-for-lets-encrypt-root-certificate-expiry" target="_blank" rel="noopener"&gt;https://mender.io/blog/quick-fix-for-lets-encrypt-root-certificate-expiry&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;Public news:&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT face="verdana,geneva"&gt;&lt;A href="https://portswigger.net/daily-swig/lets-encrypt-root-cert-update-catches-out-many-big-name-tech-firms" target="_self"&gt;Let’s Encrypt root cert update catches out many big-name tech firms&lt;/A&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 28 Oct 2021 11:41:32 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Dynatrace-Managed-OneAgent-and-ActiveGate-download-fails-cannot/m-p/174976#M1813</guid>
      <dc:creator>Radoslaw_Szulgo</dc:creator>
      <dc:date>2021-10-28T11:41:32Z</dc:date>
    </item>
  </channel>
</rss>

