<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PostgresDB (remote monitoring) Extension 2.0 Question in Extensions</title>
    <link>https://community.dynatrace.com/t5/Extensions/PostgresDB-remote-monitoring-extension-2-0/m-p/244216#M4375</link>
    <description>&lt;P&gt;An alternative to using &lt;STRONG&gt;superuser&lt;/STRONG&gt;&amp;nbsp;would be to grant the&amp;nbsp;&lt;STRONG&gt;pg_read_all_stats&lt;/STRONG&gt; role to the user. Or, what is even more commonly done, is to grant the&amp;nbsp;&lt;STRONG&gt;pg_monitor&lt;/STRONG&gt; role.&lt;/P&gt;&lt;P&gt;Here is an excerpt from the Postgres v15 documentation:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;SPAN&gt;The&amp;nbsp;&lt;/SPAN&gt;pg_monitor&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;pg_read_all_settings&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;pg_read_all_stats&lt;SPAN&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;pg_stat_scan_tables&lt;SPAN&gt;&amp;nbsp;roles are intended to allow administrators to easily configure a role for the purpose of monitoring the database server. They grant a set of common privileges allowing the role to read various useful configuration settings, statistics and other system information normally restricted to superusers.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;pg_monitor: Read/execute various monitoring views and functions. This role is a member of&amp;nbsp;pg_read_all_settings,&amp;nbsp;pg_read_all_stats&amp;nbsp;and&amp;nbsp;pg_stat_scan_tables.&lt;/SPAN&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;We will look into updating the hub tile with the recommendation of using&amp;nbsp;&lt;STRONG&gt;pg_monitor&lt;/STRONG&gt; or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;pg_read_all_stats&lt;/STRONG&gt; role.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Apr 2024 09:40:30 GMT</pubDate>
    <dc:creator>vagiz_duseev</dc:creator>
    <dc:date>2024-04-29T09:40:30Z</dc:date>
    <item>
      <title>PostgresDB remote monitoring extension 2.0</title>
      <link>https://community.dynatrace.com/t5/Extensions/PostgresDB-remote-monitoring-extension-2-0/m-p/244103#M4371</link>
      <description>&lt;P&gt;We are currently reviewing the new&amp;nbsp;&lt;A href="https://www.dynatrace.com/hub/detail/postgresdb-remote-monitoring/" target="_blank" rel="noopener"&gt;PostgresDB (remote monitoring)&lt;/A&gt; extension to see if we want to utilize this in our environment and take advantage of what it provides.&lt;/P&gt;
&lt;P&gt;It mentions that the Dynatrace database user we need to create would need &lt;STRONG&gt;superuser&lt;/STRONG&gt; role permissions in order to query/collect WAL metrics.&lt;/P&gt;
&lt;P&gt;However, the concern is that the &lt;STRONG&gt;superuser&lt;/STRONG&gt; role would technically have access to everything else the role inherently has access to.&lt;/P&gt;
&lt;P&gt;As a company that follows a "least privilege" policy, is the &lt;STRONG&gt;superuser&lt;/STRONG&gt; role required?&lt;/P&gt;
&lt;P&gt;Could we not create a new role that only has SELECT access to the specific schemas/tables that Dynatrace needs to execute the WAL queries?&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 13:39:27 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Extensions/PostgresDB-remote-monitoring-extension-2-0/m-p/244103#M4371</guid>
      <dc:creator>ASE</dc:creator>
      <dc:date>2024-05-10T13:39:27Z</dc:date>
    </item>
    <item>
      <title>Re: PostgresDB (remote monitoring) Extension 2.0 Question</title>
      <link>https://community.dynatrace.com/t5/Extensions/PostgresDB-remote-monitoring-extension-2-0/m-p/244203#M4374</link>
      <description>&lt;P&gt;This is as per Postgres documentation. Only a superuser can access the WAL metrics, this is not our decision but comes from postgres. Our database data source is unable to run any modifications by the way.&lt;/P&gt;&lt;P&gt;If it is still a problem, disable WAL metrics.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 08:25:10 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Extensions/PostgresDB-remote-monitoring-extension-2-0/m-p/244203#M4374</guid>
      <dc:creator>florent_duchate</dc:creator>
      <dc:date>2024-04-29T08:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: PostgresDB (remote monitoring) Extension 2.0 Question</title>
      <link>https://community.dynatrace.com/t5/Extensions/PostgresDB-remote-monitoring-extension-2-0/m-p/244216#M4375</link>
      <description>&lt;P&gt;An alternative to using &lt;STRONG&gt;superuser&lt;/STRONG&gt;&amp;nbsp;would be to grant the&amp;nbsp;&lt;STRONG&gt;pg_read_all_stats&lt;/STRONG&gt; role to the user. Or, what is even more commonly done, is to grant the&amp;nbsp;&lt;STRONG&gt;pg_monitor&lt;/STRONG&gt; role.&lt;/P&gt;&lt;P&gt;Here is an excerpt from the Postgres v15 documentation:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;SPAN&gt;The&amp;nbsp;&lt;/SPAN&gt;pg_monitor&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;pg_read_all_settings&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;pg_read_all_stats&lt;SPAN&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;pg_stat_scan_tables&lt;SPAN&gt;&amp;nbsp;roles are intended to allow administrators to easily configure a role for the purpose of monitoring the database server. They grant a set of common privileges allowing the role to read various useful configuration settings, statistics and other system information normally restricted to superusers.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;pg_monitor: Read/execute various monitoring views and functions. This role is a member of&amp;nbsp;pg_read_all_settings,&amp;nbsp;pg_read_all_stats&amp;nbsp;and&amp;nbsp;pg_stat_scan_tables.&lt;/SPAN&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;We will look into updating the hub tile with the recommendation of using&amp;nbsp;&lt;STRONG&gt;pg_monitor&lt;/STRONG&gt; or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;pg_read_all_stats&lt;/STRONG&gt; role.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 09:40:30 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Extensions/PostgresDB-remote-monitoring-extension-2-0/m-p/244216#M4375</guid>
      <dc:creator>vagiz_duseev</dc:creator>
      <dc:date>2024-04-29T09:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: PostgresDB (remote monitoring) Extension 2.0 Question</title>
      <link>https://community.dynatrace.com/t5/Extensions/PostgresDB-remote-monitoring-extension-2-0/m-p/244284#M4377</link>
      <description>&lt;P&gt;Thank you, Vagiz.&lt;BR /&gt;&lt;BR /&gt;The current documentation states to grant the Dynatrace user the &lt;STRONG&gt;pg_monitor&lt;/STRONG&gt; role.&lt;/P&gt;&lt;P&gt;Based on the PostgreSQL info you've shared, there is no need to grant the Dynatrace user the &lt;STRONG&gt;superuser&lt;/STRONG&gt; role. Is this correct?&lt;/P&gt;&lt;P&gt;It looks like the only role the Dynatrace user needs is the &lt;STRONG&gt;pg_monitor&lt;/STRONG&gt; role, which is already a member of the &lt;STRONG&gt;pg_read_all_stats&lt;/STRONG&gt; role.&lt;/P&gt;&lt;P&gt;If this is the case, then this addresses our security concerns.&lt;/P&gt;&lt;P&gt;We just need the "Get started" documentation to be updated accordingly.&lt;/P&gt;&lt;P&gt;Thank you so much for your response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ASE_0-1714412477434.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19521i080EB4F7B602D556/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ASE_0-1714412477434.png" alt="ASE_0-1714412477434.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 17:58:48 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Extensions/PostgresDB-remote-monitoring-extension-2-0/m-p/244284#M4377</guid>
      <dc:creator>ASE</dc:creator>
      <dc:date>2024-04-29T17:58:48Z</dc:date>
    </item>
    <item>
      <title>Re: PostgresDB (remote monitoring) Extension 2.0 Question</title>
      <link>https://community.dynatrace.com/t5/Extensions/PostgresDB-remote-monitoring-extension-2-0/m-p/244285#M4378</link>
      <description>&lt;P&gt;Thank you for your response.&lt;/P&gt;&lt;P&gt;We want to view/use the WAL metrics.&lt;/P&gt;&lt;P&gt;We just don't want to make the Dynatrace user a &lt;STRONG&gt;superuser&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;See Vagiz's response below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 18:01:55 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Extensions/PostgresDB-remote-monitoring-extension-2-0/m-p/244285#M4378</guid>
      <dc:creator>ASE</dc:creator>
      <dc:date>2024-04-29T18:01:55Z</dc:date>
    </item>
  </channel>
</rss>

