<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Workflow in Automations</title>
    <link>https://community.dynatrace.com/t5/Automations/Workflow-fetch-Apigee-proxy-metadata-in-JSON-format-and-persist/m-p/299268#M2591</link>
    <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;As an answer to your question:&lt;/P&gt;&lt;P&gt;1.&amp;nbsp;&lt;SPAN&gt;using PATs (Personal Access Tokens) for long-running workflows can become operationally difficult because PATs expire and require manual rotation. If a PAT expires and is not updated in time, the ingestion workflow will fail until the token is renewed.&lt;/SPAN&gt;&lt;BR /&gt;2. &amp;nbsp;&lt;SPAN&gt;If PATs are still used, they should ideally belong to a dedicated service account rather than an individual user account. In that case, the workflow/team would typically use the same PAT associated with that service identity, but this still introduces token lifecycle management overhead.&lt;/SPAN&gt;&lt;BR /&gt;3. PAT's need to be renewed manually. You could also switch to normal tokens (not PAT). You could script the token renewal process.&lt;BR /&gt;4. &amp;nbsp;Wouldn't it be more sufficient to use a &lt;A href="https://docs.dynatrace.com/docs/manage/identity-access-management/user-and-group-management/access-service-users" target="_self"&gt;service user&lt;/A&gt; here? If the service user has the right access rights (which you can scope via IAM), you could simple &lt;A href="https://developer.dynatrace.com/develop/guides/data/ingest-data/" target="_self"&gt;ingest BizEvents&lt;/A&gt; without generating extra tokens. The workflow would run under the service user as the "actor". You would remove the need for tokens in general. If for what reason you would need API tokens, you could created OAuth credentials for the service user.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 May 2026 11:09:31 GMT</pubDate>
    <dc:creator>michiel_otten</dc:creator>
    <dc:date>2026-05-11T11:09:31Z</dc:date>
    <item>
      <title>Workflow - fetch Apigee proxy metadata in JSON format and persist the data into Grail</title>
      <link>https://community.dynatrace.com/t5/Automations/Workflow-fetch-Apigee-proxy-metadata-in-JSON-format-and-persist/m-p/299207#M2589</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We are working on a Dynatrace workflow to fetch Apigee proxy metadata in JSON format and persist the data into Grail after converting it via a JavaScript step into the BizEvents format. While setting this up, we have a few doubts and would appreciate clarity:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Since BizEvents ingestion requires write access to Grail, our infrastructure team is planning to create &lt;STRONG&gt;service accounts&lt;/STRONG&gt; instead of granting direct access to each user. Will this approach work reliably, given that it requires generating tokens (PATs) which have expiry dates? Could this lead to ingestion failures if tokens expire?&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;If service accounts are used, will the same PAT be shared among all team members for persisting BizEvents into Grail, or should each member have their own PAT?&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Currently, this setup is only for &lt;STRONG&gt;staging&lt;/STRONG&gt;. When we move to &lt;STRONG&gt;production&lt;/STRONG&gt;, how should we handle token management and rotation securely?&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Is there any &lt;STRONG&gt;simpler or recommended alternative&lt;/STRONG&gt; to this approach for interacting with Grail, especially for long‑running workflows?&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;We’d appreciate best practices or guidance from anyone who has implemented BizEvents ingestion with service accounts and PATs.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks in advance!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 12:08:44 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Automations/Workflow-fetch-Apigee-proxy-metadata-in-JSON-format-and-persist/m-p/299207#M2589</guid>
      <dc:creator>tmehta3</dc:creator>
      <dc:date>2026-05-11T12:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: Workflow</title>
      <link>https://community.dynatrace.com/t5/Automations/Workflow-fetch-Apigee-proxy-metadata-in-JSON-format-and-persist/m-p/299267#M2590</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/73851"&gt;@MaximilianoML&lt;/a&gt;&amp;nbsp; can u provide some valuable inputs on these.&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 10:46:34 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Automations/Workflow-fetch-Apigee-proxy-metadata-in-JSON-format-and-persist/m-p/299267#M2590</guid>
      <dc:creator>tmehta3</dc:creator>
      <dc:date>2026-05-11T10:46:34Z</dc:date>
    </item>
    <item>
      <title>Re: Workflow</title>
      <link>https://community.dynatrace.com/t5/Automations/Workflow-fetch-Apigee-proxy-metadata-in-JSON-format-and-persist/m-p/299268#M2591</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;As an answer to your question:&lt;/P&gt;&lt;P&gt;1.&amp;nbsp;&lt;SPAN&gt;using PATs (Personal Access Tokens) for long-running workflows can become operationally difficult because PATs expire and require manual rotation. If a PAT expires and is not updated in time, the ingestion workflow will fail until the token is renewed.&lt;/SPAN&gt;&lt;BR /&gt;2. &amp;nbsp;&lt;SPAN&gt;If PATs are still used, they should ideally belong to a dedicated service account rather than an individual user account. In that case, the workflow/team would typically use the same PAT associated with that service identity, but this still introduces token lifecycle management overhead.&lt;/SPAN&gt;&lt;BR /&gt;3. PAT's need to be renewed manually. You could also switch to normal tokens (not PAT). You could script the token renewal process.&lt;BR /&gt;4. &amp;nbsp;Wouldn't it be more sufficient to use a &lt;A href="https://docs.dynatrace.com/docs/manage/identity-access-management/user-and-group-management/access-service-users" target="_self"&gt;service user&lt;/A&gt; here? If the service user has the right access rights (which you can scope via IAM), you could simple &lt;A href="https://developer.dynatrace.com/develop/guides/data/ingest-data/" target="_self"&gt;ingest BizEvents&lt;/A&gt; without generating extra tokens. The workflow would run under the service user as the "actor". You would remove the need for tokens in general. If for what reason you would need API tokens, you could created OAuth credentials for the service user.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 11:09:31 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Automations/Workflow-fetch-Apigee-proxy-metadata-in-JSON-format-and-persist/m-p/299268#M2591</guid>
      <dc:creator>michiel_otten</dc:creator>
      <dc:date>2026-05-11T11:09:31Z</dc:date>
    </item>
    <item>
      <title>Re: Workflow</title>
      <link>https://community.dynatrace.com/t5/Automations/Workflow-fetch-Apigee-proxy-metadata-in-JSON-format-and-persist/m-p/299283#M2592</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/96104"&gt;@tmehta3&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/4669"&gt;@michiel_otten&lt;/a&gt;!&lt;/P&gt;&lt;P&gt;I agree with what&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/4669"&gt;@michiel_otten&lt;/a&gt;&amp;nbsp;said&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 13:38:56 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Automations/Workflow-fetch-Apigee-proxy-metadata-in-JSON-format-and-persist/m-p/299283#M2592</guid>
      <dc:creator>MaximilianoML</dc:creator>
      <dc:date>2026-05-11T13:38:56Z</dc:date>
    </item>
  </channel>
</rss>

