<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AWS Role based Integration  - Monitored account error for permissions related to tag and cloudwatch in Cloud platforms</title>
    <link>https://community.dynatrace.com/t5/Cloud-platforms/AWS-Role-based-Integration-Monitored-account-error-for/m-p/256548#M1765</link>
    <description>&lt;P&gt;This is in the context of AWS Monitoring setup using IAM Role based access.&lt;BR /&gt;ActiveGate version=1.295.27.20240715-230200&lt;/P&gt;&lt;P&gt;An IAM role for a Linux based ActiveGate in the AWS account that hosts the ActiveGate was created, and also a monitoring IAM role for Dynatrace ( named Dynatrace_monitoring_role) in the AWS account to be monitored.&lt;/P&gt;&lt;P&gt;Cloudfromation Templates used for both the IAM Roles can be accessed via &lt;A href="https://github.com/dynatrace-oss/cloud-snippets/tree/main/aws/role-based-access" target="_blank"&gt;https://github.com/dynatrace-oss/cloud-snippets/tree/main/aws/role-based-access&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm facing an issue during the attempt to create an AWS connection in UI, due to errors from the Monitored AWS account related to tag and cloudwatch permissions.&lt;BR /&gt;Ec2 permission didn't face any issue. The policy attached to the Dynatrace_monitoring_role has the relevant tag and cloudwatch permissions,&lt;/P&gt;&lt;P&gt;Excerpt of the Debug log pasted below&lt;/P&gt;&lt;P&gt;----------------------------&lt;BR /&gt;&lt;EM&gt;2024-09-20 05:03:55 UTC INFO [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSClientFactory] trying to get client initial response for credentials: AWSCredentialsImpl {identifier: 803D58634C5E37A4, accessKey: null, secretKey: null, tenantUUID: f73b0e7e190c-fefc24a4-d245-22rt-7788-, iamRole: Dynatrace_monitoring_role, accountId: 237862957236, externalId: *****, label: Tools-monitoring, partition: aws, detectedPartition: null, monitorOnlyTaggedEntities: true, includeTags: [Pair[A: RoleType, B: k8s]], excludeTags: [], excludedRegions: [], logConfigSQSesEnabled: false, logConfigSQSes: [], version: 2.0, legacyServices: [ebs_builtin, lambda_builtin, ELB_builtin, loadbalancer_builtin, s3_builtin, dynamodb_builtin, ec2_builtin, asg_builtin, rds_builtin], services: [], extensionDetails: null} [Suppressing further messages for 15 minutes] [skipped logs: 1]&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;2024-09-20 05:03:55 UTC DEBUG [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, PartitionAutoDetection] detectedPartition=aws, for credentials: Tools-monitoring [-8769628377978171752]&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;2024-09-20 05:03:55 UTC DEBUG [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] Credentials refresh successful: AWS credentials: AWSCredentialsImpl {identifier: 803D58634C5E37A4, accessKey: null, tenantUUID: f73b0e7e190c-fefc24a4-d245-22rt-7788-, iamRole: Dynatrace_monitoring_role, accountId: 237862957236, externalId: *****, label: Tools-monitoring, version: 2.0}&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;2024-09-20 05:03:55 UTC INFO [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] STS GetCallerIdentity: {status: OK, statusInfo: , credentials: AWSCredentialsImpl {identifier: 803D58634C5E37A4, accessKey: null, tenantUUID: f73b0e7e190c-fefc24a4-d245-22rt-7788-, iamRole: Dynatrace_monitoring_role, accountId: 237862957236, externalId: *****,label: Tools-monitoring, version: 2.0}}&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;2024-09-20 05:03:55 UTC INFO [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] &lt;FONT color="#0000FF"&gt;&lt;STRONG&gt;AWS FastCheck ec2:DescribeAvailabilityZones permission check completed successfully in region us-west-2 for credentials(AWSCredentialsImpl {identifier: 803D58634C5E37A4, accessKey: null, tenantUUID: f73b0e7e190c-fefc24a4-d245-22rt-7788-, iamRole: Dynatrace_monitoring_role, accountId: 237862957236, externalId: *****, label: Tools-monitoring, version: 2.0})&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;2024-09-20 05:05:15 UTC INFO [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSErrorLogger] (Credentials: Tools-monitoring) Service AWSResourceGroupsTaggingAPI, &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;endpoint &lt;A href="https://tagging.us-west-2.amazonaws.com" target="_blank"&gt;https://tagging.us-west-2.amazonaws.com&lt;/A&gt;, returned error: no response&lt;/STRONG&gt;&lt;/FONT&gt;, message: [Suppressing further identical messages for 3 hours]&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;2024-09-20 05:05:15 UTC INFO [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] AWS FastCheck permissions status in region us-west-2 for credentials(AWSCredentialsImpl {identifier: 803D58634C5E37A4, accessKey: null, tenantUUID: f73b0e7e190c-fefc24a4-d245-22rt-7788-, iamRole: Dynatrace_monitoring_role, accountId: 237862957236, externalId: *****, label: Tools-monitoring, version: 2.0}):&lt;/EM&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;EM&gt;tag:GetResources ERROR_UNKNOWN.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;EM&gt;cloudwatch:ListMetrics ERROR_UNKNOWN.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;cloudwatch:GetMetricData ERROR_UNKNOWN.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;----------------&lt;/P&gt;&lt;P&gt;Not sure what is causing the error for tag and cloudwatch related permissions&lt;/P&gt;</description>
    <pubDate>Fri, 20 Sep 2024 05:51:54 GMT</pubDate>
    <dc:creator>dyn98007</dc:creator>
    <dc:date>2024-09-20T05:51:54Z</dc:date>
    <item>
      <title>AWS Role based Integration  - Monitored account error for permissions related to tag and cloudwatch</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/AWS-Role-based-Integration-Monitored-account-error-for/m-p/256548#M1765</link>
      <description>&lt;P&gt;This is in the context of AWS Monitoring setup using IAM Role based access.&lt;BR /&gt;ActiveGate version=1.295.27.20240715-230200&lt;/P&gt;&lt;P&gt;An IAM role for a Linux based ActiveGate in the AWS account that hosts the ActiveGate was created, and also a monitoring IAM role for Dynatrace ( named Dynatrace_monitoring_role) in the AWS account to be monitored.&lt;/P&gt;&lt;P&gt;Cloudfromation Templates used for both the IAM Roles can be accessed via &lt;A href="https://github.com/dynatrace-oss/cloud-snippets/tree/main/aws/role-based-access" target="_blank"&gt;https://github.com/dynatrace-oss/cloud-snippets/tree/main/aws/role-based-access&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm facing an issue during the attempt to create an AWS connection in UI, due to errors from the Monitored AWS account related to tag and cloudwatch permissions.&lt;BR /&gt;Ec2 permission didn't face any issue. The policy attached to the Dynatrace_monitoring_role has the relevant tag and cloudwatch permissions,&lt;/P&gt;&lt;P&gt;Excerpt of the Debug log pasted below&lt;/P&gt;&lt;P&gt;----------------------------&lt;BR /&gt;&lt;EM&gt;2024-09-20 05:03:55 UTC INFO [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSClientFactory] trying to get client initial response for credentials: AWSCredentialsImpl {identifier: 803D58634C5E37A4, accessKey: null, secretKey: null, tenantUUID: f73b0e7e190c-fefc24a4-d245-22rt-7788-, iamRole: Dynatrace_monitoring_role, accountId: 237862957236, externalId: *****, label: Tools-monitoring, partition: aws, detectedPartition: null, monitorOnlyTaggedEntities: true, includeTags: [Pair[A: RoleType, B: k8s]], excludeTags: [], excludedRegions: [], logConfigSQSesEnabled: false, logConfigSQSes: [], version: 2.0, legacyServices: [ebs_builtin, lambda_builtin, ELB_builtin, loadbalancer_builtin, s3_builtin, dynamodb_builtin, ec2_builtin, asg_builtin, rds_builtin], services: [], extensionDetails: null} [Suppressing further messages for 15 minutes] [skipped logs: 1]&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;2024-09-20 05:03:55 UTC DEBUG [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, PartitionAutoDetection] detectedPartition=aws, for credentials: Tools-monitoring [-8769628377978171752]&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;2024-09-20 05:03:55 UTC DEBUG [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] Credentials refresh successful: AWS credentials: AWSCredentialsImpl {identifier: 803D58634C5E37A4, accessKey: null, tenantUUID: f73b0e7e190c-fefc24a4-d245-22rt-7788-, iamRole: Dynatrace_monitoring_role, accountId: 237862957236, externalId: *****, label: Tools-monitoring, version: 2.0}&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;2024-09-20 05:03:55 UTC INFO [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] STS GetCallerIdentity: {status: OK, statusInfo: , credentials: AWSCredentialsImpl {identifier: 803D58634C5E37A4, accessKey: null, tenantUUID: f73b0e7e190c-fefc24a4-d245-22rt-7788-, iamRole: Dynatrace_monitoring_role, accountId: 237862957236, externalId: *****,label: Tools-monitoring, version: 2.0}}&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;2024-09-20 05:03:55 UTC INFO [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] &lt;FONT color="#0000FF"&gt;&lt;STRONG&gt;AWS FastCheck ec2:DescribeAvailabilityZones permission check completed successfully in region us-west-2 for credentials(AWSCredentialsImpl {identifier: 803D58634C5E37A4, accessKey: null, tenantUUID: f73b0e7e190c-fefc24a4-d245-22rt-7788-, iamRole: Dynatrace_monitoring_role, accountId: 237862957236, externalId: *****, label: Tools-monitoring, version: 2.0})&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;2024-09-20 05:05:15 UTC INFO [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSErrorLogger] (Credentials: Tools-monitoring) Service AWSResourceGroupsTaggingAPI, &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;endpoint &lt;A href="https://tagging.us-west-2.amazonaws.com" target="_blank"&gt;https://tagging.us-west-2.amazonaws.com&lt;/A&gt;, returned error: no response&lt;/STRONG&gt;&lt;/FONT&gt;, message: [Suppressing further identical messages for 3 hours]&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;2024-09-20 05:05:15 UTC INFO [&amp;lt;f73b0e7e190c-fefc24a4-d245-22rt-7788-&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] AWS FastCheck permissions status in region us-west-2 for credentials(AWSCredentialsImpl {identifier: 803D58634C5E37A4, accessKey: null, tenantUUID: f73b0e7e190c-fefc24a4-d245-22rt-7788-, iamRole: Dynatrace_monitoring_role, accountId: 237862957236, externalId: *****, label: Tools-monitoring, version: 2.0}):&lt;/EM&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;EM&gt;tag:GetResources ERROR_UNKNOWN.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;EM&gt;cloudwatch:ListMetrics ERROR_UNKNOWN.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;cloudwatch:GetMetricData ERROR_UNKNOWN.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;----------------&lt;/P&gt;&lt;P&gt;Not sure what is causing the error for tag and cloudwatch related permissions&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 05:51:54 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/AWS-Role-based-Integration-Monitored-account-error-for/m-p/256548#M1765</guid>
      <dc:creator>dyn98007</dc:creator>
      <dc:date>2024-09-20T05:51:54Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Role based Integration  - Monitored account error for permissions related to tag and cloudwatch</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/AWS-Role-based-Integration-Monitored-account-error-for/m-p/256777#M1767</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/79860"&gt;@dyn98007&lt;/a&gt;&amp;nbsp;- are the AWS endpoints reachable from AG?&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.dynatrace.com/docs/shortlink/aws-monitoring-guide#capable-activegate" target="_blank"&gt;https://docs.dynatrace.com/docs/shortlink/aws-monitoring-guide#capable-activegate&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 04:18:27 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/AWS-Role-based-Integration-Monitored-account-error-for/m-p/256777#M1767</guid>
      <dc:creator>p_devulapalli</dc:creator>
      <dc:date>2024-09-23T04:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Role based Integration  - Monitored account error for permissions related to tag and cloudwatch</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/AWS-Role-based-Integration-Monitored-account-error-for/m-p/256885#M1770</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/21657"&gt;@p_devulapalli&lt;/a&gt;&amp;nbsp; - The connectivity issue is isolated to the AWS Resource Groups Tagging endpoint (&lt;A href="https://tagging.us-west-2.amazonaws.com/" target="_blank" rel="noopener"&gt;https://tagging.us-west-2.amazonaws.com/&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;The Activate Host is in an AWS environment which is behind a Proxy. So the Tagging endpoint traffic has to go through the Proxy.&lt;/P&gt;&lt;P&gt;The environment variables for HTTPS_PROXY , HTTP_PROXY and NO_PROXY have been set in the Activate Service in systemd ( /etc/systemd/system/dynatracegateway.service) .&lt;BR /&gt;Due to the NO_PROXY setting, there is no issue connecting to STS, Monitoring and EC2 endpoints ( as captured in the below log). VPC endpoints have been defined for them.&lt;BR /&gt;Unfortunately, it fails for the endpoint - &lt;A href="https://tagging.us-west-2.amazonaws.com-" target="_blank" rel="noopener"&gt;https://tagging.us-west-2.amazonaws.com-&lt;/A&gt; with the error: " unable to find valid certification path to requested target"&lt;/P&gt;&lt;P&gt;---------&lt;/P&gt;&lt;P&gt;From Debug.log&lt;/P&gt;&lt;P&gt;2024-09-23 17:53:28 UTC DEBUG [&amp;lt;f73b0e7e190c-2345-44cb-9623-f73b0e7e190c&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, PartitionAutoDetection] detectedPartition=aws, for credentials: Tools Test [-1061062254360197475]&lt;BR /&gt;2024-09-23 17:53:29 UTC DEBUG [&amp;lt;f73b0e7e190c-2345-44cb-9623-f73b0e7e190c&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] Credentials refresh successful: AWS credentials: AWSCredentialsImpl {identifier: 4DEF18A649159633, accessKey: null, tenantUUID: f73b0e7e190c-2345-44cb-9623-f73b0e7e190c, iamRole: Dynatrace_monitoring_role, accountId: 378629572362, externalId: *****, label: Tools Test, version: 2.0}&lt;/P&gt;&lt;P&gt;2024-09-23 17:53:29 UTC INFO [&amp;lt;f73b0e7e190c-2345-44cb-9623-f73b0e7e190c&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] STS GetCallerIdentity: {status: OK, statusInfo: , credentials: AWSCredentialsImpl {identifier: 4DEF18A649159633, accessKey: null, tenantUUID: f73b0e7e190c-2345-44cb-9623-f73b0e7e190c, iamRole: Dynatrace_monitoring_role, accountId: 378629572362, externalId: *****,label: Tools Test, version: 2.0}}&lt;/P&gt;&lt;P&gt;2024-09-23 17:53:29 UTC INFO [&amp;lt;f73b0e7e190c-2345-44cb-9623-f73b0e7e190c&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] AWS FastCheck ec2:DescribeAvailabilityZones permission check completedsuccessfully in region us-west-2 for credentials(AWSCredentialsImpl {identifier: 4DEF18A649159633, accessKey: null, tenantUUID: f73b0e7e190c-2345-44cb-9623-f73b0e7e190c, iamRole: Dynatrace_monitoring_role, accountId: 378629572362, externalId: *****, label: Tools Test, version: 2.0})&lt;/P&gt;&lt;P&gt;2024-09-23 17:53:31 UTC INFO [&amp;lt;f73b0e7e190c-2345-44cb-9623-f73b0e7e190c&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSErrorLogger] (Credentials: Tools Test) Service AWSResourceGroupsTaggingAPI, endpoint &lt;A href="https://tagging.us-west-2.amazonaws.com" target="_blank" rel="noopener"&gt;https://tagging.us-west-2.amazonaws.com&lt;/A&gt;, returned error: no response, message: Unable to execute HTTP request: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target [Suppressing further identical messages for 3 hours]&lt;/P&gt;&lt;P&gt;2024-09-23 17:53:31 UTC INFO [&amp;lt;f73b0e7e190c-2345-44cb-9623-f73b0e7e190c&amp;gt;] [&amp;lt;vtopology.provider&amp;gt;, AWSFastCheckCallable] AWS FastCheck permissions status in region us-west-2 for credentials(AWSCredentialsImpl {identifier: 4DEF18A649159633, accessKey: null, tenantUUID: f73b0e7e190c-2345-44cb-9623-f73b0e7e190c, iamRole: Dynatrace_monitoring_role, accountId: 378629572362, externalId: *****, label: Tools Test, version: 2.0}):&lt;BR /&gt;tag:GetResources ERROR_UNKNOWN. Status: Unable to execute HTTP request: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/P&gt;&lt;P&gt;cloudwatch:ListMetrics OK.&lt;BR /&gt;cloudwatch:GetMetricData OK.&lt;/P&gt;&lt;P&gt;----------------------------------&lt;BR /&gt;The application is running as the user: dtuserag&lt;/P&gt;&lt;P&gt;$ ps -ef | grep dtuserag&lt;/P&gt;&lt;P&gt;dtuserag 1338998 1 0 16:09 ? 00:00:00 /opt/dynatrace/gateway/launcher/dynatracegateway -bg -config /var/lib/dynatrace/gateway/config/dynatracegateway.ini&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;dtuserag 1339002 1338998 2 16:09 ? 00:02:05 /opt/dynatrace/gateway/jre/bin/java -Dcom.compuware.apm.WatchDogTimeout=180 -classpath ./lib/* --add-opens=java.base/java.lang=ALL-UNNAMED -Xms1024M -XX:ErrorFile=/var/log/dynatrace/gateway/hs_err_pid_%p.log -XX:+UseG1GC -XX:+IgnoreUnrecognizedVMOptions -Duser.language=en -Djava.util.logging.manager=com.dynatrace.gen2.foundation.logging.impl.backend.CustomShutdownLogManager -Djdk.tls.ephemeralDHKeySize=2048 -Dorg.xerial.snappy.lib.path=/opt/dynatrace/gateway/lib/native -Dorg.xerial.snappy.lib.name=libsnappyjava.so -Djava.io.tmpdir=/var/lib/dynatrace/gateway/temp -Dfile.encoding=UTF-8 -Dsun.jnu.encoding=UTF-8 -Djava.security.egd=file:/dev/urandom -DZstdNativePath=/opt/dynatrace/gateway/lib/native/libzstd-jni.so -Xmx10275M -Dcom.compuware.apm.WatchDogPort=50000 com.compuware.apm.collector.core.CollectorImpl -CONFIG_DIR /var/lib/dynatrace/gateway/config&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;----------------&lt;BR /&gt;The Proxy Root cert is stored in&lt;STRONG&gt; trusted.p12&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;( created using the info mentioned &lt;A href="https://docs.dynatrace.com/docs/setup-and-configuration/dynatrace-activegate/configuration/configure-trusted-root-certificates-on-activegate#configure-certificate" target="_self"&gt;here&lt;/A&gt; )&lt;BR /&gt;The application seems to pick all the relevant files to create the runtime cert (&lt;EM&gt;&lt;STRONG&gt;runtime.cacerts&lt;/STRONG&gt;&lt;/EM&gt;) by merging &lt;EM&gt;&lt;STRONG&gt;cacerts&lt;/STRONG&gt;&lt;/EM&gt; and &lt;STRONG&gt;&lt;EM&gt;trusted.p12&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Excerpt from the Debug log captured below...&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;header&amp;gt;] +-----------------------------------------------------------------------------&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;header&amp;gt;] + Dynatrace LLC&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;header&amp;gt;] +-----------------------------------------------------------------------------&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;header&amp;gt;] + Version 1.295.7.20240715-224910&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;header&amp;gt;] + collector: 0x7cd018cb; tenant: f73b0e7e190c-2345-44cb-9623-f73b0e7e190c;&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;com.compuware.apm.logging&amp;gt;, LoggingServiceImpl] Platform: Linux, Version: 5.14.0-284.82.1.el9_2.x86_64, Architecture: amd64, Processors: 4&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;com.compuware.apm.logging&amp;gt;, LoggingServiceImpl] VM: OpenJDK 64-Bit Server VM, Version: 17.0.10, Vendor: Eclipse Adoptium, Memory [maxMemory=1&lt;BR /&gt;0280M, initHeap=1024M, maxHeap=10280M, usedMeta=7M, committedMeta=7M, totalPhysicalMemory=15809M, freePhysicalMemory=6793M]&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;com.compuware.apm.logging&amp;gt;, LoggingServiceImpl] file.encoding: UTF-8, sun.jnu.encoding: UTF-8, user.name: dtuserag&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;com.compuware.apm.logging&amp;gt;, LoggingServiceImpl] Input Arguments: -Dcom.compuware.apm.WatchDogTimeout=180 --add-opens=java.base/java.lang=ALL-&lt;BR /&gt;UNNAMED -Xms1024M -XX:ErrorFile=/var/log/dynatrace/gateway/hs_err_pid_%p.log -XX:+UseG1GC -XX:+IgnoreUnrecognizedVMOptions -Duser.language=en -Djava.util.logging.manager=com.dynatrace.gen2.&lt;BR /&gt;foundation.logging.impl.backend.CustomShutdownLogManager -Djdk.tls.ephemeralDHKeySize=2048 -Dorg.xerial.snappy.lib.path=/opt/dynatrace/gateway/lib/native -Dorg.xerial.snappy.lib.name=libsna&lt;BR /&gt;ppyjava.so -Djava.io.tmpdir=/var/lib/dynatrace/gateway/temp -Dfile.encoding=UTF-8 -Dsun.jnu.encoding=UTF-8 -Djava.security.egd=file:/dev/urandom -DZstdNativePath=/opt/dynatrace/gateway/lib/&lt;BR /&gt;native/libzstd-jni.so -Xmx10275M -Dcom.compuware.apm.WatchDogPort=50000&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;collector.core&amp;gt;, CollectorImpl] No keyfile detected, starting without crypto subsystem.&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;collector.comm&amp;gt;, TrustStoreCreator] Setting up combined trust store, Java cacerts: TrustStoreSettingsImpl{path=/opt/dynatrace/gateway/jre/lib&lt;BR /&gt;/security/cacerts, type=pkcs12}, custom: TrustStoreSettingsImpl{path=/var/lib/dynatrace/gateway/config/../ssl/trusted.p12, type=PKCS12}&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;collector.comm&amp;gt;, TrustStoreCreator] overwriting existing certificate with alias concurca&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;collector.comm&amp;gt;, TrustStoreCreator] overwriting existing certificate with alias /etc/pki/ca-trust/source/anchors/root-cert-0&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;collector.comm&amp;gt;, TrustStoreCreator] overwriting existing certificate with alias /etc/pki/ca-trust/source/anchors/root-cert-1&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;collector.comm&amp;gt;, TrustStoreCreator] overwriting existing certificate with alias /etc/pki/ca-trust/source/anchors/root-cert-2&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;collector.comm&amp;gt;, TrustStoreCreator] overwriting existing certificate with alias concurcert-0&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;collector.comm&amp;gt;, TrustStoreCreator] overwriting existing certificate with alias concurcert-1&lt;BR /&gt;2024-09-23 16:01:44 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;collector.comm&amp;gt;, TrustStoreCreator] overwriting existing certificate with alias concurcert-2&lt;BR /&gt;2024-09-23 16:01:45 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;collector.comm&amp;gt;, TrustStoreCreator] Custom certificate configuration created successfully&lt;BR /&gt;2024-09-23 16:01:45 UTC INFO [&amp;lt;collector&amp;gt;] [&amp;lt;collector.comm&amp;gt;, TrustStoreCreator] Effective trust store: TrustStoreSettingsImpl{path=/var/lib/dynatrace/gateway/config/../ssl/runtime.cacerts, type=pkcs12}&lt;BR /&gt;-------------&lt;/P&gt;&lt;P&gt;I don't why the AWS Tagging endpoint requests is not using the cert named runtime.cacerts ( in the path /var/lib/dynatrace/gateway/ssl )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 02:27:17 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/AWS-Role-based-Integration-Monitored-account-error-for/m-p/256885#M1770</guid>
      <dc:creator>dyn98007</dc:creator>
      <dc:date>2024-09-24T02:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Role based Integration  - Monitored account error for permissions related to tag and cloudwatch</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/AWS-Role-based-Integration-Monitored-account-error-for/m-p/257015#M1771</link>
      <description>&lt;P&gt;Also to add.. All the&lt;A href="https://www.amazontrust.com/repository/" target="_self"&gt; 5 Amazon RootCAs&lt;/A&gt; are also present in &lt;STRONG&gt;&lt;EM&gt;cacerts &lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;(&lt;EM&gt;/opt/dynatrace/gateway/jre/lib/security/cacerts )&lt;/EM&gt;. This is in addition to the Proxy related Root cert&lt;/P&gt;&lt;P&gt;--------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;EM&gt;[root@ip-10-xx-x-xx ssm-user]# /opt/dynatrace/gateway/jre/bin/keytool -list -v -keystore /opt/dynatrace/gateway/jre/lib/security/cacerts | grep Amazon&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Warning: use -cacerts option to access cacerts keystore&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Enter keystore password: changeit&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Owner: CN=Amazon Root CA 4, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer: CN=Amazon Root CA 4, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Owner: CN=Amazon Root CA 1, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer: CN=Amazon Root CA 1, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Owner: CN=Amazon Root CA 1, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer: CN=Amazon Root CA 1, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Owner: CN=Amazon Root CA 1, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer: CN=Amazon Root CA 1, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Owner: CN=Amazon Root CA 2, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer: CN=Amazon Root CA 2, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Owner: CN=Amazon Root CA 3, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer: CN=Amazon Root CA 3, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Owner: CN=Amazon Root CA 4, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer: CN=Amazon Root CA 4, O=Amazon, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[root@ip-10-xx-x-xx ssm-user]# /opt/dynatrace/gateway/jre/bin/keytool -list -v -keystore /opt/dynatrace/gateway/jre/lib/security/cacerts | grep Starfield&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Warning: use -cacerts option to access cacerts keystore&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Enter keystore password: changeit&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Owner: CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer: CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Owner: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Owner: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US]&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 18:16:35 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/AWS-Role-based-Integration-Monitored-account-error-for/m-p/257015#M1771</guid>
      <dc:creator>dyn98007</dc:creator>
      <dc:date>2024-09-24T18:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Role based Integration  - Monitored account error for permissions related to tag and cloudwatch</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/AWS-Role-based-Integration-Monitored-account-error-for/m-p/257475#M1776</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Update:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The issue was resolved by making sure the intermediary certs for the Root cert was getting loaded correctly in the creation of Trusted Root cert (.p12).&amp;nbsp;&lt;BR /&gt;Screenshot also attached... it shows that&amp;nbsp;&lt;SPAN&gt;AWSResourceGroupsTaggingAPI endpoint is being accessed successfully&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Sep 2024 23:05:07 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/AWS-Role-based-Integration-Monitored-account-error-for/m-p/257475#M1776</guid>
      <dc:creator>dyn98007</dc:creator>
      <dc:date>2024-09-28T23:05:07Z</dc:date>
    </item>
  </channel>
</rss>

