<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Integrating Dynatrace managed with AWS Cloudwatch using Role based authentication via a proxy server in Cloud platforms</title>
    <link>https://community.dynatrace.com/t5/Cloud-platforms/Integrating-Dynatrace-managed-with-AWS-Cloudwatch-using-Role/m-p/114542#M247</link>
    <description>&lt;P&gt;Does anyone have experience integrating Managed with AWS Cloudwatch using Role based authentication AND a proxy server? &lt;/P&gt;&lt;P&gt;We have our Managed cluster running in AWS. We are using the bundled ActiveGate on one of the cluster nodes so it has the right roles needed. We are only allowed to go out to the internet through a proxy server. Since the Cloudwatch endpoints are external, we need the ActiveGate to route the call to Cloudwatch through this proxy server.&lt;/P&gt;&lt;P&gt;We have setup the proxy config in security-Gateway properties and server properties but the CloudWatch calls are not going to the proxy and hence getting blocked.&lt;/P&gt;&lt;P&gt;Any idea how do we force the ActiveGate to use a proxy server for this Cloudwatch Role based integration?&lt;/P&gt;&lt;P&gt;Any inputs appreciated!&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Priyanka&lt;/P&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 25 Feb 2019 21:58:57 GMT</pubDate>
    <dc:creator>parora</dc:creator>
    <dc:date>2019-02-25T21:58:57Z</dc:date>
    <item>
      <title>Integrating Dynatrace managed with AWS Cloudwatch using Role based authentication via a proxy server</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Integrating-Dynatrace-managed-with-AWS-Cloudwatch-using-Role/m-p/114542#M247</link>
      <description>&lt;P&gt;Does anyone have experience integrating Managed with AWS Cloudwatch using Role based authentication AND a proxy server? &lt;/P&gt;&lt;P&gt;We have our Managed cluster running in AWS. We are using the bundled ActiveGate on one of the cluster nodes so it has the right roles needed. We are only allowed to go out to the internet through a proxy server. Since the Cloudwatch endpoints are external, we need the ActiveGate to route the call to Cloudwatch through this proxy server.&lt;/P&gt;&lt;P&gt;We have setup the proxy config in security-Gateway properties and server properties but the CloudWatch calls are not going to the proxy and hence getting blocked.&lt;/P&gt;&lt;P&gt;Any idea how do we force the ActiveGate to use a proxy server for this Cloudwatch Role based integration?&lt;/P&gt;&lt;P&gt;Any inputs appreciated!&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Priyanka&lt;/P&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 25 Feb 2019 21:58:57 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Integrating-Dynatrace-managed-with-AWS-Cloudwatch-using-Role/m-p/114542#M247</guid>
      <dc:creator>parora</dc:creator>
      <dc:date>2019-02-25T21:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating Dynatrace managed with AWS Cloudwatch using Role based authentication via a proxy server</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Integrating-Dynatrace-managed-with-AWS-Cloudwatch-using-Role/m-p/114543#M248</link>
      <description>&lt;P&gt;Have you followed these instructions? &lt;A rel="noopener noreferrer" href="https://www.dynatrace.com/support/help/shortlink/sgw-proxy-authentication#setting-proxy-for-dynatrace-server-communication-and-for-awsvmware-monitoring" target="_blank"&gt;https://www.dynatrace.com/support/help/shortlink/sgw-proxy-authentication#setting-proxy-for-dynatrace-server-communication-and-for-awsvmware-monitoring&lt;/A&gt;&lt;/P&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 19 Nov 2019 20:21:11 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Integrating-Dynatrace-managed-with-AWS-Cloudwatch-using-Role/m-p/114543#M248</guid>
      <dc:creator>Radoslaw_Szulgo</dc:creator>
      <dc:date>2019-11-19T20:21:11Z</dc:date>
    </item>
  </channel>
</rss>

