<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed? in Cloud platforms</title>
    <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24834#M391</link>
    <description>&lt;P&gt;It works the same way:&lt;/P&gt;&lt;P&gt;https://www.dynatrace.com/support/help/cloud-platforms/amazon-web-services/how-do-i-start-amazon-web-services-monitoring#enable-access-to-your-amazon-account&lt;/P&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 13 Aug 2018 18:12:19 GMT</pubDate>
    <dc:creator>JamesKitson</dc:creator>
    <dc:date>2018-08-13T18:12:19Z</dc:date>
    <item>
      <title>Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24827#M384</link>
      <description>&lt;P&gt;We setup the credentials in AWS, but when we try to connect from our Managed on prem system it says "Invalid Credentials or credentials already exist".  Is there any tricks to troubleshooting this?  The credentails were verified and we even tried a different role name to be safe.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2017 20:12:02 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24827#M384</guid>
      <dc:creator>bcox2</dc:creator>
      <dc:date>2017-01-26T20:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24828#M385</link>
      <description>&lt;P&gt;Hi Brian,&lt;/P&gt;&lt;P&gt;Configuration of role- based AWS monitoring for Managed is a little bit more trickier than for SaaS. Below are instructions how to do it. Please let me know if it worked for you. &lt;/P&gt;&lt;P&gt;*****************************************************************************************&lt;/P&gt;&lt;P&gt;Short description:&lt;/P&gt;&lt;P&gt;To monitor target instances with role-based permissions, a Security Gateway needs to assume a role on the target account which allows it to read the monitoring data. For security reasons the Security Gateway first assumes an additional internal role (“proxy”), before it assumes the target role in a second step.&lt;/P&gt;&lt;P&gt;The solution therefore describes how to prepare your AWS environment:&lt;/P&gt;&lt;UL&gt; &lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;1.Create a proxy role in step 1,&lt;/LI&gt;&lt;LI&gt;2.then adjust the role of the Security Gateway,&lt;/LI&gt;&lt;LI&gt;3.change Security Gateway configuration settings to point to the right AWS account,&lt;/LI&gt;&lt;LI&gt;4.and create a role and its permissions on the target account.&lt;/LI&gt;&lt;LI&gt;5.Last step are the standard configuration settings in the Dynatrace product.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;What you need:&lt;/P&gt;&lt;UL&gt; &lt;LI&gt;Your Amazon Web Services source account ID in which your Dynatrace Managed servers are running.&lt;/LI&gt;&lt;LI&gt;The name of the role with which your Dynatrace Managed Server (or Public Security Gateway) was started.&lt;/LI&gt;&lt;LI&gt;Your Amazon Web Services target account ID of the account you want to monitor.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Detailed instructions:&lt;/P&gt;&lt;UL&gt; &lt;LI&gt;1.Create a cross-account access role in the source account&lt;/LI&gt;&lt;LI&gt;a.Login to the source AWS account&lt;/LI&gt;&lt;LI&gt;b.Go to IAM in your AWS Console&lt;/LI&gt;&lt;LI&gt;c.Go to Roles and create a new role, name it “roleXassume”, you’ll need it later&lt;/LI&gt;&lt;LI&gt;d.Select the Role for Cross-Account Access, then Provide access between AWS accounts you own&lt;/LI&gt;&lt;LI&gt;e.Enter the source AWS account ID (yes, this means cross-account access on the same account)&lt;/LI&gt;&lt;LI&gt;f.Skip attaching existing policy by going to next step&lt;/LI&gt;&lt;LI&gt;g.In the Review page click Create Role&lt;/LI&gt;&lt;LI&gt;h.Select the just created role and go to the Permissions tab&lt;/LI&gt;&lt;LI&gt;i.In Permissions expand Inline Policies, and create a new inline policy there (follow the click here link)&lt;/LI&gt;&lt;LI&gt;j.In Set Permissions select Custom Policy&lt;/LI&gt;&lt;LI&gt;k.Create the policy with the following permissions:&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;{&lt;/P&gt;&lt;P&gt;  "Version": "2012-10-17",&lt;/P&gt;&lt;P&gt;  "Statement": [&lt;/P&gt;&lt;P&gt;  {&lt;/P&gt;&lt;P&gt;  "Effect": "Allow",&lt;/P&gt;&lt;P&gt;  "Action": "sts:AssumeRole",&lt;/P&gt;&lt;P&gt;  "Resource": "*"&lt;/P&gt;&lt;P&gt;  }&lt;/P&gt;&lt;P&gt;  ]&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;l.After the roleXassume role is created, please select the role in the IAM roles section and go to the “Trust Relationships” tab&lt;/LI&gt;&lt;LI&gt;m.Click “Edit Trust Relationships” and change the permissions (for security reasons, the default policy permissions need to be restricted to the calling PSG role):&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;{&lt;/P&gt;&lt;P&gt;  "Version": "2012-10-17",&lt;/P&gt;&lt;P&gt;  "Statement": [&lt;/P&gt;&lt;P&gt;  {&lt;/P&gt;&lt;P&gt;  "Effect": "Allow",&lt;/P&gt;&lt;P&gt;  "Action": "sts:AssumeRole",&lt;/P&gt;&lt;P&gt;  "Resource": [ "arn&lt;img class="lia-deferred-image lia-image-emoji" src="https://community.dynatrace.com/html/@F9676CCDE08B8746467ACFFDC4C9827E/images/emoticons/aws.png" alt=":aws:" title=":aws:" /&gt;iam::&amp;lt;12 digit target account number&amp;gt;:role/&amp;lt;role name of the Dynatrace Managed PSG&amp;gt;" ]&lt;/P&gt;&lt;P&gt;  }&lt;/P&gt;&lt;P&gt;  ]&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Note: if you do not know upfront the role (or roles) on target accounts being monitored, you may need to alter the resource filter (e.g. include multiple roles). You may use also wildcard (“*”) as a resource, but note that this will then allow assuming any other role you have in your source account. In such cases, you can consider using a separate “proxy” account for greater security.&lt;/LI&gt;&lt;LI&gt;2.Modify the role policy for the Dynatrace Managed server&lt;/LI&gt;&lt;LI&gt;a.Login to the source AWS account, if not done in step 1&lt;/LI&gt;&lt;LI&gt;b.Go to IAM in your AWS Console&lt;/LI&gt;&lt;LI&gt;c.Select the role with which your Dynatrace Managed server is being started and go to the Permissions tab&lt;/LI&gt;&lt;LI&gt;d.In Permissions expand Inline Policies, and create a new inline policy there (follow the click here link)&lt;/LI&gt;&lt;LI&gt;e.In Set Permissions select Custom Policy&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt; &lt;LI&gt;f.Create the policy with the following permissions:&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;{&lt;/P&gt;&lt;P&gt;  "Version": "2012-10-17",&lt;/P&gt;&lt;P&gt;  "Statement": [&lt;/P&gt;&lt;P&gt;  {&lt;/P&gt;&lt;P&gt;  "Effect": "Allow",&lt;/P&gt;&lt;P&gt;  "Action": "sts:AssumeRole",&lt;/P&gt;&lt;P&gt;  "Resource": "arn&lt;img class="lia-deferred-image lia-image-emoji" src="https://community.dynatrace.com/html/@F9676CCDE08B8746467ACFFDC4C9827E/images/emoticons/aws.png" alt=":aws:" title=":aws:" /&gt;iam::&amp;lt;12 digit source account number&amp;gt;:role/roleXassume"&lt;/P&gt;&lt;P&gt;  }&lt;/P&gt;&lt;P&gt;  ]&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Note: the roleXassume in the policy must match the policy you created in step 1c.&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt; &lt;LI&gt;3.Add configuration settings&lt;/LI&gt;&lt;LI&gt;a.On the Dynatrace Managed server change the config.properties section:&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;[vertical.topology]&lt;/P&gt;&lt;P&gt;aws_proxy_account = &amp;lt;12 digit source account number&amp;gt;&lt;/P&gt;&lt;P&gt;aws_proxy_role = roleXassume&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Note: the roleXassume in the policy must match the policy you created in step 1c.&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt; &lt;LI&gt;4.Create a cross-account access role in the target account (similar as in the help documentation, but with a different account ID)&lt;/LI&gt;&lt;LI&gt;a.Login to the target AWS account&lt;/LI&gt;&lt;LI&gt;b.Go to IAM in your AWS Console&lt;/LI&gt;&lt;LI&gt;c.Go to Roles and create a new role&lt;/LI&gt;&lt;LI&gt;d.Select the Role for Cross-Account Access, then Allow IAM users from a 3&lt;SUP&gt;rd&lt;/SUP&gt; party AWS account to access this account&lt;/LI&gt;&lt;LI&gt;e.Establish trust with your source account. Type the 12 digit source account number that can access the target account. Take note of the External ID, you’ll need it later.&lt;/LI&gt;&lt;LI&gt;f.Skip attaching existing policy by going to next step&lt;/LI&gt;&lt;LI&gt;g.In the Review page click Create Role&lt;/LI&gt;&lt;LI&gt;h.Select the just created role and go to the Permissions tab&lt;/LI&gt;&lt;LI&gt;i.In Permissions expand Inline Policies, and create a new inline policy there (follow the click here link)&lt;/LI&gt;&lt;LI&gt;j.In Set Permissions select Custom Policy&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt; &lt;LI&gt;k.Create the policy with the following permissions:&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;{&lt;/P&gt;&lt;P&gt;  "Version": "2012-10-17",&lt;/P&gt;&lt;P&gt;  "Statement": [&lt;/P&gt;&lt;P&gt;  {&lt;/P&gt;&lt;P&gt;  "Effect": "Allow",&lt;/P&gt;&lt;P&gt;  "Action": [&lt;/P&gt;&lt;P&gt;  "autoscaling:Describe*",&lt;/P&gt;&lt;P&gt;  "cloudwatch:Describe*",&lt;/P&gt;&lt;P&gt;  "cloudwatch:Get*",&lt;/P&gt;&lt;P&gt;  "cloudwatch:List*",&lt;/P&gt;&lt;P&gt;  "ec2:Describe*",&lt;/P&gt;&lt;P&gt;  "elasticloadbalancing:Describe*",&lt;/P&gt;&lt;P&gt;  "rds:DescribeDBInstances",&lt;/P&gt;&lt;P&gt;  "rds:List*",&lt;/P&gt;&lt;P&gt;  "dynamodb:DescribeTable",&lt;/P&gt;&lt;P&gt;  "dynamodb:ListTables",&lt;/P&gt;&lt;P&gt;  "lambda:ListFunctions",&lt;/P&gt;&lt;P&gt;  "lambda:GetFunction",&lt;/P&gt;&lt;P&gt;  "elasticbeanstalk:DescribeEnvironments",&lt;/P&gt;&lt;P&gt;  "elasticbeanstalk:DescribeEnvironmentResources",&lt;/P&gt;&lt;P&gt;  "s3:List*",&lt;/P&gt;&lt;P&gt;  "s3:Get*",&lt;/P&gt;&lt;P&gt;    "sts:GetCallerIdentity"&lt;/P&gt;&lt;P&gt;  ],&lt;/P&gt;&lt;P&gt;  "Resource": "*"&lt;/P&gt;&lt;P&gt;  }&lt;/P&gt;&lt;P&gt;  ]&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;l.Optional step: After the target role is created, please select the role in the IAM roles section again and go to the “Trust Relationships” tab. Then click “Edit Trust Relationships” and change the permissions:&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;{&lt;/P&gt;&lt;P&gt;  "Version": "2012-10-17",&lt;/P&gt;&lt;P&gt;  "Statement": [&lt;/P&gt;&lt;P&gt;  {&lt;/P&gt;&lt;P&gt;  "Effect": "Allow",&lt;/P&gt;&lt;P&gt;  "Action": "sts:AssumeRole",&lt;/P&gt;&lt;P&gt;  "Resource": [ "arn&lt;img class="lia-deferred-image lia-image-emoji" src="https://community.dynatrace.com/html/@F9676CCDE08B8746467ACFFDC4C9827E/images/emoticons/aws.png" alt=":aws:" title=":aws:" /&gt;iam::&amp;lt;12 digit source account number&amp;gt;:role/roleXassume" ]&lt;/P&gt;&lt;P&gt;  }&lt;/P&gt;&lt;P&gt;  ]&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;UL&gt; &lt;LI&gt;5.Connect your Amazon account to Dynatrace Managed – as described in the help documentation&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Karolina&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 07:40:25 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24828#M385</guid>
      <dc:creator>Karolina_Ruszko</dc:creator>
      <dc:date>2017-01-27T07:40:25Z</dc:date>
    </item>
    <item>
      <title>Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24829#M386</link>
      <description>&lt;P&gt;Can you clarify if these steps or for running Dynatarce Managed on-prem and trying to monitor AWS?  Also can you tounch on how to apply the role to the security gateway in managed?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 16:07:07 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24829#M386</guid>
      <dc:creator>bcox2</dc:creator>
      <dc:date>2017-01-27T16:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24830#M387</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;if these steps are for runnning Dynatrace Managed on-prem ?&lt;/P&gt;&lt;P&gt;Thanks in advance for your reply.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Apr 2018 13:15:48 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24830#M387</guid>
      <dc:creator>hamza_eljohri</dc:creator>
      <dc:date>2018-04-17T13:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24831#M388</link>
      <description>&lt;P&gt;Will these instructions also work within Managed On Prem?  I'm having the same problem&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jun 2018 06:27:26 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24831#M388</guid>
      <dc:creator>steve_neighbour</dc:creator>
      <dc:date>2018-06-20T06:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24832#M389</link>
      <description>&lt;P&gt;Yes they should work for Managed as well. This is written in Karolina's procedure.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jun 2018 07:58:14 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24832#M389</guid>
      <dc:creator>Radoslaw_Szulgo</dc:creator>
      <dc:date>2018-06-27T07:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24833#M390</link>
      <description>&lt;P&gt;Will it work for Dynatrace SaaS?&lt;/P&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 13 Aug 2018 18:01:19 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24833#M390</guid>
      <dc:creator>eduardo_ferraz2</dc:creator>
      <dc:date>2018-08-13T18:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24834#M391</link>
      <description>&lt;P&gt;It works the same way:&lt;/P&gt;&lt;P&gt;https://www.dynatrace.com/support/help/cloud-platforms/amazon-web-services/how-do-i-start-amazon-web-services-monitoring#enable-access-to-your-amazon-account&lt;/P&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 13 Aug 2018 18:12:19 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24834#M391</guid>
      <dc:creator>JamesKitson</dc:creator>
      <dc:date>2018-08-13T18:12:19Z</dc:date>
    </item>
    <item>
      <title>Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24835#M392</link>
      <description>&lt;P&gt;Thank you &lt;A rel="user" href="https://answers.dynatrace.com/users/3513/view.html" nodeid="3513"&gt;@James K.&lt;/A&gt;&lt;/P&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 13 Aug 2018 18:17:45 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24835#M392</guid>
      <dc:creator>eduardo_ferraz2</dc:creator>
      <dc:date>2018-08-13T18:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24836#M393</link>
      <description>&lt;P&gt;Just FYI the help page &lt;A href="https://www.dynatrace.com/support/help/technology-support/cloud-platforms/amazon-web-services/how-do-i-start-amazon-web-services-monitoring/"&gt;How do I start Amazon Web Services monitoring&lt;/A&gt; has been updated recently&lt;/P&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 20 Mar 2019 10:45:19 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/24836#M393</guid>
      <dc:creator>michal_nalezin</dc:creator>
      <dc:date>2019-03-20T10:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/199031#M1011</link>
      <description>&lt;P&gt;The link is broken (404)&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 10:09:40 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/199031#M1011</guid>
      <dc:creator>ofpeleg</dc:creator>
      <dc:date>2022-11-23T10:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: Any idea  if there is a trick to connecting to AWS from Dyntrace Managed?</title>
      <link>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/199086#M1013</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/57258"&gt;@ofpeleg&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Here is a working one: &lt;A href="https://www.dynatrace.com/support/help/shortlink/aws-managed-deployment" target="_blank" rel="noopener"&gt;Set up Dynatrace Managed for AWS monitoring&lt;/A&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Yos&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 07:43:40 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Cloud-platforms/Any-idea-if-there-is-a-trick-to-connecting-to-AWS-from-Dyntrace/m-p/199086#M1013</guid>
      <dc:creator>Yosi_Neuman</dc:creator>
      <dc:date>2022-11-24T07:43:40Z</dc:date>
    </item>
  </channel>
</rss>

