26 Jan 2017 08:12 PM
We setup the credentials in AWS, but when we try to connect from our Managed on prem system it says "Invalid Credentials or credentials already exist". Is there any tricks to troubleshooting this? The credentails were verified and we even tried a different role name to be safe.
Thanks.
Brian
Solved! Go to Solution.
27 Jan 2017 07:40 AM
Hi Brian,
Configuration of role- based AWS monitoring for Managed is a little bit more trickier than for SaaS. Below are instructions how to do it. Please let me know if it worked for you.
*****************************************************************************************
Short description:
To monitor target instances with role-based permissions, a Security Gateway needs to assume a role on the target account which allows it to read the monitoring data. For security reasons the Security Gateway first assumes an additional internal role (“proxy”), before it assumes the target role in a second step.
The solution therefore describes how to prepare your AWS environment:
What you need:
Detailed instructions:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": "*"
}
]
}
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": [ "arniam::<12 digit target account number>:role/<role name of the Dynatrace Managed PSG>" ]
}
]
}
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": "arniam::<12 digit source account number>:role/roleXassume"
}
]
}
[vertical.topology]
aws_proxy_account = <12 digit source account number>
aws_proxy_role = roleXassume
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"autoscaling:Describe*",
"cloudwatch:Describe*",
"cloudwatch:Get*",
"cloudwatch:List*",
"ec2:Describe*",
"elasticloadbalancing:Describe*",
"rds:DescribeDBInstances",
"rds:List*",
"dynamodb:DescribeTable",
"dynamodb:ListTables",
"lambda:ListFunctions",
"lambda:GetFunction",
"elasticbeanstalk:DescribeEnvironments",
"elasticbeanstalk:DescribeEnvironmentResources",
"s3:List*",
"s3:Get*",
"sts:GetCallerIdentity"
],
"Resource": "*"
}
]
}
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": [ "arniam::<12 digit source account number>:role/roleXassume" ]
}
]
}
Best Regards,
Karolina
27 Jan 2017 04:07 PM
Can you clarify if these steps or for running Dynatarce Managed on-prem and trying to monitor AWS? Also can you tounch on how to apply the role to the security gateway in managed?
17 Apr 2018 02:15 PM
Hello,
if these steps are for runnning Dynatrace Managed on-prem ?
Thanks in advance for your reply.
20 Jun 2018 07:27 AM
Will these instructions also work within Managed On Prem? I'm having the same problem
27 Jun 2018 08:58 AM
Yes they should work for Managed as well. This is written in Karolina's procedure.
13 Aug 2018 07:01 PM
Will it work for Dynatrace SaaS?
13 Aug 2018 07:12 PM
It works the same way:
https://www.dynatrace.com/support/help/cloud-platforms/amazon-web-services/how-do-i-start-amazon-web-services-monitoring#enable-access-to-your-amazon-account
20 Mar 2019 10:45 AM
Just FYI the help page How do I start Amazon Web Services monitoring has been updated recently
23 Nov 2022 10:09 AM
The link is broken (404)
24 Nov 2022 07:43 AM
Hi @ofpeleg
Here is a working one: Set up Dynatrace Managed for AWS monitoring
HTH
Yos