cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Error: Not connected to AWS

Hi,

After successful connection to AWS by Role-based authentication I cannot add Amazon CloudWatch Logs Service. When I'm trying to do so this pop up comes out:

Pawel_Zalewski_0-1694524218741.png

I added CloudWatch permissions policies in AWS account and used this docs to connect:

https://www.dynatrace.com/support/help/setup-and-configuration/setup-on-cloud-platforms/amazon-web-s...

Also I can't use alerting rules wich is most important for me to create

Pawel_Zalewski_1-1694524428492.png

Appreciate your help 🙂

 

"The lions does not ally with the coyotes"
2 REPLIES 2

DanielS
DynaMight Guru
DynaMight Guru

Hello @Pawel_Zalewski under role based auth you can monitor the "default" services without an ActiveGate:

DanielS_0-1694542208370.png

As you can see Amazon Cloudwatch Logs is non default so you must install and configure an Environment ActiveGate if you want to monitor either or both of the following:

You need an AG on your EC2 Account:

Create a role for ActiveGate on the account that hosts ActiveGate

  1. Download the YAML file with CloudFormation template.
  2. Create the stack in your Amazon Console:
    1. In your Amazon Console, go to CloudFormation.
    2. Go to Stacks and create a new stack with new resources.
    3. Select Template is ready, upload the template you created above, and then select Next.
    4. In Parameters, for Monitored Account ID, enter the ID of the account Dynatrace will monitor. Optionally, adapt other parameters as needed.
    5. Enter a name for your stack, and then select Next twice.
    6. Review your configuration, select I acknowledge that AWS CloudFormation might create IAM resources with custom names, and select Submit.

3. Go to the Amazon EC2 console, right-click an instance hosting your Environment ActiveGate, and select Security > Modify IAM role.

4. Select the role you created in step 1 and select Update IAM role.

 

Part 2

 

Create a monitoring role for Dynatrace on your monitored account

 

After the Dynatrace_ActiveGate_role is created on the account hosting the ActiveGate, create a role for the account to be monitored.

  1. Download a YAML file with CloudFormation template from github role_based_access_AG_account_template.yml.
  2. Create the stack in your Amazon Console:
    1. In your Amazon Console, go to CloudFormation.
    2. Go to Stacks and create a new stack with new resources.
    3. Select Template is ready, upload the template you created above, and select Next.
    4. In Parameters, enter External ID, ActiveGateRoleName and ActiveGateAccountID from the stack created in Step 2.3.2.1. Optionally, adapt other parameters if needed.
    5. Enter a name for your stack, and then select Next twice.
    6. Review your configuration, enable I acknowledge that AWS CloudFormation might create IAM resources with custom names, and select Submit.

Hope it helps!!!!

The true delight is in the finding out rather than in the knowing.

Thanks a lot! I missed this steps:

3. Go to the Amazon EC2 console, right-click an instance hosting your Environment ActiveGate, and select Security > Modify IAM role.

4. Select the role you created in step 1 and select Update IAM role.

Now it's working 🙂

"The lions does not ally with the coyotes"

Featured Posts