on 25 Jun 2025 05:26 PM
As part of the AWS Integration docs, especially for non-default AWS Services Monitoring, an EC2-based Environment ActiveGate capable of performing the sts:AssumeRole Task over the AWS IAM Role in the AWS Account wishing to be monitored is required.
The IAM Role associated with the ActiveGate is unable to perform the sts:AssumeRole Task, leading to a lack of Metrics/Logs ingest for AWS Resources within the AWS Account.
With an incorrect configuration applied, there will be logs similar to the following found within the ActiveGate's SupportArchive.
\log\dynatracegateway.0.0.log
com.amazonaws.services.securitytoken.model.AWSSecurityTokenServiceException: User: arnsts::{AG-AWS-Account-Number}:assumed-role/{AG-Role-Name}/{AG-Instance-ID} is not authorized to perform: sts:AssumeRole on resource: arniam::{Target-AWS-Account-Number}:role/{Target-Role-Name}(Service: AWSSecurityTokenService; Status Code: 403; Error Code: AccessDenied; Request ID: XXXX; Proxy: null)
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.handleErrorResponse(AmazonHttpClient.java:1879)
Within the Dynatrace UI > Settings Classic > Cloud > AWS, there will be a warning stating that the given integration is "Running on Dynatrace provided infrastructure".
The AWS Integration cannot have non-default AWS Services added to the integration for monitoring.
curl http://169.254.169.254/latest/meta-data/iam/info
aws sts assume-role --role-arn <ARN_of_monitoring_role> --role-session-name TestSession --external-id <external_id>
If this article did not help, please open a support ticket, mention that this article was used and provide the following in the ticket: