Log Management and Analytics is the latest Dynatrace log monitoring solution. With the introduction of Dynatrace Platform and Grail, we encourage you to upgrade to the latest log monitoring offer. If you use Dynatrace SaaS on AWS, your environment will be enabled for Log Management and Analytics powered by Grail with a phased rollout.
For more information about the phased rollout, please reach out to one of your Dynatrace Account team members. You can also reach out directly to Dynatrace product experts via live chat within your Dynatrace environment. Our product experts will get you in touch with your account team members and help with answers to any other questions you might have.
Once your environment is enabled for activation:
You can choose to upgrade with your existing log data.
After activating Log Management and Analytics, the following changes take place:
Ingested log data
DDU consumption
API
storage:logs:read
and storage:buckets:read
scopes.No support for Management Zones
After activating Log Management and Analytics, the following will not change:
However we recommend to convert your LQL matchers for log processing, metrics and events to highly performing DQL matcher.
The user access granting process depends on whether you are a new or existing user.
Management Zones configuration will not work with Grail. You have to use buckets and policies for access control.
Assign policy to existing users
After activating Log Management and Analytics, all users who already had access to log data are assigned a new policy to access the log data in Grail.
Assign policy to new users
There are two options for configuring access policies for Grail:
In Dynatrace SaaS, only admin users can manage policies (users with account permission Manage users
).
You need to have two policies, Storage Events Read and Storage Logs Read assigned, bound to a group.
To check if your policies are assigned
If Storage Events Read and Storage Logs Read are not present on you policy list, you need to add them manually:
ALLOW storage:events:read
ALLOW storage:logs:read
To make a policy effective, you need to bind it to a group.
Obtain an OAuth token Make a POST call with form parameters to SSO.
iam:policies:write iam:policies:read
In response, you get an authorization token
{"scope": "iam:policies:read iam:policies:write","token_type": "Bearer","expires_in": 300,"access_token": "123(...)ABC"}
Create a storage events read policy Make a POST call to IAM
Body payload for the policy is:
{"name": "Storage Events Read","description": "Storage Events Read","tags": [],"statementQuery": "ALLOW storage:events:read;"
Create a storage logs read policy Make a POST call to IAM
Body payload for the policy is:
{"name": "Storage Logs Read","description": "Storage Logs Read","tags": [] ,"statementQuery": "ALLOW storage:logs:read;"}
Your newly created policies will be visible on the account level. To check it, go to Account Management > Identity & access management > Policy management > Edit Storage Events Read.