Dynatrace regularly expands its AWS resource type coverage for topology monitoring. This means we periodically make additional AWS API calls to collect topology data for newly supported resource types. Because the AWS IAM policy for the Dynatrace Integration IAM role is scoped to only the permissions required (following AWS's IAM security best practices), you’ll need to update the CloudFormation stack over time to grant this role any new IAM permissions in your AWS account(s). For a complete list of required AWS monitoring role IAM permissions. To ensure you receive topology data for all supported resource types, please update your CloudFormation stacks to the latest version. When we release an update, we will include the release notes and instructions on how to update.
Latest templates set v1.0.4
Deployed based on user opt-in during onboarding
da-aws-activation.yaml)Direct resources created in deployment region:
DynatraceApiClientStack (AWS::CloudFormation::Stack)
da-aws-nested-dt-api-function.yamlReportStartedStatusResource (Custom::DynatraceApiAccessFunction)
DynatraceIntegrationStack (AWS::CloudFormation::Stack)
da-aws-nested-integration.yamlDynatraceStackSetRoleStack (AWS::CloudFormation::Stack)
da-aws-nested-stackset-role.yamlDynatraceLogIngestStackSet (AWS::CloudFormation::StackSet)
pDtLogsIngestEnabled = 'TRUE'da-aws-stack-logs.yamlDynatraceEventIngestStackSet (AWS::CloudFormation::StackSet)
pDtEventsIngestEnabled = 'TRUE'da-aws-stack-events.yamlReportCompleteStatusResource (Custom::DynatraceApiAccessFunction)
From DynatraceApiClientStack (da-aws-nested-dt-api-function.yaml)—expected resources:
pUseCMK = 'TRUE'From DynatraceIntegrationStack (da-aws-nested-integration.yaml)—expected resources:
From DynatraceStackSetRoleStack (da-aws-nested-stackset-role.yaml)—expected resources:
Minimum resources (no log/event ingest enabled), deployed only on a single region (management region):
From DynatraceLogIngestStackSet (da-aws-stack-logs.yaml); deployed to each region in pDtLogsIngestRegions list. Expected resources per region:
pUseCMK = 'TRUE'From DynatraceEventIngestStackSet (da-aws-stack-events.yaml); deployed to each region in pDtEventsIngestRegions list. Expected resources per region:
v0.x.x: Introduced at the release of the AWS Platform Monitoring Preview Program and is no longer supported.
v1.x.x: v1 is a long-term supported version, considered the default for all newly created AWS connections as of the General Avaliability of the AWS Platform Monitoring.
Open the CloudFormation console https://awsRegion.console.aws.amazon.com/cloudformation/home?region=awsRegion#/stacks.
Make sure to change awsRegion to the region where your current connection's CloudFormation stacks are deployed.
Locate the (root) stack. The stack name should be identical as the connection name, for example, MyEastProd3Account.
Select the Template tab to locate the Metadata/Version/Number and examine the value, for example, v1.0.0.
AWS connections which are deployed with template set version v0.x.x are no longer supported nor support an in-place upgrade.
In those cases we recommend to delete the connection and recreate it which will pick up the current latest version.
General Availability version, cleaned and secured.
Changed resource, condition and output names.
Scoped down deployment permissions.
New IAM permissions to support cloudtrail API calls for topology changes for the following AWS resources:
AWS::Route53::HostedZoneAWS::Route53::HealthCheckAWS::ApiGateway::StageAWS::ApiGatewayV2::StageAWS::EFS::FileSystemAWS::EFS::AccessPointAWS::EFS::MountTargetAWS::ECR::RepositoryAWS::ElastiCache::CacheClusterAWS::ElastiCache::ServerlessCacheAWS::Elasticache::ReplicationGroupAWS::Elasticache::SubnetGroupAWS::MSK::ConfigurationAWS::MSK::VpcConnectionAWS::SNS::TopicAWS::SQS::QueueAWS::ElasticBeanstalk::EnvironmentAWS::Firehose::DeliveryStreamAWS::Logs::LogGroupAWS::ElasticBeanstalk::ApplicationAWS::S3::Bucket
If you have adjusted the provided templates to align with internal standards or policies (changed the Cloudformation code) do not follow this update, see FAQ.
In the AWS CloudFormation console: Locate the root stack in the deployment region. The root stack name will follow the connection name, for example: MyEastProd3Account.
Follow a direct update.
It is always recommended to first update a non-business critical connection and gradually update the rest.
We also recommend to use AWS best practices for CFN direct updates.
In Replace existing template, choose the latest 1.x.x version.
The update failed? Check out AWS CloudFormation troubleshooting guide.
We understand that in some environments it may be necessary to adjust the provided templates to align with internal standards or policies.
Once templates are customized, they follow a customer‑managed update path. As a result, updates to newer template versions are not supported, as changes to the underlying CloudFormation state can impact update behavior.
For each release, we provide detailed release notes outlining the changes and enhancements included. We recommend reviewing these notes and selectively incorporating the relevant updates into your customized templates as part of your own update process.
Yes, minor version upgrade should always use the latest, for example: deployed: 1.0.1 can upgrade to: 1.0.4 (latest).
No, the latest version is always published under this link: https://dynatrace-data-acquisition.s3.us-east-1.amazonaws.com/aws/deployment/cfn/latest/da-aws-activation.yaml.
At present we do not support individual stack(s) direct update, each update must be done from the root stack, regadless of the actual changes.