Configure user access for Distributed Tracing
Latest Dynatrace
Distributed traces are stored in the default_span
built-in Grail bucket with a 10-day retention period. Traces might contain personal and sensitive data.
This article contains information on how to modify user access to trace data and sensitive information and how to configure trace data storage.
Who is this for
This article is intended for administrators controlling identity and access management.
Prerequisites
- You have Dynatrace Platform Subscription (DPS).
- You are familiar with Grail.
Configure user permissions for trace data
To configure user permission to fetch span data from buckets and tables in Grail and for Distributed Tracing data
- Go to Account Management. If you have more than one account, select the account you want to manage.
- Go to Identity & access management > Policies.
- Select Create policy.
- Add the policy details:
- Name
- Description
- Policy statement—use the following:
ALLOW storage:buckets:read WHERE storage:bucket-name = "spans";ALLOW storage:spans:read;
- Select Create policy.
Users can now access all stored trace data and leverage it in Grail according to sensitive information permissions. To change which data users can access, you can modify environment-level data storage and user access to sensitive information.
Configure access to sensitive data
To configure access to sensitive information in compliance with your company's privacy policies
- Go to Account Management. If you have more than one account, select the account you want to manage.
- Go to Identity & access management > Policies.
- Select Create policy.
- Add the policy details:
- Name
- Description
- Policy statement—use the following:
- To give access to all sensitive fields
ALLOW storage:fieldsets:read WHERE storage:fieldset-name="builtin-sensitive-spans"
The fields' attributes are
client.ip
,db.connection_string
,http.request.header.referer
,url.full
,url.query
, anddb.query.parameters
. To learn more about the attributes, see Global field reference.
- To give access to fields containing confidential request attributes
ALLOW storage:fieldsets:read WHERE storage:fieldset-name="builtin-request-attributes-spans"
- To give access to all sensitive fields
- Select Create policy.
Users can now access sensitive data according to the configured permissions.
Configure forwarding data to Grail
To configure which span data is stored and available in your latest Dynatrace environment
- Go to Settings > Server-side service monitoring > Attribute capturing.
- Select Blocked attributes > Add item.
- Enter the attribute key.
- Select Save changes.
Only attributes that are not blocked will be forwarded to Grail.