Overview
This collector pulls logs from the Dynatrace API and pulls from admin activities endpoint.
Devo collector features
Feature | Details |
---|---|
Allow parallel downloading ( |
|
Running environments |
|
Populated Devo events |
|
Flattening preprocessing |
|
Allowed source events obfuscation |
|
Data sources
Data source | Description | API endpoint | Collector service name | Devo table |
---|---|---|---|---|
Audit |
|
|
| |
Query | Query from any source in your Dynatrace domain |
|
|
|
For more information on how the events are parsed, visit our page.
Vendor setup
This section will contain all the information required to have an environment ready to be collected. You can find more info in the Dynatrace documentation.
Generate access token
Go to Access Tokens.
Select Generate new token.
Enter a name for your token.
Dynatrace doesn't enforce unique token names. You can create multiple tokens with the same name. Be sure to provide a meaningful name for each token you generate. Proper naming helps you to efficiently manage your tokens and perhaps delete them when they're no longer needed.
Select the required scopes for the token.
logs.read scope
Select Generate token.
Copy the generated token to the clipboard. Store the token in a password manager for future use.
Minimum configuration required for basic pulling
Although this collector supports advanced configuration, the fields required to retrieve data with basic configuration are defined below.
Audit Service
Enable Audit Logging which is disabled by default
From the Dynatrace Menu, go to Settings > Preferences > Log audit events.
Turn on Log all audit-related system events. Dynatrace retains audit logs for 30 days and automatically deletes them afterwards. You can also enable audit logs via Data privacy API.
Generate an access token:
In the Dynatrace menu, select Access tokens.
Select Generate new token.
Enter a name for your token. Dynatrace doesn't enforce unique token names. You can create multiple tokens with the same name. Be sure to provide a meaningful name for each token you generate. Proper naming helps you to efficiently manage your tokens and perhaps delete them when they're no longer needed.
Select the
auditLogs.read
scope for the token.Select Generate token.
Copy the generated token to the clipboard. Store the token in a password manager for future use.
Determine your API base URL. API base URL formats are:
Managed / Dynatrace for Government: https://{your-domain}/e/{your-environment-id}
SaaS: https://{your-environment-id}.live.dynatrace.com
Environment ActiveGate: https://{your-activegate-domain}/e/{your-environment-id}
Dynatrace retains audit logs for 30 days and automatically deletes them afterwards. You can also enable audit logs via Data privacy API.
Grail Query Service
You can create new OAuth clients on the Account Management page in Dynatrace.
Go to Account Management. If you have more than one account, select the account you want to manage.
From the top menu bar, select Identity & access management > OAuth clients.
Select Create client.
Provide the email address of the user who will own the client.
Provide a description for the new client.
Ensure that your client has the required permissions by selecting one or more options during client setup. For reading and writing business events, you require:
cloudautomation:logs:read
storage:logs:read
storage:buckets:read
storage:bucket-definitions:read
Select Create client.
Save the generated client secret to a password manager for future use. You will also require the generated client ID when obtaining a bearer token.
More on Dynatrace Tokens Note: This minimum configuration refers exclusively to those specific parameters of this integration. There are more required parameters related to the generic behavior of the collector. Check the setting sections for details.
This minimum configuration refers exclusively to those specific parameters of this integration. There are more required parameters related to the generic behavior of the collector. Check setting sections for details.
Setting | Details |
---|---|
| The Dynatrace client ID |
| The Dynatrace client secret |
| The Dynatrace Access Token "dt0s01.ST2EY72KQINMH574WMNVI7YN.G3DFPBEJYMODIDAEX454M7YWBUVEFOWKPRVMWFASS64NFH52PX6BNDVFFM572RZM" |
| The Dynatrace Resource "urn:dtaccount:abcd1234-ab12-cd34-ef56-abcdef123456" |
See the Accepted authentication methods section to verify what settings are required based on the desired authentication method.
Accepted authentication methods
Authentication Method | Base Url | Client ID | Client Secret | Access Token | Resource |
---|---|---|---|---|---|
| Required | Required | Required | ||
| Required | Required | Required | Required | Required |
Run the collector
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
Collector services detail
This section is intended to explain how to proceed with specific actions for services.
Collector operations
This section is intended to explain how to proceed with specific operations of this collector.
Change log
Release | Released on | Release type | Recommendations |
---|---|---|---|
|
| NEW FEATURE |
|